Showing posts with label Cyberterrorism. Show all posts
Showing posts with label Cyberterrorism. Show all posts

Tuesday, March 7, 2017

Massive WikiLeaks C.I.A. Hacking Dump Reveals Spy Secrets, Possible Espionage on Americans (VIDEO)

I just don't know what to think anymore.

Absolutely nothing is safe these days from cyberhacking, and what's worse, the C.I.A. may well have been involved in domestic espionage, which is prohibited by statute. Either that, or other operators using the same technology.

In any case, at the New York Times, "WikiLeaks Releases Trove of Alleged C.I.A. Hacking Documents":
WASHINGTON — WikiLeaks on Tuesday released thousands of documents that it said described sophisticated software tools used by the Central Intelligence Agency to break into smartphones, computers and even Internet-connected televisions.

If the documents are authentic, as appeared likely at first review, the release would be the latest coup for the anti-secrecy organization and a serious blow to the C.I.A., which maintains its own hacking capabilities to be used for espionage.

The initial release, which WikiLeaks said was only the first part of the document collection, included 7,818 web pages with 943 attachments, the group said. The entire archive of C.I.A. material consists of several hundred million lines of computer code, it said.

Among other disclosures that, if confirmed, would rock the technology world, the WikiLeaks release said that the C.I.A. and allied intelligence services had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

The source of the documents was not named. WikiLeaks said the documents, which it called Vault 7, had been “circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

WikiLeaks said the source, in a statement, set out policy questions that “urgently need to be debated in public, including whether the C.I.A.’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency.” The source, the group said, “wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.”

The documents, from the C.I.A’s Center for Cyber Intelligence, are dated from 2013 to 2016, and WikiLeaks described them as “the largest ever publication of confidential documents on the agency.” One former intelligence officer who briefly reviewed the documents on Tuesday morning said some of the code names for C.I.A. programs, an organization chart and the description of a C.I.A. hacking base appeared to be genuine.

A C.I.A. spokesman, Dean Boyd, said, “We do not comment on the authenticity or content of purported intelligence documents.”

WikiLeaks, which has sometimes been accused of recklessly leaking information that could do harm, said it had redacted names and other identifying information from the collection. It said it was not releasing the computer code for actual, usable cyberweapons “until a consensus emerges on the technical and political nature of the C.I.A.’s program and how such ‘weapons’ should be analyzed, disarmed and published.”

Some of the details of the C.I.A. programs might have come from the plot of a spy novel for the cyberage, revealing numerous highly classified — and in some cases, exotic — hacking programs. One, code-named Weeping Angel, uses Samsung “smart” televisions as covert listening devices. According to the WikiLeaks news release, even when it appears to be turned off, the television “operates as a bug, recording conversations in the room and sending them over the internet to a covert C.I.A. server.”

The release said the program was developed in cooperation with British intelligence...
Keep reading.

And watch, at CNN:



Tuesday, November 29, 2016

Barrett Brown Released

Heh.

At the Other McCain, "Notoriously Crazy Felon Barrett Brown Has Been Released From Federal Prison."

I tweeted earlier:


Tuesday, November 8, 2016

Crystal Ball's Final Projection: Clinton 322, Trump 216

At Sabato's Crystal Ball, "Our Final 2016 Picks: Clinton 322, Trump 216; 50-50 Senate; GOP holds House":

Despite some wobbles along the way, we’ve favored Hillary Clinton as the 45th president of the United States ever since we did our first handicapping of the Clinton vs. Donald Trump matchup back in late March. The edge we had for her back then has eroded a little bit at the end — we had her as high as 352 electoral votes, and in the final tally we have her down to 322, with 216 for Trump. If this is how it turns out, Trump will fare 10 electoral votes better than Mitt Romney, and Clinton will do 10 electoral votes worse than Barack Obama in 2012 — 11 or 12 if rogue Washington electors follow through on their threat to refuse to vote for Clinton (but we can’t assume that at this time).

The two closest states here are North Carolina and Ohio. For a long time, it appeared that Florida was a shakier state for Clinton than the Tar Heel State, but our sources indicate that the Sunshine State looks somewhat brighter for her now, although both should be tight. Meanwhile, Ohio may be a real Toss-up state. Buckeye history and demography point to Trump, but Clinton’s ground operation could come through for her in the end. If Ohio does vote for Trump while he is losing the White House, it will be just the third time in 31 elections that Ohio will have voted for the loser. We’re picking that to happen, but if Clinton gets any benefit out of James Comey’s final (?) intervention into campaign 2016, it may be that it generates a tiny bounce that allows her to leapfrog Trump in the Buckeye State. Arizona and Iowa seem like heavier lifts for Clinton but her campaign still holds out hope in both. Ultimately, we think North Carolina and Ohio are the hardest calls in the Electoral College, so we think it makes the most sense to just split them.

The buzz in the final days has been about a late Trump play in Michigan. He will likely eat into traditional Democratic margins there, but remember that Barack Obama won the state by nearly 10 points in 2012 (450,000 votes). Trump’s climb there is steep, but out of an abundance of caution we’re moving the state from Likely Democratic to Leans Democratic. We’re doing the same thing in New Hampshire, where some polls were close last week (although many operatives do not believe the state is tied), and Pennsylvania, two states (like Michigan) that have very little early voting. Clinton is focusing on these states at the end, too, and with good reason. If Trump pulls an upset, it’ll probably be because he narrowly fought off Clinton in Florida and North Carolina and managed to spring a shocker or two in the Rust Belt.

Florida may tell us a lot about whether we’re going to have a long night or a short one. About two-thirds of voters will likely have cast their ballots early, so the vote count should not take that long. If Clinton wins the state by two or three points and is declared the victor early on, it’ll be hard to find a plausible path to Trump victory. If Trump captures the state, though, then we’ll have to see if her firewall states, like the aforementioned states of Michigan, New Hampshire, and Pennsylvania, as well as Colorado, Nevada, and Virginia, come through for her.

In the prognostication business, what you predict at the end — when the drift of the year is usually fairly clear — is less significant than what you predict months before, at a time when the future is foggy. Starting in March, we have released a total of 17 Electoral College maps in the Clinton-Trump race. Not even on Clinton’s worst campaign days did we ever have her below 270 electoral votes...
Keep reading for the rest of the picks.

They're really good over there at Crystal Ball, and frankly I've been looking at the final polls this week and it all seems just too tight for Trump. I'm going to be sad, but I don't think he's going to pull it out.

But, we won't know until the people cast their ballots, so check back tonight.

PREVIOUSLY: "Donald Trump’s Narrow Path."

Monday, November 7, 2016

The 'Unskewed Polls' of 2016

We've seen this movie before.

Back in 2012, a bunch of conservatives became fixated on some obscure website called "Unskewed Polls," which adjusted that year's election polling correcting for partisan composition, and so forth.

The results were spectacularly wrong. That is, most of the polling in 2012 was accurate. Indeed, Gallup quit doing presidential horse race polling this year because it botched its surveys four years ago, especially its prediction of Romney winning the popular vote.

I'm not going down that rabbit hole again.

I've already scheduled a post for tomorrow morning, linking Sabato's Crystal Ball, which has Hillary Clinton winning with 322 electors. Perhaps she won't do that well. It's just that based on current polling, Donald Trump falls well short of the 270 electors needed to pull off an upset.

He'd need to win Florida, Iowa, Nevada, New Hampshire, North Carolina, and Ohio to get 269, according to the Wall Street Journal. He'd need to pick up one more state to go over the top, perhaps Colorado.

 We'll see, in any case.

Meanwhile, here's this year's "Unskewed Polls," at Gateway Pundit (don't get too excited).

See, "Here’s Why THE POLLS ARE WRONG=> Trump Will WIN IN A LANDSLIDE! (POLLS)."


Unskewed Polls 2016 photo ec-map-2-575x323_zpskclcwph4.jpg

I'd love for tomorrow map to turn out like this, although I'm realistic.

I mean, c'mon, they've even got Trump winning the Keystone State. I'm just a wee bit skeptical.

Donald Trump’s Narrow Path

I really don't see an Electoral College path, but that's me.

He's going to need to sweep up all the states Mitt Romney won in 2012, and then take back a few that Obama won, like Iowa and Colorado, not to mention Florida and Ohio.

At WSJ, "Donald Trump’s Path to Victory Is Narrow":
PHILADELPHIA — After months of campaigning, the presidential race has come down to this: Democrat Hillary Clinton has several apparent paths to the White House, while Republican Donald Trump must all-but sweep the battlegrounds where the race has centered, and will likely need at least one Democratic-leaning state, too.

For Mrs. Clinton, victory would require her winning one or two of the most contested states, if she can hold on to those that have long favored Democratic nominees. Mr. Trump has said he has a shot at those Democratic-leaning states, which include Michigan, Pennsylvania, Wisconsin, Minnesota and New Mexico. Yet polls in each show Mrs. Clinton ahead.

Nationally, a Wall Street Journal/NBC News poll released Sunday found Mrs. Clinton leading Mr. Trump by 4 points among likely voters as the two nominees head into their final day of campaigning before Tuesday’s election.

For Mr. Trump to win, he must finish ahead of Mrs. Clinton in the battleground states of Florida, Ohio and, in most calculations, North Carolina, analysts from both parties said. His path to victory, far narrower than Mrs. Clinton’s, also likely requires a win in at least one state that has long been in the Democratic column.

“He has to run the table,” said Russ Schriefer, a strategist for Republican Mitt Romney’s 2012 campaign.

Mr. Trump’s chances are dim unless he can wrest away a state such as Michigan or Pennsylvania, where he campaigned Sunday, places that haven’t voted Republican in presidential races since 1988. Looking to shore up Mrs. Clinton’s base, her campaign added stops in both states Monday and began TV ads in Michigan, where polls have shown the race tightening.

Mr. Trump on Sunday followed a campaign schedule that outlined a possible path to victory—cutting through Midwestern and mid-Atlantic states, regions rich in the working-class, white voters who help form his base of support. He campaigned in Iowa, Minnesota, Michigan and Pennsylvania, each of which has a largely white voter pool that could boost his chances.

He also appeared in Virginia, a state where the Clinton campaign is so confident that Mrs. Clinton last campaigned there in July.

Democrats begin with an advantage in the hunt for the 270 Electoral College votes required to win. In every election since 2000, they have won states that account for 242 electoral votes; Republicans have won states that total 179 in the same period. The GOP, however, gets to a starting tally of 190 by adding Indiana, which backed Barack Obama in 2008 but has since shifted reliably Republican.

“The map naturally has a blue tilt to it simply because there’s a history of these states voting Democratic,” said Neil Newhouse, a Republican strategist and pollster. “Simply because of that, she starts on our 40-yard line.”

Mr. Trump is testing the proposition that a Republican can win with an economic message in the industrial Midwest, where states remain largely white.

“We’re going into what they used to call Democrat strongholds where we’re now either tied or ahead,” Mr. Trump said at a rally Saturday. “We’re doing well in places that they don’t believe.”

Beyond his Midwest strategy, Mr. Trump could also win by carrying a large set of battleground states where polls show him within striking distance or ahead: Florida, Ohio, North Carolina, Iowa, Nevada and New Hampshire. That combination of victories would produce a 269-269 Electoral College tie...
Well, that's all we need, an Electoral College tie. The election would go to the House, where Trump would likely win. Talk about Democrats blowing through the roof. It'll be worse than 2000.

But keep reading.

The Cyberwarfare Election

I was already thinking about this, as I was considering how I was going to analyze the 2016 election in my upcoming classes.

It's not just cyberwarfare as a political issue, but also a factor impinging directly on the campaigns, such as all the WikiLeaks revelations and accusations of Russian political influence.

In any case, the New York Times, "Under the Din of the Presidential Race Lies a Once and Future Threat: Cyberwarfare":
MANCHESTER, N.H. — The 2016 presidential race will be remembered for many ugly moments, but the most lasting historical marker may be one that neither voters nor American intelligence agencies saw coming: It is the first time that a foreign power has unleashed cyberweapons to disrupt, or perhaps influence, a United States election.

And there is a foreboding sense that, in elections to come, there is no turning back.

The steady drumbeat of allegations of Russian troublemaking — leaks from stolen emails and probes of election-system defenses — has continued through the campaign’s last days. These intrusions, current and former administration officials agree, will embolden other American adversaries, which have been given a vivid demonstration that, when used with some subtlety, their growing digital arsenals can be particularly damaging in the frenzy of a democratic election.

“Most of the biggest stories of this election cycle have had a cybercomponent to them — or the use of information warfare techniques that the Russians, in particular, honed over decades,” said David Rothkopf, the chief executive and editor of Foreign Policy, who has written two histories of the National Security Council. “From stolen emails, to WikiLeaks, to the hacking of the N.S.A.’s tools, and even the debate about how much of this the Russians are responsible for, it’s dominated in a way that we haven’t seen in any prior election.”

The magnitude of this shift has gone largely unrecognized in the cacophony of a campaign dominated by charges of groping and pay-for-play access. Yet the lessons have ranged from the intensely personal to the geostrategic...
Keep reading.

Friday, October 21, 2016

East Coast Hacking Vendetta

I blogged this morning and logged onto Twitter no problem, but then not too long later no dice.

I couldn't access the site, and I saw the news of the massive DDoS attack.

And now, at Bloomnberg, "The Possible Vendetta Behind the East Coast Web Slowdown" (via Memeorandum):
Millions of internet users lost access to some of the world’s most popular websites Friday, as hackers hammered servers along the U.S. East Coast with phony traffic until they crashed, then moved westward.
A global attack on one provider of Domain Name System services, Dyn Inc., took down sites including Twitter, Spotify, Reddit, CNN, Etsy and The New York Times for long stretches of time -- from New York to Los Angeles.

Kyle York, chief strategy officer of Dyn, said the hackers launched a so-called distributed denial-of-service (DDoS) attack using “tens of millions” of malware-infected devices connected to the internet. Speaking during a conference call Friday afternoon, York said Dyn was “actively” dealing with a “third wave” of the attack.

By Friday evening, Dyn said it had stopped the hacks. "As you can imagine it has been a crazy day," Dyn spokesman Adam Coughlin wrote in an e-mail. "At this moment (knock on wood) service has been restored."

Security professionals have been anticipating a rise in attacks coming from malware that targets the "Internet of Things," a new breed of small gadgets that are connected to the internet. That was after a hacker released software code that powers such malware, called Mirai, several weeks ago.

Gillian M. Christensen, a spokeswoman for the Department of Homeland Security, said the agency and the FBI are aware of the incidents and “investigating all potential causes.”
Keep reading.

How Russia Pulled Off the Biggest Election Hack in U.S. History

This is pretty intense, although for all the claims of Russia cyber-spying and hacking, I've yet to see what I consider rock-hard evidence. It's all technical and circumstantial. It's weird, frankly.

See Esquire, "Russia Hackers to Blame for Wikileaks Emails - Proof Vladmir Putin Was Behind the Clinton Email Hack."

Just read it at the link:



Sunday, September 25, 2016

The Silencing of KrebsOnSecurity

On Techmeme earlier, "Brian Krebs' site hit by record 620Gbps sustained DDos attack, nearly twice as big as any previous attack seen by Akamai..."

Up now, "The Democratization of Censorship: As insecure IoT devices make large-scale DDoS attacks more potent, the Internet community should work to adopt standards and tools to prevent these attacks..."

And at Ars Technica, "Why the silencing of KrebsOnSecurity opens a troubling chapter for the ‘Net":
For the better part of a day, KrebsOnSecurity, arguably the world's most intrepid source of security news, has been silenced, presumably by a handful of individuals who didn't like a recent series of exposés reporter Brian Krebs wrote. The incident, and the record-breaking data assault that brought it on, open a troubling new chapter in the short history of the Internet.

The crippling distributed denial-of-service attacks started shortly after Krebs published stories stemming from the hack of a DDoS-for-hire service known as vDOS. The first article analyzed leaked data that identified some of the previously anonymous people closely tied to vDOS. It documented how they took in more than $600,000 in two years by knocking other sites offline. A few days later, Krebs ran a follow-up piece detailing the arrests of two men who allegedly ran the service. A third post in the series is here.

On Thursday morning, exactly two weeks after Krebs published his first post, he reported that a sustained attack was bombarding his site with as much as 620 gigabits per second of junk data. That staggering amount of data is among the biggest ever recorded. Krebs was able to stay online thanks to the generosity of Akamai, a network provider that supplied DDoS mitigation services to him for free. The attack showed no signs of waning as the day wore on. Some indications suggest it may have grown stronger. At 4 pm, Akamai gave Krebs two hours' notice that it would no longer assume the considerable cost of defending KrebsOnSecurity. Krebs opted to shut down the site to prevent collateral damage hitting his service provider and its customers.

"It's hard to imagine a stronger form of censorship than these DDoS attacks because if nobody wants to take you on then that's pretty effective censorship," Krebs told Ars on Friday. "I've had a couple of big companies offer and then think better of offering to help me. That's been frustrating."

Until recently, a DDoS attack in excess of 600Gb was nearly impossible for all but the most sophisticated and powerful actors to carry out. In 2013, attacks against anti-spam organization Spamhaus generated headlines because the 300Gb torrents were coming uncomfortably close to Internet-threatening size. The assault against KrebsOnSecurity represents a much greater threat for at least two reasons. First, it's twice the size. Second and more significant, unlike the Spamhaus attacks, the staggering volume of bandwidth doesn't rely on misconfigured domain name system servers which, in the big picture, can be remedied with relative ease...
Pretty amazing.

Keep reading.

Saturday, August 6, 2016

Russia and America: Destined for Conflict?

From Dimitri K. Simes, at the National Interest:
THE NEXT American president will face the most serious challenge from Russia since the end of the Cold War or, for that matter, since the early 1980s, when the United States and Yuri Andropov’s Soviet Union actively confronted one another around the globe. Russia today is increasingly an angry, nationalist, elective monarchy, and while it is still open for business with America and its allies, its leaders often assume the worst about Western intentions and view the United States as the “main enemy”—indeed, a new poll finds that 72 percent of Russians consider the United States the country most hostile to Russia. Worse, Moscow has been prepared to put its money where its mouth is in proceeding with a massive military modernization. The Russian government is simultaneously tightening domestic political and police controls and seeking new alliances to balance pressures from the United States and its allies and partners.

It is important not to oversimplify this situation. It is not a reenactment of the Cold War; history rarely repeats itself so precisely. Vladimir Putin’s Russia is not a superpower and its top officials are realistic about their country’s military, geopolitical and economic limitations. Russia does not have a universal ideology predicated on the West as an enemy. In fact, Putin and his associates regularly profess interest in resuming cooperation with the United States and its allies—on terms acceptable to the Kremlin. The Russian government is eager to obtain foreign investment and access to Western technology, which requires normalcy in relations with the West.

We cannot be sure how Putin and his associates would respond if the United States and its allies were prepared to reshape their policy towards Russia by defining their interests more narrowly, being less categorical about Russian domestic practices, putting a premium on avoiding confrontation and, when possible, even engaging in cooperation with Russia. All that can be said at this point is that Russia’s trajectory is alarming, but probably not yet irreversible...
Keep reading.

Thursday, July 28, 2016

The Case for Paper Ballots

The voting machines in Irvine print a paper copy of your electronic ballot before you press "vote." In theory, the paper record would be used to substantiate voters' intentions in the case of fraud allegations. I like it, although who's to say those paper rolls don't get incinerated at just about the same time one of the candidates cries foul. (Around here, it'd be Republicans alleging voter fraud against the local Democrat Party machine, heh.)

But See Glenn Reynolds, at USA Today, "After DNC hack, the case for paper ballots. Are paper ballots really a superior technology to voting machines? Absolutely" (via Instapundit):
Somebody — probably, though not certainly, Vladimir Putin’s intelligence apparatus — has hacked the Democratic Committee’s email servers and released some of what it found via the Wikileaks site.  As Harvard law professor Jack Goldsmith notes, this is something new:  Although meddling in foreign elections is old stuff for intelligence agencies (including our own), this sort of email release is unprecedented.

As disruptive as the DNC email release has been, there’s room for something much worse:  A foreign government could hack voting machines, shut down election computers, or delete or alter voter registration information, turning Election Day into a snarled mess and calling the results into question regardless of who wins.

Worse yet, hackers are already working on this.

Voting systems rely on trust. Voters have to trust that their own vote is recorded and counted accurately; they also have to trust that the overall count is accurate, and that only eligible voters are allowed to vote. (When an ineligible voter casts a vote, it cancels out the vote of a legitimate voter every bit as much as if his or her ballot had simply been shredded.)

The problem is that electronic systems — much less the Internet-based systems that some people are talking about moving to — can’t possibly provide that degree of reliability. They’re too easy to hack, and alterations are too easy to conceal. If the powers-that-be can’t protect confidential emails, or government employees’ security information, then they can’t guarantee the sanctity of voting systems...
Boy, that would be a mess. A very nasty mess.

Keep reading.

Tuesday, July 26, 2016

WikiLeaks Dismantling of #DNC is Clear Attack by Putin on Clinton

Following-up from yesterday, "Is Donald Trump a Vladimir Putin Plant?"

From John Schindler, at the New York Observer:

The recent Wikileaks dump of 20,000 emails belonging to the Democratic National Committee has caused political sensation and scandal on a grand scale. These internal communications reveal nothing flattering about the DNC or Hillary Clinton, who is set to be anointed as the Democrats’ presidential nominee at their party convention in Philadelphia that gets underway with fanfare today.

Wikileaks has thrown an ugly wrench into Hillary’s coronation. DNC emails reveal a Clinton campaign that’s shady and dishonest, not to mention corrupt. Its secret dealings with Hillary’s opponents—whether Bernie Sanders or Donald Trump—have been distasteful and possibly illegal. To say this is an unflattering portrayal of Team Clinton is like saying the Titanic had issues with ice.

The ramifications of this massive leak are already serious. Debbie Wasserman Schultz, the embattled DNC chair, has been forced to tender her resignation in advance of the party conclave in Philadelphia, while Senator Sanders, who’s been revealed as the target of much aggressive DNC attention during the Democratic primary campaign, stated he was “not shocked but I’m disappointed” by the Wikileaks revelations. The Democrats are anything but united now as they prepare to take on Donald Trump and the Republicans.

On the eve of the four-day Democratic convention extravaganza, this data-dump could not have been timed better to damage Hillary and her efforts to move back into the White House this November. Although it’s doubtful that leaked RNC internal emails would make any more pleasant a read for the public, Clinton will emerge from this tarred with the indelible brush of corruption and collusion with her party’s leadership to fix the Democratic presidential nomination.

Wikileaks has delivered as promised on its public threats of damaging Team Clinton with hacked emails. Although the DNC can’t deny that many of the leaked messages appear authentic—they wouldn’t have forced the chair’s resignation if they were fake, obviously—there remains the important question of how the vaunted “privacy organization” got its hands on them.

It turns out there’s hardly any mystery there. It’s no secret that the DNC was recently subject to a major hack, one which independent cybersecurity experts easily assessed as being the work of Russian intelligence through previously known cut-outs. One of them, called COZY BEAR or APT 29, has used spear-phishing to gain illegal access to many private networks in the West, as well as the White House, the State Department, and the Joint Chiefs of Staff last year. Another hacking group involved in the attack on the DNC, called FANCY BEAR or APT 28, is a well-known Russian front, as I’ve previously profiled.

These bears didn’t make much efforts to hide their DNC hack—in one case leaving behind a Russian name in Cyrillic as a signature—and Kremlin attribution has been confirmed by independent analysis by a second cybersecurity firm.

The answer then is simple: Russian hackers working for the Kremlin cyber-pilfered the DNC then passed the purloined data, including thousands of unflattering emails, to Wikileaks, which has shown them to the world...
I'm getting a little more sold on the idea that Russia's behind the hack, although not so much that Trump's a Putin plant.

But keep reading.

Monday, July 25, 2016

Is Donald Trump a Vladimir Putin Plant?

Heh.

It's Julia Ioffe, at Foreign Policy, "Is Trump a Russian Stooge?":

That blinding flash of light you saw this weekend? That was the byproduct of Donald Trump and Vladimir Putin, the American media’s two greatest obsessions, fusing into a single intoxicating storyline after the Democratic National Committee’s internal emails were hacked and made public with the apparent assistance of Russian hackers, and to the apparent glee of the Republican nominee. The conventional wisdom, after sifting through all the evidence, has reached a verdict, and it’s that Trump is Putin’s stooge, a veritable plant through which Putin plans to take over the United States.

Okay, I exaggerate. But not by much...
RTWT.

Cybersecurity Subplot Implicates Russia in Democrat Party Email Hacking Scandal

More on the DNC leaks, a surprisingly tantalizing story of intrigue, at the New York Times.

I'm skeptical, of course. It seems pretty opportunistic for the media to pin this all on Russia, when the world is full of hackers, and frankly China's now considered our biggest cybersecurity enemy.

But what can you do? This fits the meme that Donald Trump is the Putinian candidate.


Tuesday, October 27, 2015

Ted Koppel's New Book Out Today

It looks interesting!

At Amazon, Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath.

Plus, at Time Magazine, "9 Questions With Ted Koppel":
At the heart of the book is the question of whether we have become so fractured in how we digest information that Congress and other institutions aren’t working.

Well, it’s become more difficult because at one end of the spectrum you have MSNBC and at the other end you’ve got Fox, and on all your radio stations you’ve got a variety of highly politicized talk-show hosts who make any kind of movement in the direction of moderation seem like a betrayal.

Could a show like the old Nightline exist today?

Apparently not...
Heh.

Sunday, October 25, 2015

Russian Subs and Spy Ships Operating Near Vital Undersea Internet Cables, Raising U.S. Concerns

How do you say "Unexpectedly!" in Russian?

At the New York Times, "Russian Presence Near Undersea Cables Concerns U.S.":
WASHINGTON — Russian submarines and spy ships are aggressively operating near the vital undersea cables that carry almost all global Internet communications, raising concerns among some American military and intelligence officials that the Russians might be planning to attack those lines in times of conflict.

The issue goes beyond old Cold War worries that the Russians would tap into the cables — a task American intelligence agencies also mastered decades ago. The alarm today is deeper: In times of tension or conflict, the ultimate Russian hack on the United States could involve severing the fiber-optic cables at some of their hardest-to-access locations to halt the instant communications on which the West’s governments, economies and citizens have grown dependent.

Inside the Pentagon and the nation’s intelligence agencies, the assessments of Russia’s increasing activities are highly classified and not publicly discussed in detail. American officials are secretive about what they are doing to both monitor the activity and find ways to recover quickly if cables are cut. But more than half a dozen officials confirmed in broad terms that it had become the source of significant attention in the Pentagon.

“I’m worried every day about what the Russians may be doing,” said Rear Adm. Frederick J. Roegge, commander of the Navy’s submarine fleet in the Pacific, who would not answer questions about potential Russian plans for cutting the undersea cables.

Cmdr. William Marks, a Navy spokesman in Washington, said: “It would be a concern to hear any country was tampering with communication cables; however, due to the classified nature of submarine operations, we do not discuss specifics.”

In private, however, commanders and intelligence officials are far more direct. They report that from the North Sea to Northeast Asia and even in waters closer to American shores, they are monitoring significantly increased Russian activity along the known routes of the cables, which carry the lifeblood of global electronic communications and commerce.

Just last month, the Russian spy ship Yantar, equipped with two self-propelled deep-sea submersible craft, cruised slowly off the East Coast of the United States on its way to Cuba — where one major cable lands near the American naval station at Guantánamo Bay. It was monitored constantly by American spy satellites, ships and planes. Navy officials said the Yantar and the submersible vehicles it can drop off its decks have the capability to cut cables miles down in the sea...
Still more at that top link.

Saturday, September 19, 2015

Sources: U.S. and China Negotiating Agreement to Refrain from Using Cyberweapons to Cripple the Other's Critical Infrastructure During Peacetime

Yeah, that oughta work, because we can really trust China.

At the New York Times, "U.S. and China Seek Arms Deal for Cyberspace."

Obama Administration Targets Innocent Chinese Americans in Massive Violation of Civil Liberties

From Joyce Xi, at USA Today, "To get my father, Xiaoxing Xi, FBI twisted America's ideals":
My father’s case reflects some of America’s most cherished ideals gone wrong. My father is a hard-working, innocent American who was presumed guilty. He devoted his life to academic research, for the sake of understanding the world around us better and contributing to his university and country — America. He had all that taken away from him in an instant.

There is no escaping the geopolitics of our time and the influence that tensions between the U.S. and China have in our society today. Recently, the government has raised the specter of economic espionage with much attention on China. But as our country faces increased anxiety over China, the government is targeting innocent Chinese Americans...
More, via Instapundit, who writes:
I know, sorry, you thought you lived in America. You’re not the first Asian to make that mistake in the Obama era. But, you know, we’ve been “fundamentally transformed.” Hopey Changey!