Interesting Group Behind the Epic Yahoo Hack

Seems Yahoo could by lying about who actually did the hack and this may be due to the merger between Verizon and Yahoo.

 

The Yahoo hackers weren’t state-sponsored, a security firm says

CSO: Common criminals, not state-sponsored hackers, carried out the massive 2014 data breach that exposed information about millions of Yahoo user accounts, a security firm said Wednesday.

Yahoo has blamed state actors for the attack, but it was actually elite hackers-for-hire who did it, according to InfoArmor, which claims to have some of the stolen information.

The independent security firm found the alleged data as part of its investigation into “Group E,” a team of five professional hackers believed to be from Eastern Europe.

InfoArmor’s claims dispute Yahoo’s contention that a “state-sponsored actor” was behind the data breach, in which information from 500 million user accounts was stolen. Some security experts have been skeptical of Yahoo’s claim and wonder why the company isn’t offering more details.

InfoArmor also claimed that Group E was behind high-profile breaches at LinkedIn, Dropbox and Tumblr. To sell that information, the team has used other hackers, such as Tessa88 and peace_of_mind, to offer the stolen goods on the digital black market.

“The group is really unique,” Komarov said. “They’re responsible for the largest hacks in history, in term of users affected.” More details here.

**** Advice****

You don’t care who has looked at your emails? Really? Consider:

Here’s a simple exercise I invite you to do. Open your email and take a look at everything that you keep on it, both sent and received conversations. Scan all of them, every attachment you ever sent or received, every personal and work conversation, every email draft.

The truth is, we aren’t aware that we are living a big part of our lives through our email inbox.

We keep it all there, in only one place: photos, contracts, invoices, tax forms, reset passwords for every other account, sometimes even passwords or credit card PINs.

And our emails are interconnected to all our other digital accounts, from bank accounts to social networks (LinkedIn, Twitter, Facebook, etc), cloud services (Google Drive, iCloud, Dropbox), online shops (Amazon, for, ex, where you most likely saved your credit card details as well) and so on.

By simply breaching the email, a malicious hacker can easily get access to all those. They know how to do that.  Read More here…you REALLY need to.

From Digital Guardian:

Wrapping your head around the idea of a breach that affects half a billion users is a difficult task, and it’s not one that anyone has had to contemplate until now. Yahoo’s data breach is far and away the largest on record in terms of the number of users involved. The economic effect on the company will take years to calculate, and it may never be fully known, as is often the case with these breaches. Though Yahoo, already on the ropes and in the middle of a sale to Verizon, may see some rather unpleasant effects quite soon.

From the user’s perspective, too, the massive amount of data taken in the compromise – including dates of birth, email addresses, physical addresses, and security questions and answers – could have far-reaching effects. The information is an identity thief’s starter kit, even without bank account or payment card data. Yahoo has pointed the finger at a state-sponsored attacker, as is customary in these incidents.

“Based on the ongoing investigation, Yahoo believes that information associated with at least 500 million user accounts was stolen and the investigation has found no evidence that the state-sponsored actor is currently in Yahoo’s network. Yahoo is working closely with law enforcement on this matter,” the company said in a statement on the compromise.

As gory as they are, the public details of the Yahoo compromise aren’t what’s really interesting or important here. The intriguing part in this case is how long it took Yahoo to uncover and disclose the data breach. In its public statements, the company said it discovered the compromise recently, but the data was stolen in 2014. That fact has drawn the attention of Capitol Hill and a group of senators is asking some very uncomfortable questions of Yahoo CEO Marissa Mayer.

In their letter, Sens. Ed Markey, Patrick Leahy, Elizabeth Warren, Al Franken, Richard Blumenthal and Ron Wyden asked Mayer when and how Yahoo learned of the breach, why the company took so long to uncover it, and whether any government agencies warned Yahoo of an attack by state-sponsored attackers. The lawmakers also said that the data taken from Yahoo could be used easily in other attacks.

“The stolen data included usernames, passwords, email addresses, telephone numbers, dates of birth, and security questions and answers,” the senators said. “This is highly sensitive, personal information that hackers can use not only to access Yahoo customer accounts, but also potentially to gain access to any other account or service that users access with similar login or personal information, including bank information and social media profiles.” Complete summary here.

Presidential Determination Signed to Accept 85,000 Refugees

No wonder the FBI is on a hiring blitz to attempt to vet what is told to be highly vetted and scrutinized refugee applicants.

****

The White House
Office of the Press Secretary
For Immediate Release

Presidential Determination — Presidential Determination on Refugee Admissions for Fiscal Year 2016

MEMORANDUM FOR THE SECRETARY OF STATE

SUBJECT:      Presidential Determination on Refugee Admissions for Fiscal Year 2016

In accordance with section 207 of the Immigration and Nationality Act (the “Act”) (8 U.S.C. 1157), and after appropriate consultations with the Congress, I hereby make the following determinations and authorize the following actions:

The admission of up to 85,000 refugees to the United States during Fiscal Year (FY) 2016 is justified by humanitarian concerns or is otherwise in the national interest; provided that this number shall be understood as including persons admitted to the United States during FY 2016 with Federal refugee resettlement assistance under the Amerasian immigrant admissions program, as provided below.

The admissions numbers shall be allocated among refugees of special humanitarian concern to the United States in accordance with the following regional allocations; provided that the number of admissions allocated to the East Asia region shall include persons admitted to the United States during FY 2016 with Federal refugee resettlement assistance under section 584 of the Foreign Operations, Export Financing, and Related Programs Appropriations Act of 1988, as contained in section 101(e) of Public Law 100-202 (Amerasian immigrants and their family members):

Africa . . . . . . . . . . . . . . . . . . . 25,000

East Asia. . . . . . . . . . . . . . . . . . 13,000

Europe and Central Asia . . . . . . . . . . . 4,000

Latin America/Caribbean. . . . . . . . . . .  3,000

Near East/South Asia. . . . . . . . . . . .  34,000

Unallocated Reserve . . . . . . . . . . . .  6,000

The 6,000 unallocated refugee numbers shall be allocated to regional ceilings, as needed.  Upon providing notification to the Judiciary Committees of the Congress, you are hereby authorized to use unallocated admissions in regions where the need for additional admissions arises.

Additionally, upon notification to the Judiciary Committees of the Congress, you are further authorized to transfer unused admissions allocated to a particular region to one or more other regions, if there is a need for greater admissions for the region or regions to which the admissions are being transferred.

Consistent with section 2(b)(2) of the Migration and Refugee Assistance Act of 1962, I hereby determine that assistance to or on behalf of persons applying for admission to the United States as part of the overseas refugee admissions program will contribute to the foreign policy interests of the United States and designate such persons for this purpose. Consistent with section 101(a)(42) of the Act (8 U.S.C. 1101 (a)(42)), and after appropriate consultation with the Congress, I also specify that, for FY 2016, the following persons may, if otherwise qualified, be considered refugees for the purpose of admission to the United States within their countries of nationality or habitual residence:

  1. Persons in Cuba
  2. Persons in Eurasia and the Baltics
  3. Persons in Iraq
  4. Persons in Honduras, Guatemala, and El Salvador
  5. In exceptional circumstances, persons identified by a United States Embassy in any location

You are authorized and directed to publish this determination in the Federal Register.

 

BARACK OBAMA

National Strategy to Win the War Against Islamist Terror

 

Related reading: Foreign Terrorist Organizations, Bureau of Counterterrorism

Chairman McCaul Unveils Counterterrorism Strategy “A National Strategy to Win the War Against Islamist Terror”

Contains 100+ policy ideas and principles for fighting terrorism

WASHINGTON, D.C. – On the heels of Islamist terror attacks in the homeland this past weekend, House Homeland Security Committee Chairman Michael McCaul (R-TX) today unveiled his counterterrorism strategy, entitled A National Strategy to Win the War Against Islamist Terror. Chairman McCaul’s nonpartisan strategy contains over 100 policy ideas, recommendations, and principles for fighting terrorism.

The ideas put forward in the McCaul strategy were developed in consultation with an array of national security experts on both sides of the aisle. They are not “Republican” or “Democrat” ideas, but rather common-sense solutions for better protecting Americans.

Chairman McCaul: “As radical Islamist terror continues to sweep the globe, it has become clear that we are not winning the overall fight against it. There are now more terrorist foot soldiers and safe havens than any time in modern history, and our enemies have alarming momentum. They are reaching deep into the heart of the Western world—including our own communities—to spread their hateful ideology and perpetrate violent acts. Just this weekend we saw again that our homeland remains a terrorist target, and they have attacked our allies in places like Paris, Brussels, Nice, and beyond. Yet in recent years our strategy and policies have failed to roll back the threat, let alone contain it. That is why I’ve produced a new, national counterterrorism strategy aimed at reversing the tide of terror and protecting our great nation. The eyes of the world are now upon us, and American leadership is needed to defeat this evil.  My plan is a guidepost—for Congress and the next president—to do what is needed to win this generational struggle.”

National Strategy Social Media Release_Report

 

Overview of the Strategy

The McCaul strategy contains 100+ policy ideas and principles for fighting terrorism. Some are new, while others are abandoned policies we need to revive in order to protect America and its interests overseas against the surging terror threat.

The document is built around clear objectives: defend the homeland, defeat terrorists, and deny extremists the opportunity to re-emerge. It presents nine counterterrorism priorities, or “means,” needed to achieve the “ends” described above, including:

  1. Thwart attacks and protect our communities
  2. Stop recruitment and radicalization at home
  3. Keep terrorists out of America
  4. Take the fight to the enemy
  5. Combat terrorist travel and cut off financial resources
  6. Deny jihadists access to weapons of mass destruction
  7. Block terrorists from returning to the battlefield
  8. Prevent the emergence of new networks and safe havens
  9. Win the battle of ideas

This counterterrorism strategy is different than those that came before it. President Bush released a strategy for combating terrorism in 2003, and President Obama released one in 2011. Both are now outdated.

  • This strategy is written to keep pace with an evolving enemy. It proposes ways to fight terrorist propaganda online; counter homegrown radicalization; deal with terrorists’ use of encryption; and help communities better protect against IEDs, active shooter plots, and other changing terror tactics.
  • This strategy aims to bring our homeland security policies into the digital age. It proposes to improve the screening of foreign visitors, immigrants, and refugees using new technologies and better intelligence—including social media—to keep terrorists from infiltrating our country.
  • This strategy focuses on breaking the Islamist terror movement—not just defeating one group. Our nation’s last official counterterrorism strategy focused almost exclusively on al Qaeda, leaving us blind to the rise of ISIS. This plan is designed to go after Islamist terrorists, regardless of location or branding.

The bottom line is this: we cannot accept Islamist terror attacks as “the new normal.” We must defeat the perpetrators. The McCaul strategy makes clear that we are facing a long, generational struggle, but we should wage it with the same resolve we showed in defeating other totalitarian ideologies, including communism and fascism.

The full strategy is available, here.

Russian/Assad Barbarity in Aleppo, Orders from IRGC

Major General Yahya Rahim Safavi, senior advisor to the commander in chief and former commander of the IRGC.

Major General Yahya Rahim Safavi, senior advisor to the supreme leader and former commander of the IRGC.

Commander: IRGC supplies intelligence to Russia for airstrikes in Syria

A top Islamic Revolutionary Guard Corps (IRGC) commander told Iranian media last week that the Guard and allies supply intelligence to Russia for airstrikes in Syria. Major General Yahya Rahim Safavi, who is senior advisor to the supreme leader and was IRGC chief commander from 1997 through 2007, made the remarks in a lengthy television interview on Sept. 22.

“The Russians are responsible for aerial support of ground units, meaning those who are fighting on the ground are the Syrian army, Syrian popular forces, and some advisory forces and/or Hezbollah forces. Russia largely plays the role of supporting these [forces] by air,” Safavi said.

“Many victories like the capture of Aleppo would not have been possible without movement on the ground and only with air support,” Safavi continued. “The Russian air support was of course effective, but the ground forces gave them the intelligence that, for example, [told them] which terrorists were in what area.”

There is a kernel of truth to these statements. The IRGC-led Shiite expeditionary forces, which are comprised of IRGC proxies from Iraq, Lebanon, Afghanistan and Pakistan, were instrumental in the encircling of the rebel-held eastern Aleppo city in late July, and the reimposition of the siege in early September after the coalition of Islamists, Salafists, and rebels broke the initial siege in early August. A relentless and intense Russian bombing campaign has been a crucial factor in the successes of the pro-regime coalition. [See LWJ report, Soleimani’s presence in Aleppo underscores strategy of crushing rebels.]

Safavi, however, overplays the role that the Syrian Arab Army and the IRGC-backed Syrian National Defense Forces, a pro-regime militia, have played in the recent battles for Aleppo in order to bury the extent to which Assad relies on foreign patrons as foot soldiers and planners in arguably the most important battle of the civil war yet.

The ground forces in Aleppo have been primarily led by Iranian military officers in coordination Russian and Syrian officers. The deaths of senior IRGC commanders attest to the their involvement.

Safavi says that units under the supervision of IRGC or Hezbollah operatives, which have had a more active presence in Syria in recent years, conduct on-the-ground intelligence collection. The main planning and target selection would be coordinated between the Iranians, Russians, and Syrians. The first two may take the lead.

Based on Safavi’s statements, collection for Russian sorties elsewhere in which Syrian forces have more presence may fall on them, under the direction of Russian officers.

The strategic command headquarters that oversees all operations includes Russians, Iranians, Syrians, and IRGC-backed proxy commanders. There is lingering tensions and mistrust in this alliance, particularly between the Iranians and Russians. For now, at least, they share intelligence towards the common objective of achieving military victory in Aleppo.

Amir Toumaj is a Research Analyst at Foundation for Defense of Democracies.

**** Why is this so important? The White Helmets and the Obama administration continues to ignore Russian barbarity in Syria for the sake of an already peace deal and or truce talks with Russia.

As noted here:

U.S. Was Warned of Attack on Aid Workers in Syria

The Obama administration, desperate to save a shattered Syrian ceasefire, seems to have ignored concrete intelligence of an atrocity to come.

Weiss: Two days prior to devastating aerial attacks, Michael Ratney, the U.S. special envoy to Syria, was told the Assad regime was planning to hit the Aleppo facilities of the Syrian Civil Defense, a volunteer rescue group.

Raed al-Saleh, the head of the organization, which is widely known as the White Helmets, was in Manhattan last week, where he told not only Ratney, but envoys from the Netherlands, Britain, and Canada. He said intercepted communications from military officers in the Assad regime signaled imminent plans to bomb several rescue centers, according to two sources who were in the room when al-Saleh was transmitting this intelligence.

“We just received a message from the spotters, just an hour ago, they detected messages from the regime radio that they will attack [Syrian Civil Defense] centers in northern Aleppo,” one of those sources jotted down during the meeting, quoting al-Saleh. “First with surface to surface to missiles and, if they miss, they will use spies on the ground to adjust coordinates and come back.”  Read more here from The Daily Beast.

Comey’s Testimony, Doesn’t Remember, Doesn’t Know

Very few of the responses Comey gave in his testimony made any sense especially to former prosecutors unless you see that Comey has no worries about his job as he mentioned in the hearing he still has 7 years left on his government contract. He defended the entire FBI investigation and said he would do nothing different including based on new evidence he would be unlikely to re-open the investigation case. Sigh…

  A side note: When Hillary did meet with the FBI, she had 8 people with her, there were 4 from the FBI and 4 from the Department of Justice.

In fact, David Harsanyi, Senior Editor at The Federalist agrees with me.

This is a terribly sad dad for America relying on the FBI leadership and what is worse a terribly sad day in America for the fact that Hillary and her entire team operates with wild abandon.

So….

Sometimes, when convenient, Cheryl Mills is Hillary’s lawyer while other times just her aide de camp.

Meanwhile…AFTER the Congress served and order to preserve documents and records and issued a subpoena, Mills ordered the IT personnel to destroy the emails. The FBI ignored this condition as did the Department of Justice and issued Mills in fact complete immunity, which is to clarify immunity from obstruction and destruction of documents. The IT person finally did so many months later after the initial phone call with Mills and other lawyers using BleachBit.

Meanwhile, the FBI was able to gain access to a laptop computer that did in fact have emails on it and many of those emails were….YES ….classified. The laptop was not approved by the State Department or any other agency to have classified material.

Another meanwhile, you can watch the hearing today before the House Judiciary Committee where exacting questions were asked of FBI Director Comey and often his responses were: I don’t remember, I don’t know or I don’t see it that way.

The exchange with Congressman Jim Jordan and Congressman Darryl Issa (second round) were especially important.

FNC:

FBI Director James Comey testified Wednesday that former Hillary Clinton chief of staff Cheryl Mills and another top aide had “some” classified material on laptops they turned over to the bureau in its probe of Clinton’s private server use as secretary of state — yet the aides still received immunity.

Comey made the acknowledgment while testifying before the House Judiciary Committee, where Republicans had tough questions about a newly revealed set of immunity deals in the Clinton case.

The director claimed the findings did not constitute a crime but declined to directly answer a question on whether having classified material on a laptop or other private electronic device was against federal regulations.

“You’d have to know the circumstances,” Comey told committee Chairman Bob Goodlatte, R-Va.

The FBI’s two-year investigation into the private server found numerous Clinton server emails contained classified information and she was “extremely careless.”

However, the agency concluded the investigation without recommending criminal prosecution, and the Justice Department closed the case this summer.

“It seems clear that former Secretary of State Hillary Clinton committed multiple felonies involving the passing of classified information through her private email server. The FBI, however, declined to refer the case for prosecution on some very questionable bases,” Goodlatte said Wednesday. “We, as Congress and the American people, are troubled how such gross negligence is not punished.”

Mills’ testimony in the FBI investigation and potential testimony before Congress was not covered in the immunity deal.

****

FNC: In her interviews, Hanley told the FBI that during her time at the State Department, she learned “specifically how to handle and transport classified information/paper but could not recall who provided the training.”

Two emails from Hanley were marked classified with a c for “confidential,” the lowest level of classification. Fox News first reported some of the emails contained classified markings despite Clinton’s public claims.

The FBI document said “Hanley received a Top Secret/SCI clearance at DoS.” Despite the training, during one trip to Russia, Hanley was specifically criticized for leaving a classified document in a hotel suite she shared with Clinton during the trip. “Hanley was informed by DS (Department of State) that the briefing book and document should have never been in the suite,” the document said.

She was also involved in the response to the hack by Guccifer, whose real name is Marcel Lehel Lazar.

It was during her second interview with the FBI on June 23 that Hanley finally revealed details of a conference call she had with Abedin and top Clinton Foundation fundraiser Cooper as they scrambled “over concerns related to a reported hack by Sidney Blumenthal’s email account” in the spring of 2013, first reported by The Smoking Gun.

In the latest documents, the FBI redacted another individual’s name who apparently was on that conference call.