August 1, 2016
Remember that movie war games? Cyber wars, civil wars, real big wars, all happening simultaneously. The Justice Department’s top national security official says the most successful tools the federal government has employed so far have been legal ones. If you believe that then I am Bernie Sanders.
Cyberattacks may be invisible, but every day our countries face attacks in cyber-space. Nato is adapting to this increasing threat. I want to know how. No solid information yet. I bet it would be really stupid of them to let me know anyway. Before we get into the cyber fun, this also happened today that you probably didn’t hear about:
The United States announced that it launched multiple airstrikes against Islamic State militants in Libya today, August 1st, forcefully attacked the group at the request of the United Nations-backed government, Libyan and U.S. officials said. That’s a few more chalked up obamabombs for our Nobel PEACE Prize winner President. Don’t even ask how many died. GO HERE
On that same site me and Larry found an article of a whistle blower from the NSA. Larry wrote some stuff on that nice guy Mr. William Binney, a former architect of the NSA’s surveillance program with 30 years in the Agency.
Hack Attacks. Say that fast 10 times
Hillary’s Camp: From Reuters:
A Clinton campaign spokesman said in a statement late on Friday that an analytics data program maintained by the DNC and used by the campaign and a number of other entities “was accessed as part of the DNC hack.”
… a campaign official said hackers had access to the analytics program’s server for approximately five days. The analytics data program is one of many systems the campaign accesses to conduct voter analysis, and does not include social security numbers or credit card numbers, the official said.
They released exclusive information about a new hack on Clinton’s campaign Network in a broad cyber attack by Russia of course. You believe that? The Clinton campaign and her control over the media wants to tell you this to make Trump’s “relationship” with Russia look bad. There is no “relationship”. They don’t chill over Vodka at a Roulette table in one of his failed Casinos. Putin once called him “bright”. I call bullshit. In the same report:
Russian officials could not be immediately reached for comment. U.S. officials said the Obama administration has avoided publicly attributing the attacks to Russia as that might undermine Secretary of State John Kerry’s effort to win Russian cooperation in the war on Islamic State in Syria. I consider that at least Diplomacy. Hillary’s move to call out “Russia” is just as lame as we noticed the DNC trying to use Bernie’s “Jewish-blooded Atheism” against him. Seriously below the belt and he isn’t even Atheist. See the lies here? Good.
Guess what happened then?
From the BBC:
- A “cyber-spying virus” was found in the networks of about 20 organizations, the Federal Security Service (FSB) said.
- The report comes as Russia stands accused over data breaches involving the Democratic Party in the US.
- The Russian government has denied involvement and has denounced the “poisonous anti-Russian” rhetoric coming out of Washington.
- The FSB did not say who it believed was responsible for hacking Russian networks, but said the latest hack resembled “much-spoken-about” cyber-spying, without elaborating.
My 2 cents? I think they are adding more reasons that don’t exist, a-la George Dabbel-U, so give further reason to attack Russia. If you have really been reading my WWIII reports, you’ll know why I have reason to think this.
The DNC: From Zero Hedge:
When asked if the U.S. and Russia and in a state of Cyber War Rajesh De, former general counsel at the NSA, said that if the NSA is targeting the Russian groups, it could be doing it under its normal foreign intelligence authorities, as the Russian government is “clearly… a valid intelligence target.”
The more-open attitude toward intelligence about cyber actors has not extended to the case of the emails that were stolen from the Democratic National Committee and then posted to WikiLeaks a week ago. None of the government officials who spoke at Aspen last week were willing to publicly ascribe the hack to Russia.
After the release, Clinton’s campaign accused Russia of meddling in the 2016 election campaign. Despite lacking any proof to substantiate their claims, a number of US media outlets picked up the ball and repeated the accusations, claiming Russians had hacked into the DNC’s computer servers and leaked emails to WikiLeaks in order to help the Donald Trump campaign.
Robert Joyce, chief of the NSA’s shadowy Tailored Access Operations, didn’t want to talk about the hack of the DNC but admitted that the NSA has the skills, tools and legal authority to reverse hack alleged hackers organizations to get their hands on Intel.
She did say to ABC News:
“In terms of the foreign intelligence mission, one of the things we have to do is try to understand who did a breach, who is responsible for a breach, So we will use the NSA’s authorities to pursue foreign intelligence to try to get back into that collection, to understand who did it and get the attribution. That’s hard work, but that’s one of the responsibilities we have.”
Guess who else had information for us.
China, North Korea and the U.S. made an agreement last year but….
In May 2014, Justice obtained criminal indictments against five members of China’s People’s Liberation Army for allegedly hacking into systems operated by U.S. nuclear, solar and metal firms. While the prosecutions were derided in some circles as meaningless since there is almost no chance of the PLA officers in the notorious Unit 61398 ever being hauled before a U.S. judge, John Carlin, the assistant attorney general for national security, said the charges were an important turning point in defining what cyber activity is acceptable under international law. “That changed China,” Carlin told the recent annual Aspen Security Forum in Colorado. He also cited the government’s involvement in the December 2014 North Korean hacking case involving Sony Pictures as a pivot point in the government’s handling of nation-sponsored cyber attacks.
Carlin also said “Imagine today that you’re a company that sees a low-level hacker going through your systems and threatening to extort you by releasing personally-identifiable information, and you kick them off your systems without thinking much about it. In the vast majority of cases, companies don’t report that,” he said. “In one case, we had a company that did report it to us, and the person on the other side of the keyboard turned out to be an extremist who provided that personally-identifiable information to Junaid Hussain, who was one of the most notorious cyber terrorists in the world and who was using that information to create kill lists for his followers. I think any company, if they knew that it was a terrorist on the other side of the keyboard, they would report it. The problem is, you don’t.”
Also last year, Obama said the possibility of sanctions against individuals or entities remains on the table.
“We will apply those, and whatever other tools we have in our tool kit, to go after cybercriminals either retrospectively or prospectively”
The agreement to clamp down on the theft of trade secrets doesn’t address the theft of national security information, such as the tens of millions of U.S. federal personnel records that American lawmakers and some U.S. officials have said was engineered by Beijing. Obama has declined to publicly assign blame to China for that breach.