Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts

Sunday, October 24, 2021

Missouri needs to throw the governor out with the garbage

Gov. Mike Parson escalated his war with the St. Louis Post-Dispatch on Wednesday when his political operation published a video doubling down on his attack against a reporter who informed the state that a state website revealed teacher Social Security numbers.

[...]

The ad comes less than a week after Parson’s widely criticized demand for an investigation and prosecution of the reporter who discovered the security flaw in a state website, along with “all those involved.” Parson read a statement calling the reporter “a hacker” to reporters gathered outside his Missouri Capitol office last Thursday, then left without taking questions.

[...]

In the incident that enraged Parson, a Post-Dispatch reporter found that Social Security numbers for teachers, administrators and counselors was visible in the HTML code of a publicly accessible site operated by the state education department. HTML code is the programming that tells the computer how to display a web page.

The newspaper informed the state of the problem and promised not to publish any story until the issue was fixed.

“We stand by our reporting and our reporter who did everything right,” Post-Dispatch Publisher Ian Caso said in a story in his newspaper. “It’s regrettable the governor has chosen to deflect blame onto the journalists who uncovered the website’s problem and brought it to DESE’s attention.”

  Missouri Independent

What's regrettable is that we have Parson as our governor.
Parson said the Missouri State Highway Patrol would investigate and that Cole County Prosecuting Attorney Locke Thompson had been notified.
The Highway Patrol?
The video continuing the attack on the Post-Dispatch was posted online as Democrats on the House Budget Committee continued to question Parson’s estimate that it will take $50 million to respond “to this one incident alone and divert workers and resources from other state agencies.”

The Public Schools and Education Employees Retirement System responded to a different potential data exposure on Sept. 11 by offering all 350,000 members credit monitoring, identity theft protection and the services of a call center through a contract with Experian, according to Dearld Snider, the agency’s executive director.

The cost of that response was just under $600,000.
After having done some substitute teaching for a few months a couple of years ago, I received a letter this time about a possible breach, but I don't recall that September letter.
And since there is likely a large amount of overlap between the people who have education credentials registered with the education department and those who are members of the retirement system, [State Rep. Peter] Merideth believes the ultimate cost will come nowhere near Parson’s $50 million figure.
And so what if it does? Is Parson suggesting that the cost of the state's failure excuses it?
“I wouldn’t be surprised if it was less than $100,000 for credit monitoring,” Merideth said.

The biggest cost, he said, will be studying the state’s computer systems and upgrading them to provide better service and security.

“It is not about what the reporter did,” Merideth said, “it is about the vulnerability and the outdated systems we have.”

[...]

The Missouri National Education Association said it is still trying to understand exactly what happened, both with the data that the Post-Dispatch found and the potential data loss at the retirement system, said spokesman Mark Jones.

“It is important we take data security as seriously as physical security,” Jones said.

The union has not joined Parson’s call for prosecution of the journalist.

“There is nothing that indicates to me,” Jones said, “that the reporter did anything but act ethically within the bounds of good journalism.”
Acting ethically is something Governor Parson knows nothing about.

...but hey, do what you want...you will anyway.

Wednesday, December 16, 2020

Good luck to us


Two of the biggest, most potentially devasting issues (Covid and national security) facing Americans, and Trump is focused on himself, and his allies are focused on destroying democracy.

...but hey, do what you want...you will anyway.

UPDATE:


Dear Twitter:  This claim is not disputed.  It's false.

Thursday, September 10, 2020

Russian interference in 2020

Russian state-backed hackers are reportedly suspected of targeting staff at a top advisory firm working with Democratic presidential nominee Joe Biden's campaign.

Microsoft alerted the Biden campaign that the hacking attempt was directed at employees of SKDKnickerbocker (SKDK), a campaign strategy and communications firm that has worked with Biden's team for the past two months, Reuters reported, citing three unidentified sources.

A person familiar with the cyberattack told the news service that the actors failed to get access to the company's network. It remains unclear what the hackers were after and whether it was something connected to the Biden campaign.

  The Hill
Take your best guess.

...but hey, do what you want...you will anyway.

Wednesday, January 22, 2020

Saturday, October 5, 2019

Iranians targeting US 2020 election

And why wouldn't they?  It worked beautifully for the Russians, and Mitch McConnell blocks Democrats' attempts to tighten election security. We're wide open.
A hacking group that appears to be linked to the Iranian government targeted a United States 2020 presidential campaign, Microsoft Corp said on Friday.

Microsoft saw "significant" activity by the group that also targeted current and former US government officials, journalists covering global politics and prominent Iranians living outside Iran, the company said in a blog post.

In a 30-day period between August and September, the group, called "Phosphorous" by the company, made more than 2,700 attempts to identify consumer email accounts belonging to specific customers and then attacked 241 of those accounts.

[...]

Microsoft said Phosphorous used information gathered from researching their targets or other means to game password reset or account recovery features and attempt to take over some targeted accounts.

The attacks disclosed by the company on Friday were not technically sophisticated, the blog said. Hackers tried to use a significant amount of personal information to attack targets, it said.

  alJazeera
They'll get better.
"This effort suggests Phosphorous is highly motivated and willing to invest significant time and resources engaging in research and other means of information gathering," the software company said in a blog post.

Microsoft declined to identify the campaign targeted, citing privacy concerns.

[...]

The company said those accounts that were comprised were not related to US campaigns or officials.

Microsoft has been tracking Phosphorus since 2013 and said in March that it had received a court order to take control of 99 websites the group used to execute attacks.

Phosphorus is also known as APT 35, Charming Kitten, and Ajax Security Team, according to Microsoft.

Monday, April 1, 2019

"Technical issues"?



Fort Lauderdale-Hollywood International Airport spokesman Gregory Meyer emailed, “We have approximately 55 delayed flights with no cancellations. The software/computer issue is with the following airlines at FLL: Southwest, Delta, Spirit, JetBlue, Alaska, and United.”

By 8:20 a.m., American, Southwest and Delta Airlines were saying the problem with airline software provider AeroData had been resolved.

  Miami Herald
Hacked?

...but hey, do what you want...you will anyway.

Sunday, February 17, 2019

It ain't over till the fat lady sings

Clarification 8/6: That title is not any comment on Brittany Kaiser. It's a quote attributed to Casey Stengel about calling a game before it'a actually ended.
A director of the controversial data company Cambridge Analytica, who appeared with Arron Banks at the launch of the Leave.EU campaign, has been subpoenaed by the US investigation into possible collusion between the Trump campaign and the Russian government.

A spokesman for Brittany Kaiser, former business development director for Cambridge Analytica – which collapsed after the Observer revealed details of its misuse of Facebook data – confirmed that she had been subpoenaed by special counsel Robert Mueller, and was cooperating fully with his investigation.

He added that she was assisting other US congressional and legal investigations into the company’s activities and had voluntarily turned over documents and data.

[...]

Damian Collins, chairman of parliament’s inquiry into fake news, said it was “no surprise” that Kaiser was under scrutiny by Mueller because “her work connected her to WikiLeaks, Cambridge Analytica and [its parent company] SCL, the Trump campaign, Leave.EU and Arron Banks”.

He said it was now vital Britain had its own inquiry into foreign interference: “We should not be leaving this to the Americans.”

  Guardian
Not if you want to get to the truth of the matter.
In August, Sam Patten, a US political consultant who had worked for Cambridge Analytica on campaigns in the US and abroad, struck a plea deal with Mueller after admitting he had failed to register as a foreign agent for a Ukrainian oligarch.

He became a subject of the special counsel’s inquiry because of work done with Paul Manafort, Trump’s campaign manager, in Ukraine. He had also set up a business with Konstantin Kilimnik, a key figure who Mueller has alleged has ties to Russian intelligence and who is facing charges of obstruction of justice. [Kaiser, however, is the first person connected directly to both the Brexit and Trump campaigns known to have been questioned by Mueller.

The news came to light in a new Netflix documentary, The Great Hack, which premiered at the Sundance film festival last month and is expected to be released later this spring. Film-makers followed Kaiser for months after she approached the Guardian, including moments after she received the subpoena. She claims the summons came after the Guardian revealed she had visited WikiLeaks founder Julian Assange while still a Cambridge Analytica employee in February 2017, three months after the US election.

[...]

In the film, Kaiser says that she has gone from being a cooperating witness to a subject of investigation because of her contact with Assange.

In October 2017, it was revealed that Alexander Nix, the chief executive of Cambridge Analytica, had contacted Assange in August 2016 to try to obtain emails from Hillary Clinton’s presidential campaign – which indictments from Mueller’s team say were obtained by Russian military intelligence – to use in Donald Trump’s campaign.

[...]

Patten and Kaiser were involved in a controversial election campaign in Nigeria in January 2015, which former Cambridge Analytica employees say had “unsettling” parallels to the US presidential election.

The Guardian revealed that the data firm had worked alongside a team of unidentified Israeli intelligence operatives on the campaign.
Ah yes, the Israeli connection. I imagine there will be several countries interested in the information in Mueller's eventual report - assuming there is one.



UPDATE 8/6:



Thursday, February 14, 2019

The reality makers

This story involves a Tulare, California, hospital that was driven into bankruptcy by its administrator who was himself making boatloads of money. A local group trying to save the hospital decided to run someone against one of the administrator's enablers on the hospital board. The administrator, in turn, sought help from a DC law firm.
The recall was a clear threat to Benzeevi’s hospital-management business, and he consulted a law firm in Washington, D.C., about mounting a campaign to save Kumar’s seat. An adviser there referred him to Psy-Group, an Israeli private intelligence company. Psy-Group’s slogan was “Shape Reality,” and its techniques included the use of elaborate false identities to manipulate its targets. Psy-Group was part of a new wave of private intelligence firms that recruited from the ranks of Israel’s secret services—self-described “private Mossads.” The most aggressive of these firms seemed willing to do just about anything for their clients.

Psy-Group stood out from many of its rivals because it didn’t just gather intelligence; it specialized in covertly spreading messages to influence what people believed and how they behaved. [...] “Social media allows you to reach virtually anyone and to play with their minds,” Uzi Shaya, a former senior Israeli intelligence officer, said. “You can do whatever you want. You can be whoever you want. It’s a place where wars are fought, elections are won, and terror is promoted. There are no regulations. It is a no man’s land.”

[...]

No election was too small. One company document reported that Psy-Group’s influence services cost, on average, just three hundred and fifty thousand dollars—as little as two hundred and seventy-five dollars an hour. [...] No election was too small. One company document reported that Psy-Group’s influence services cost, on average, just three hundred and fifty thousand dollars—as little as two hundred and seventy-five dollars an hour.

[...]

In New York, Psy-Group mounted a campaign on behalf of wealthy Jewish-American donors to embarrass and intimidate activists on American college campuses who support a movement to put economic pressure on Israel because of its treatment of the Palestinians.

[...]

[F]ew countries produce more highly trained and war-tested intelligence professionals, as a proportion of the population, than Israel.

[...]

Spies, private investigators, criminals, and even some journalists have long used false identities to trick people into providing information, a practice known as pretexting. The Internet made pretexting easier.

[...]

One of the boldest [private intel/psy-ops groups], Black Cube, openly advertised its ties to Israeli spy agencies, including Mossad and Unit 8200, the military’s signals-intelligence corps. Black Cube got its start with the help of Vincent Tchenguiz, an Iranian-born English real-estate tycoon. [...] In March, 2011, Tchenguiz was arrested by a British anti-fraud unit investigating his business dealings. (The office later dropped the investigation and paid him a settlement.) He asked Meir Dagan, who had just stepped down as the director of Mossad, how he could draw on the expertise of former intelligence officers to look into the business rivals he believed had alerted authorities. Dagan’s message to Tchenguiz, a former colleague of Dagan’s said, was: I can find a personal Mossad for you. (Dagan died in 2016.) Tchenguiz became Black Cube’s first significant client.

[...]

Russia’s intelligence services had begun using a variety of tools—including hacking, cyber weapons, online aliases, and Web sites that spread fake news—to conduct information warfare and to sow discord in neighboring countries. In the late two-thousands, the Russians targeted Estonia and Georgia. In 2014, they hit Ukraine. Later that year, [Israel Defense Forces intelligence officer named Royi] Burstien founded Psy-Group, which, like Black Cube, used [social media] avatars to conduct intelligence-collection operations. But Burstien also offered his avatars for another purpose: influence campaigns, similar to those mounted by Russia.

[...]

Tulare seemed an unlikely target for an influence campaign.

[...]

Today, the city is home to just over sixty thousand people.

[...]

Citizens for Hospital Accountability began as a simple Facebook page. At first, the group’s leaders hoped that Alex Gutiérrez would run for Kumar’s seat, but he was planning to stand for a position on the city council. Senovia [Guitiérrez, Alex's mother] was the backup choice.

[...]

Hospital-board races are usually small-time affairs. One former member of the Tulare board said that her campaign had cost just a hundred and fifty dollars, which she used to buy signs and cards that she handed out door-to-door. In the recall, which had been set for July 11, 2017, voter turnout was expected to be fewer than fifteen hundred people. Still, Alex decided to take a break from college and serve as his mother’s campaign manager. He suspected that the race would be bitterly contested, and expensive.

[...]

Tulare County is largely Republican; Trump won it with fifty-three per cent of the vote in 2016, and the district’s representative in the House, Devin Nunes, has spearheaded efforts to counter the Russia investigation. But the hospital board was a crossover issue.

[...]

While Alex and Senovia were soliciting small donations from neighbors, [hospital manager Yorai] Benzeevi got on a plane to Israel to meet with Psy-Group.

[...]

Psy-Group went to great lengths to disguise its activities. Employees were occasionally instructed to go to libraries or Internet cafés, where they could use so-called “white” computers, which could not be traced back to the firm. They created dummy Gmail accounts, often employed for one assignment and then discarded. For particularly sensitive operations, Psy-Group created fake front companies and avatars who purported to work there, and then hired real outside contractors who weren’t told that they were doing the bidding of Psy-Group’s clients. Psy-Group operatives sometimes paid the local contractors in cash.

In one meeting [...] before a parliamentary election in a European country, his operatives had created a sham think tank. Using avatars, the operatives hired local analysts to work for the think tank, which then disseminated reports to bolster the political campaign of the company’s client and to undermine the reputations of his rivals. In another meeting, Psy-Group officials said that they had created an avatar to help a corporate client win regulatory approval in Europe. Over time, the avatar became so well established in the industry that he was quoted in mainstream press reports and even by European parliamentarians.

[...]

Most Psy-Group employees knew little or nothing about the company’s owner, Joel Zamel. According to corporate documents filed in Cyprus, he was born in Australia in 1986. Zamel later moved to Israel, where he earned a master’s degree in government, diplomacy, and strategy, with a specialization in counterterrorism and homeland security. [...] He cultivated relationships with high-profile Republicans in the U.S., including Newt Gingrich and Elliott Abrams, who served in foreign-policy positions under Ronald Reagan and George W. Bush, and whom Psy-Group listed as a member of its advisory board.

  New Yorker
Good old Elliott Abrams.
[An Israel Defense Forces intelligence officer Royi Burstein, who was hired by another psy-ops company, Aviran,] sent representatives to pitch State Department officials on an influence campaign [...] that would “interrupt the radicalization and recruitment chain.” The State Department never acted on the proposal.
Probably because they already have their own psy-ops influence program running.
Psy-Group had more success pitching an operation, code-named Project Butterfly, to wealthy Jewish-American donors. The operation targeted what Psy-Group described as “anti-Israel” activists on American college campuses who supported the Boycott, Divestment, Sanctions movement, known as B.D.S.

[...]

In early meetings with donors, in New York, Burstien said that the key to mounting an effective anti-B.D.S. campaign was to make it look as though Israel, and the Jewish-American community, had nothing to do with the effort. The goal of Butterfly, according to a 2017 company document, was to “destabilize and disrupt anti-Israel movements from within.”

[...]

Project Butterfly launched in February, 2016, and Psy-Group asked donors for $2.5 million for operations in 2017. Supporters were told that they were “investing in Israel’s future.” In some cases, a former company employee said, donors asked Psy-Group to target B.D.S. activists at universities where their sons and daughters studied.

[...]

A former company employee said that Benzeevi “appeared to like the idea that someone from Mossad would be on his side.” Before Benzeevi flew back to California, he was given the number of a bank account where he could wire Psy-Group the fee for the Tulare campaign—two hundred and thirty thousand dollars. On May 8th, [...the] project was set in motion, and its code name was changed from Mockingjay to Katniss, a reference to Katniss Everdeen, the protagonist in the “Hunger Games” novels.

[...]

In June of 2017, strange things began happening in Tulare. A series of ominous Web sites appeared: Tularespeaks.com, Tulareleaks.com, and Draintulareswamp.com. The sites directed visitors to articles that smeared Senovia Gutiérrez and her allies in the hospital-board fight.

[...]

The domain names appeared to be playing off themes from the 2016 Presidential campaign. [...] Along with the Web sites, online personae, who claimed to be local residents but whom nobody in town recognized, began posting comments on social media. Some of the messages suggested that Senovia took bribes. Others pointed to her Mexican background and her accent and questioned whether she was an American citizen.

[...]

Early on the evening of June 9th, a woman with short blond hair knocked on Senovia’s front door, and told Senovia’s adult son Richard, who answered, that she was a supporter of his mother’s campaign. The woman handed Richard an envelope that read “To: Mrs. Sanovia,” misspelling her name. Richard noticed that a man was standing across the street, next to a Yukon Denali S.U.V., taking photographs with a telephoto lens. Later that night, the S.U.V. returned to Senovia’s street, and the man took more photographs.

Some of the photographs soon appeared on Draintulareswamp.com, under the title “Who Is Pulling Senovia’s Strings?” [...] The photographs seemed designed to make it appear as if Senovia had taken a bribe.

[...]

Deanne Martin-Soares, one of the founders of Citizens for Hospital Accountability, said. “We couldn’t trace anything. We didn’t know where it was coming from.”

[...]

On June 15th, campaign flyers ridiculing Senovia for having “zero experience,” and directing residents who “want proof” to visit Tularespeaks.com, appeared on door handles around town. The small businessman who printed and distributed the flyers said that he had been paid in cash by a stranger who used the name Francesco Manoletti, which appears to be a made-up persona.

[...]

“It didn’t really hurt Senovia,” [a California campaign veteran named Michael] McKinney said. “It made it look like she was being harassed. It hurt Kumar. It backfired.”

[...]

On the eve of the election, Alex’s house burned down and he lost almost everything, including his final batch of campaign flyers. He suspected that the blaze could have been election-related, but local fire-department officials said that they saw no evidence of foul play.

[...]

Burstien hoped that Psy-Group’s work in Tulare would help the company land other small campaigns, but that proved overly optimistic. He told colleagues that he was close to finalizing several deals, but the new clients fell through, and, in February, 2018, Burstien found that he couldn’t make payroll.

Psy-Group’s financial woes coincided with sudden scrutiny from the F.B.I.

[...]

Psy-Group’s larger ambition was to break into the U.S. election market. During the 2016 Presidential race, the company pitched members of Donald Trump’s campaign team on its ability to influence the results. Psy-Group’s owner, Joel Zamel, even asked Newt Gingrich, the former House Speaker, to offer Zamel’s services to Jared Kushner, Trump’s son-in-law. The effort to drum up business included brash claims about the company’s skills in online deception. The posturing was intended to attract clients—but it also attracted the attention of the F.B.I. Robert Mueller.

[...]

The Bureau had taken an interest in George Nader for helping to organize a secretive meeting in the Seychelles ahead of Trump’s Inauguration, with the aim of creating an unofficial channel with Vladimir Putin.In January, 2018, F.B.I. agents stopped Nader, an American citizen, at Dulles International Airport and served him with a grand-jury subpoena. Nader agreed to coöperate, and told F.B.I. agents about his various dealings related to the Trump campaign, including his discussions with Zamel. (Nader has been granted immunity in exchange for testifying truthfully.)

[...]

The following month, F.B.I. agents served Zamel with a grand-jury subpoena. Agents also tracked down Burstien in the San Francisco area, where he was on a business trip. [...] The F.B.I. also visited Psy-Group’s so-called D.C. office, at the WeWork, and seized a laptop computer that had been hidden in a desk drawer, where it had been running continuously.

[...]

Psy-Group officials referred the F.B.I. to the letters they had received from law firms, attesting to the legality of their activities and telling the company that it didn’t need to register as a foreign agent. “The F.B.I. seemed genuinely surprised that this shit wasn’t illegal,” a former Psy-Group employee said.

[...]

Early in 2016, a Republican consultant with ties to the Israeli government put Psy-Group in touch with Rick Gates, a senior Trump campaign official. [...] In the proposal, dubbed Project Rome, which was first reported on by the Times, last October, Psy-Group used code names for the candidates: Trump was Lion, and Hillary Clinton was Forest. Psy-Group also hired the Washington law firm Covington & Burling to conduct a legal review of its work. Former Psy-Group officials said that the resulting memo gave a green light to begin offering the company’s services in the U.S.

[...]

In early May, 2016, Zamel sent an e-mail to Gingrich, saying that he could provide the Trump campaign with powerful tools that would use social media to advance Trump’s chances. Zamel suggested a meeting in Washington to discuss the matter further. Gingrich forwarded the e-mail to Jared Kushner and asked if the campaign would be interested. Kushner checked with others on the campaign, including Brad Parscale, who ran Web operations. According to a person familiar with the exchange, Parscale told Kushner that they didn’t need Zamel’s help. (A 2016 campaign official said, “We didn’t use their services.”)

Also that spring, Zamel was introduced to George Nader, a Lebanese-American with ties to the Emirati leader Mohammed bin Zayed and other powerful figures in the Gulf.

[...]

In June, 2016, Nader was attending an international economic forum in St. Petersburg, Russia, when Zamel approached him and requested a meeting. According to a representative for Nader, Zamel told Nader that he was trying to raise money for a social-media campaign in support of Trump; he thought that Nader’s Gulf contacts might be interested in contributing financially. Nader listened to Zamel’s pitch but didn’t make any commitments, according to the Nader representative. (Zamel’s representatives denied that he spoke to Nader in St. Petersburg about trying to help Trump.)

Zamel had another opportunity to pitch his services in early August, 2016, when Erik Prince, the founder of the Blackwater security firm, helped arrange a meeting at Trump Tower among Zamel, Nader, and Donald Trump, Jr.

[...]

Burstien said that his talks with the Trump campaign went nowhere; a representative for Zamel denied that his client engaged in any activity having to do with the election. But, according to the Nader representative, shortly after the election Zamel bragged to Nader that he had conducted a secret campaign that had been influential in Trump’s victory.

[...]

A representative for Zamel denied that he told Nader that he or any of his operatives had intervened to help Trump during the 2016 election. If Nader came away with that impression, the representative said, he was mistaken.

[...]

U.S. leaders were generally skeptical about the effectiveness of these kinds of operations.

[...]

Russian military and intelligence agencies, on the other hand, didn’t see information warfare as a sideshow. They invested in cyber weapons capable of paralyzing critical infrastructure, from utilities to banks, and refined the use of fake personae and fake news to fuel political and ethnic discord abroad.

[...]

The 2016 election changed the calculus. In the U.S., investigators pieced together how Russian operatives had carried out a scheme to promote their preferred candidate and to stoke divisions within U.S. society. Senior Israeli officials, like their American counterparts, had been dubious about the effectiveness of influence campaigns. Russia’s operation in the U.S. convinced Tamir Pardo, the former Mossad director, and others in Israel that they, too, had misjudged the threat. “It was the biggest Russian win ever. Without shooting one bullet, American society was torn apart,” Pardo said. “This is a weapon. We should find a way to control it, because it’s a ticking bomb. Otherwise, democracy is in trouble.”

[...]

In early 2017, as Trump took office, interest in Psy-Group’s services seemed to increase. Law firms, one former employee said, asked Psy-Group to “come back in and tell us again what you are doing, because we see this ability to affect decisions that we weren’t fully aware of.” Another former Psy-Group employee put it more bluntly: “The Trump campaign won this way. If the fucking President is doing it, why not us?”

To capitalize on this newfound interest, Burstien started making the rounds in Washington with a new PowerPoint presentation. [...] Titled “Donald Trump’s 2016 Presidential Campaign—Analysis,” the presentation outlined the role of Web sites, avatars, and bots in influencing the outcome of the election. In one case highlighted in the slide deck, pro-Trump avatars joined a Facebook page for Bernie Sanders supporters and then flooded it with links to anti-Hillary Clinton articles from Web sites that posted fake news, creating a hostile environment for real members of the group. “Bernie supporters had left our page in droves, depressed and disgusted by the venom,” the group’s administrator was quoted as saying. As part of the presentation, Burstien pointed out that Russian operatives had been caught meddling in the U.S.; Psy-Group, he told clients, was “more careful.”

Psy-Group’s post-election push into the U.S. market included a cocktail reception [part of Psy-Group’s campaign to shape perceptions about itself] on March 1, 2017. [...] The next day, an article in Politico briefly mentioned the gathering and described Psy-Group as a multinational company with “offices in London, Hong Kong and Cyprus.” There was no mention of Israel; Burstien thought it would be better for business to play down the Israel angle.

[...]

According to a former company official, Zamel decided to shut down Psy-Group in February, 2018, just as Mueller’s team began questioning employees. But its demise hasn’t suppressed the appetite for many of the services it provided. Some of Psy-Group’s former employees have met with Black Cube to discuss job opportunities. [...] Uzi Arad, a Mossad veteran and a former national-security adviser for Netanyahu, said that he was ashamed to see some of his former colleagues become “mercenaries for hire,” adding, “It’s highly immoral, and they should know it.”

[...]

Ram Ben-Barak, who helped woo Benzeevi on behalf of Psy-Group, said that he decided to leave the company after he learned about the extent of its operations in Tulare, which he objected to. Ben-Barak said that he regrets his decision to work with the firm. “When you leave the government and you leave Mossad, you don’t know how the real world works,” he said. “I made a mistake.” Ben-Barak, who is now running for a seat in Israel’s parliament, said that he believes new regulations are needed to stem the proliferation of avatars and misinformation. “This is the challenge of our time,” he said. “Everything is fake. It’s unbelievable.”
Believe it.

As for the Tulare hospital scam...
The hospital-board election resulted in a landslide—but not for Psy-Group’s client. There were more than a thousand ballots cast, and only a hundred and ninety-five people voted for Kumar to keep his seat. Senovia Gutiérrez won with seventy-five per cent of the vote.

[...]

After Senovia’s victory, Benzeevi’s contract was rescinded. [...] The hospital was more than thirty-six million dollars in debt, and had to close for nearly a year. (It reopened in October, 2018.)
The president of the United States is running his own psy-ops scam. Let's hope the electorate in 2020 is as wise as the citizens of Tulare.

...but hey, do what you want...you will anyway.

Tuesday, December 4, 2018

NRCC hacked

The House GOP campaign arm suffered a major hack during the 2018 election, exposing thousands of sensitive emails to an outside intruder, according to three senior party officials.

The email accounts of four senior aides at the National Republican Congressional Committee were surveilled for several months, the party officials said. The intrusion was detected in April by an NRCC vendor, who alerted the committee and its cybersecurity contractor. An internal investigation was initiated and the FBI was alerted to the attack, said the officials, who requested anonymity to discuss the incident.

However, senior House Republicans — including Speaker Paul Ryan (R-Wis.), House Majority Leader Kevin McCarthy (R-Calif.) and Majority Whip Steve Scalise (R-La.) — were not informed of the hack until POLITICO contacted the NRCC on Monday with questions about the episode. Rank-and-file House Republicans were not told, either.

  Politico
Nice.
Committee officials said they decided to withhold the information because they were intent on conducting their own investigation, and feared that revealing the hack would compromise efforts to find the culprit.
They couldn't trust the victims to keep mum?
Donor information was not compromised during the intrusion, the party officials said.
Right.
Yet the fact that the NRCC was hacked and withheld that information is likely to prove embarrassing at a time when Republicans are grappling with an election in which they lost 40 seats and control of the House. President Donald Trump has also claimed that Republicans are better than Democrats at cybersecurity, explaining why one party was hacked in 2016 but the other was not.

“The DNC should be ashamed of themselves for allowing themselves to be hacked. They had bad defenses, and they were able to be hacked,” Trump told CBS News in July. “I heard they were trying to hack the Republicans, too. But, and this may be wrong, but they had much stronger defenses.”
Not so much, eh? Maybe they weren't hacked because the Russians were after dirt on Hillary. But, hey, I don't see a problem. They can start blaming their losses on being hacked somehow.
Like other major committees, the NRCC also had security procedures in place before the election cycle began to try to limit the amount of information that could be exposed to a potential hacker. It also employed a full-time cybersecurity employee.

[...]

Party officials would not say when the hack began or who was behind it, although they privately believe it was a foreign agent due to the nature of the attack.
Russia again? As a reminder to Trump of who's boss?
In news that will surprise nobody, Defense Secretary James Mattis revealed that Russian President Vladimir Putin attempted to interfere in the 2018 midterm elections.

Speaking at the Reagan National Defense Forum in Simi Valley, California, on Saturday, Mattis claimed that Russia had again tried to “muck around” in America’s democratic process.

“There is no doubt the relationship has worsened,” Mattis said. “[Putin] tried again to muck around in our elections this last month, and we are seeing a continued effort along those lines.”

[...]

Mattis also called Putin a “slow learner” and “someone we simply cannot trust” in an interview with Fox News’s Bret Baier. (Putin is arguably a regular-speed learner, having been given little more than a slap on the wrist after interfering in 2016.)

  Vox
...but hey, do what you want...you will anyway.

UPDATE:

Wednesday, October 3, 2018

Meanwhile, in Muellerville

It seems the FBI has been investigating the Trump campaign since the primaries.
POLITICO first reported an online catfishing scheme targeting anti-Trump Republican operatives and the hacking of Jacobus’ emails in August 2016, and the FBI opened an investigation of the hack shortly thereafter. The episode was largely forgotten in the chaos of the presidential campaign.

[...]

The chain of events that triggered the initial FBI investigation dates to the spring of 2015.

[...]

Cheri Jacobus says she was subjected to a campaign of online harassment and sabotage after a public fight with the president and one of his top advisers.

Federal law enforcement officials have referred a 2-year-old email hacking investigation to special counsel Robert Mueller, according to the Republican operative who was the target of the hack.

[...]

The operative and Trump critic, Cheri Jacobus, told POLITICO that FBI agents in the bureau’s cyber division informed her in September that they had forwarded their investigation to Mueller because the matter came to exceed the bounds of computer intrusion, the crime that had been the initial focus of the investigation.

[...]

Jacobus said she has not had contact with Mueller’s team.

Jacobus alleges the hacking of her personal email account was part of a broader campaign of harassment and intimidation that followed critical comments she made about Trump during the 2016 Republican primaries. Jacobus, a political PR specialist, served as a source for a 2015 Washington Post investigation that forced a pro-Trump super PAC to shut down. She later sued Trump for defamation.

  Politico
In the spring of 2015, Jacobus was approached by the Trump campaign about serving as their communications director.
Though Jacobus entered talks with the campaign, the job never panned out. Jacobus said she told Dornan she was not interested. Another person with direct knowledge of the interactions said it was clear after two often-contentious interviews that the role was not a good fit.

Several months later, in October 2015, the Post quoted her saying that in conversations with Trump’s team that spring, campaign manager Corey Lewandowski disclosed plans for a pro-Trump super PAC. Lewandowski insisted to the Post that the Trump campaign had no ties to and did not sanction the group, Make America Great Again PAC. Days after the story, the PAC shut down.

In the fall of 2015, around the time she was quoted discussing Trump’s super PAC by the Post, Jacobus was contacted online by a person posing as a representative of deep-pocketed political donors. The person proceeded to conduct a bizarre, monthslong catfishing scheme that sought to obtain personal and political information from Jacobus and other anti-Trump Republican operatives during the Republican primary.

Posing as an English barrister with rich clients, the person struck up a chat with Jacobus on Twitter, exchanged private messages with her and raised the prospect of a large donation to fund an anti-Trump super PAC. [...] Jacobus received phone calls and emails from other fake personas who posed as associates of the barrister before discovering it was all a fraud.

[...]

[I]in the spring of 2016, Jacobus traced a website domain involved in the scheme to Steven Wessel, a notorious New York con man. At the time, Wessel was out on bail preparing to serve jail time for an unrelated fraud. After Jacobus brought the Wessel connection to the attention of prosecutors in the Southern District of New York, a judge sent Wessel to jail for violating the conditions of his bail, which forbade him from using the Internet.

[...]

In August 2016, four months after he was sent to jail — and as POLITICO was preparing to publish news of the catfishing scheme — Jacobus reported that that her personal email account had been hacked and its contents deleted.

[...]

During the 2016 primaries, Jacobus was a regular Fox News and CNN commentator, and she both praised and criticized Trump. One particularly critical segment drew the ire of Trump, who pronounced her a “dummy” on Twitter, as well as Lewandowski, who, like Trump, portrayed her as a disgruntled job-seeker.

Jacobus sued them for defamation in New York. As she feuded publicly with Trump, Jacobus was subjected to a sustained barrage of physical and sexual threats on social media. In January 2017, her defamation case was dismissed.

[...]

Following Trump’s election, Jacobus relayed additional incidents she considered suspicious to the agents investigating the hack.

[...]

On Sept. 10 of this year, an FBI agent wrote to Jacobus that he would be calling her, which is when, she said, the bureau informed her of the case’s referral to Mueller.

Jacobus said the agents instructed her to send any new information that arises to the special counsel’s office.
I wonder what in their investigation relates to the Russian probe.  Or maybe it's connected to some other aspect of Mueller's investigation that arose out of his investigation of Russian collusion with the Trump team.  They apparently made some link, or they wouldn't have turned over the investigation.

Thursday, August 16, 2018

Hackers?



...but hey, do what you want...you will anyway.

Saturday, July 28, 2018

We don't need no steenkeen election security



The White House statement released after Friday's meeting lacked details of any new security efforts.

"The President’s discussion with his NSC addressed threats posed to our elections from malign foreign actors, efforts underway to provide cybersecurity assistance to state and local authorities, and actions to investigate, prosecute, and hold accountable those who illegally attempt to interfere in our political and electoral processes," the White House statement said. "The Trump Administration will continue to provide the support necessary to the owners of elections systems — state and local governments — to secure their elections."

[...]

After nearly two years of calling Russian election interference a hoax and its investigation a witch hunt, President Donald Trump on Friday presided over the first National Security Council meeting devoted to defending American democracy from foreign manipulation.

"The President has made it clear that his administration will not tolerate foreign interference in our elections from any nation state or other malicious actors," the White House said in a statement afterward.

But current and former officials tell NBC News that 19 months into his presidency, there is no coherent Trump administration strategy to combat foreign election interference — and no single person or agency in charge.

[...]

To be sure, individual government agencies have responded in various ways. The Department of Homeland Security is working with states to improve cyber security in voting systems. The FBI created a "foreign influence task force," and the Justice Department announced a new policy his month to inform the public about bots and trolls on social media. The National Security Agency and U.S. Cyber Command are coordinating to counter Russian influence in cyberspace, the general in charge of those agencies has said.

But even members of Trump's national security cabinet have acknowledged the need for a central, unifying effort — one that experts say is missing. Senior officials have also admitted that the government has failed to take steps necessary to give the Russians second thoughts about intervening in American politics.

[...]

If any evidence was needed that the Russians haven't been deterred, a Democratic senator, Claire McCaskill of Missouri, said Thursday she was the target of an unsuccessful Russian hacking attempt. A Microsoft official says that company has also observed attempted Russian hacks against two other unnamed candidates.

[...]

Last week, House Republicans voted down a proposal by Democrats to increase election funding to states by $380 million.

  NBC
Of course they did.
The White House eliminated the job of cyber security coordinator on the National Security Council.
!

Actually, we may never have had any real election security.  Certainly at least since the introduction of electronic voting machines.  On the other hand - who was it who said, "It's not who votes that counts, but who counts the votes."

...but hey, do what you want...you will anyway.

Monday, July 23, 2018

Russia hacking our electric utilities

Hackers working for Russia claimed “hundreds of victims” last year in a giant and long-running campaign that put them inside the control rooms of U.S. electric utilities where they could have caused blackouts, federal officials said. They said the campaign likely is continuing.

  WSJ
But who cares, right? Besides, Putin told Trump they don't hack us.
The Russian hackers, who worked for a shadowy state-sponsored group previously identified as Dragonfly or Energetic Bear, broke into supposedly secure, “air-gapped” or isolated networks owned by utilities with relative ease by first penetrating the networks of key vendors who had trusted relationships with the power companies, said officials at the Department of Homeland Security.

“They got to the point where they could have thrown switches” and disrupted power flows, said Jonathan Homer, chief of industrial-control-system analysis for DHS.
So why didn't they?
“They’ve been intruding into our networks and are positioning themselves for a limited or widespread attack,” said Michael Carpenter, former deputy assistant secretary of defense, who now is a senior director at the Penn Biden Center at the University of Pennsylvania. “They are waging a covert war on the West.”

[...]

DHS is conducting the briefings—four are planned—hoping for more industry cooperation. One thing the agency is trying to learn is whether there are new infections, and whether the Russians have figured out ways to defeat security enhancements like multifactor authentication.

In addition, DHS is looking for evidence that the Russians are automating their attacks, which investigators worry could presage a large increase in hacking efforts.
And that's why we need to spend more on military, right?

Saturday, July 21, 2018

Hey! THERE's an idea

The Justice Department plans to alert the public to foreign operations targeting U.S. democracy under a new policy designed to counter hacking and disinformation campaigns such as the one Russia undertook in 2016 to disrupt the presidential election.

The government will inform American companies, private organizations and individuals that they are being covertly attacked by foreign actors attempting to affect elections or the political process.

“Exposing schemes to the public is an important way to neutralize them,” said Deputy Attorney General Rod J. Rosenstein, who announced the policy at the Aspen Security Forum in Colorado.

  WaPo
The same conference where Dan Coates made fun of Trump's invitation to bring Putin to Washington.
The Obama administration struggled in 2016 to decide whether and when to disclose the existence of the Russian intervention, fearing that without GOP participation it would be portrayed as a partisan move. Concerns about appearing to favor the Democratic presidential nominee, Hillary Clinton, weighed on President Barack Obama, who was reluctant to give then-GOP-nominee Donald Trump ammunition for his accusation that the election was rigged.

“If this disclosure requirement had been around in 2016, I firmly believe that it would have served as a meaningful deterrent after Russia’s interference was first discovered, and it would have informed voters more quickly and more forcefully that a foreign government was trying to affect their vote,” said Rep. Adam B. Schiff (D-Calif.), who two years ago pressed the Obama administration to call out Russia’s activities.
Historians will be discussing that - and Comey's fateful decisions - for decades, if not centuries. Assuming humans still exist centuries from now.
“It’s absolutely crucial that the intelligence community lean forward, push the envelope on sharing as much of that information as possible, because one of the biggest challenges we have is on education of the public, of the electorate, on foreign, read Russian- influence operations,” said former director of national intelligence James R. Clapper Jr., who last year at Aspen called for such transparency.

[...]

At the Aspen Forum on Thursday, a Microsoft executive said that Russian military intelligence, known as the GRU, has targeted at least three candidates running for election this year. Tom Burt, the company’s vice president for customer security and trust, said that his team had discovered a spear-phishing campaign targeting the candidates.
And....who might they be? Are we going to be told these things or not?
Rosenstein noted that influence operations are not new. The Soviet Union used them against the United States throughout the 20th century, including in 1963, paying an American to distribute a book claiming that the FBI and the CIA assassinated President John F. Kennedy.
Well that's just silly. It was the mob and the CIA.

When the drones start themselves

I missed this story from 2011. I wonder how things have advanced since then.
Camp Lemonnier [in Djibouti], a sun-baked Third World outpost established by the French Foreign Legion, began as a temporary staging ground for U.S. Marines looking for a foothold in the region a decade ago. Over the past two years, the U.S. military has clandestinely transformed it into the busiest Predator drone base outside the Afghan war zone, a model for fighting a new generation of terrorist groups.

[...]

For the past decade, the Pentagon has labeled Lemonnier an “expeditionary,” or temporary, camp. But it is now hardening into the U.S. military’s first permanent drone war base.

  WaPo
Don't they all start that way? This is only temporary.
Around the clock, about 16 times a day, [US] drones take off or land [...] here, the combat hub for the Obama administration’s counterterrorism wars in the Horn of Africa and the Middle East.

Some of the unmanned aircraft are bound for Somalia, the collapsed state whose border lies just 10 miles to the southeast. Most of the armed drones, however, veer north across the Gulf of Aden to Yemen

[...]

After a Post reporter showed up in Djibouti uninvited, the camp’s highest-ranking commander consented to an interview — on the condition that it take place away from the base, at Djibouti's lone luxury hotel. The commander, Army Maj. Gen. Ralph O. Baker, answered some general queries but declined to comment on drone operations or missions related to Somalia or Yemen.

[...]

Taken together, the previously undisclosed documents show how the Djibouti-based drone wars sharply escalated [...] after eight Predators arrived at Lemonnier. The records also chronicle the Pentagon’s ambitious plan to further intensify drone operations here.

[...]

About 300 Special Operations personnel plan raids and coordinate drone flights from inside a high-security compound at Lemonnier that is dotted with satellite dishes and ringed by concertina wire. Most of the commandos work incognito, concealing their names even from conventional troops on the base.

[...]

In Washington, the Obama administration has taken a series of steps to sustain the drone campaign for another decade, developing an elaborate new targeting database, called the “disposition matrix,” and a classified “playbook” to spell out how decisions on targeted killing are made.

[...]

The U.S. military also flies drones from small civilian airports in Ethiopia and the Seychelles, but those operations pale in comparison to what is unfolding in Djibouti.

[...]

Lemonnier also has become a hub for conventional aircraft. In October 2011, the military boosted the airpower at the base by deploying a squadron of F-15E Strike Eagle fighter jets, which can fly faster and carry more munitions than Predators.

[...]

Predator drones in particular are more prone to mishaps than manned aircraft, Air Force statistics show. But the accidents rarely draw public attention because there are no pilots or passengers.
Now we're getting to the nitty gritty of why the drones are so popular among US military and political players.

But the following doesn't get public attention, either:
As the pace of drone operations has intensified in Djibouti, Air Force mechanics have reported mysterious incidents in which the airborne robots went haywire.

In March 2011, a Predator parked at the camp started its engine without any human direction, even though the ignition had been turned off and the fuel lines closed.
You read that right.
Technicians concluded that a software bug had infected the “brains” of the drone, but never pinpointed the problem.
Whose software? Was the software hacked? Installed surreptitiously? Are there any Russian fingerprints?
“After that whole starting-itself incident, we were fairly wary of the aircraft and watched it pretty closely,” an unnamed Air Force squadron commander testified to an investigative board, according to a transcript. “Right now, I still think the software is not good.”
It might not even be a good idea.
[O]n May 7, 2011, a drone carrying a Hellfire missile had an electrical malfunction shortly after it entered Yemeni airspace, according to an Air Force investigative report. The Predator turned back toward Djibouti. About one mile offshore, it rolled uncontrollably to the right, then back to the left before flipping belly up and hurtling into the sea.

“I’ve never seen a Predator do that before in my life, except in videos of other crashes,” a sensor operator from the ground crew told investigators, according to a transcript. “I’m just glad we landed it in the ocean and not someplace else.”
It doesn't sound like "we" landed it anywhere.
[A]s far as the U.S. military is concerned, [Djibouti]'s strategic value is unparalleled. Sandwiched between East Africa and the Arabian Peninsula, Camp Lemonnier enables U.S. aircraft to reach hot spots such as Yemen or Somalia in minutes. Djibouti’s port also offers easy access to the Indian Ocean and the Red Sea.
But who's running the drones?
The remote-control drones in Djibouti are flown, via satellite link, by pilots 8,000 miles away in the United States, sitting at consoles in air-conditioned quarters at Creech Air Force Base in Nevada and Cannon Air Force Base in New Mexico.
Maybe.

h/t Matt Taibbi

Saturday, July 14, 2018

Election hacking


I'm assuming the oligarch hid his identity. 



I don't remember that and can't find any report of it.  Doesn't mean he didn't say it.  Either way, he didn't get near it.  Hillary took Maryland by 60% to Trump's 35%. 

What other states haven't told us yet that they were hacked or interfered with in some fashion?



It certainly does.

And it has. How about the very voting machinery?  Sometime for fun read Greg Palast's The Best Democracy Money Can Buy about the 2000 election.

...but hey, do what you want...you will anyway.

Tuesday, April 17, 2018

IRS website down



Don't even try to convince me that somebody didn't hack the website.  "Computer malfunction," my ass.  They've only got one computer to rely on?

And when did tax day change from April 15?

...but hey, do what you want...you will anyway.

Wednesday, March 28, 2018

Meanwhile, some crazy cyber shit is happening



I thought it was because of the proximity to a naval base, but did I not say at the time that it seemed silly considering the fact that so much attacking these days goes on through cyberspace?  Why yes, I believe I did.
Why Seattle? Is it the Russian consulate in the US closest to Russia? Can they see Russia from their front porch? 

The officials said that the closure of the consulate in Seattle was ordered because of its proximity to a U.S. naval base.
[...]
“Today’s actions make the United States safer by reducing Russia’s ability to spy on Americans and to conduct covert operations that threaten America’s national security,” the White House said in a statement.
Except spying in the age of cyber hacking seems to be the currently preferred method. They can do that from anywhere.

  YWA
Anyway, Boeing headquarters is indeed in Seattle.
Boeing was hit by the WannaCry computer virus Wednesday, initially raising fears within the company that airplane production could be affected. Later Boeing played down the impact and called it a “limited intrusion” with production unaffected.

[...]

After the cyberattack struck, Mike VanderWel, chief engineer at Boeing Commercial Airplane production engineering, sent out an alarming memo calling for “All hands on deck.”

“It is metastasizing rapidly out of North Charleston and I just heard 777 (automated spar assembly tools) may have gone down,” VanderWel wrote, adding his concern that the virus could hit equipment used in functional tests of airplanes ready to roll out and potentially “spread to airplane software.”

Late Wednesday afternoon, however, Boeing issued a statement dialing back those fears.

“Our cybersecurity operations center detected a limited intrusion of malware that affected a small number of systems,” Boeing said. “Remediations were applied and this is not a production and delivery issue.”

  Seattle Times
But they would, wouldn't they?
The WannaCry virus, which exploits a flaw in Windows software to gain access to a network, attacks computers using “ransomware.”

It was designed to lock users out of their data by encrypting files until they pay a fee, sometimes in cryptocurrency, or other type of ransom.

Ransomware attacks have increased in recent years. The city of Atlanta experienced a five-day ransomware attack that was mostly fixed by Tuesday.

[...]

Jake Williams, founder of cybersecurity consultancy Rendition Infosec, said the ransomware part of the WannaCry virus is broken and there’s actually no way to pay a ransom that will retrieve files once encrypted.

[...]

Microsoft issued patches to plug the vulnerability [after worldwide attacks by the virus in May 2017]. However, Corey Nachreiner, chief technology officer of Seattle security technology firm WatchGuard Technologies, said some companies with specialized equipment don’t update very often for fear their custom-built systems will be in danger.

[...]

Mitchell Edwards, a Dallas, Texas-based cyberthreat intelligence analyst, said that although a so-called “kill switch” fix for the WannaCry virus was quickly developed, other hackers were also quick to produce WannaCry variants that could defeat the fix.

He said the virus used to attack Boeing was unlikely to be the original WannaCry virus but an updated version.

[...]

He said the virus is unlikely to have had a big impact on production.

“Obviously, Boeing isn’t going to be running its entire production network on Windows,” he said. “I hope not. So it’s likely a limited infection.”
"I hope not."
Williams of Rendition Infosec was less optimistic about that.

He said he knows of three manufacturing companies, two of them now his clients in the U.S., that suffered production stoppages due to WannaCry infections in the last six months.

He said one plant was down for 24 hours, another for 96 hours. In both cases, configuration files that controlled machines were lost and systems had to be re-installed from scratch before production could restart.

[...]

“Tons of manufacturing equipment runs on Windows. I was surprised,” said Williams.

[...]

Once the Boeing cyberattack news broke, some on social media raised the “nightmare scenario” of the virus infecting an airplane’s control software and possibly triggering a ransomware demand while in the air.

Edwards dismissed this as “hysteria.” Nachreiner and Williams agreed.

“I don’t think that’s realistic,” said Williams. “I don’t think any of Boeing’s planes or any aircraft anywhere run Embedded Windows. It’s not suitable for applications that require consistent, real-time availability without delay because lives depend on it.”
I hope not.


Must be that infrastructure week Trump's always talking about.

P.S.:
The consulate in Seattle is being shuttered because of its proximity to a U.S. submarine base and Boeing's operations there, a senior administration official said. The consulate must close by April 2.

  NPR
...but hey, do what you want...you will anyway.