CIA WikiLeaks Mole a Russian or Defector?

The truth is often stranger than fiction and when it does finally come out, the twists and turns to the stories are shocking. So, it has been announced that the FBI and CIA are on a full blown mole search investigation to determine who within or as a contractor to the CIA is loyal or on the payroll of a foreign rogue nation such as Russia.

Schindler at the Observer wrote and explained that the last major Soviet penetration of NSA during the Cold War was Ron Pelton, a former agency analyst who started selling secrets to the KGB in 1980. Pelton betrayed highly sensitive signals intelligence programs to Moscow and was convicted of espionage in 1986 after Vitaly Yurchenko, a KGB officer who temporarily defected to the United States, tipped off the FBI about an NSA source selling secrets to the Kremlin.

Image result for ron pelton espionage Quazoo

So, could it be Bernie Sanders? After all, he honeymooned in Yaroslavl, Soviet Union…not modern day Russia. Anyone hear of Evgeny Buryakov who is alleged to have attempted to recruit Carter Page an early advisor to Donald Trump? Could it be John Kerry himself as part of a larger plot for Russian cooperation over Syria or Iran? It is thought that the mole is an insider or contractor, yet who could pass thumb drives or envelops via dead drops?

None of the above is real or proven, it is just suggested to think out of the box as we are only restrained by our own limits of imagination. We had never heard of Edward Snowden either right?

*** What about those ‘Shadow Brokers’? One must understand the world of espionage and how it has adjusted due to the internet and global communications with encryption.

A message from Vladimir Putin can take many forms.

It can be as heavy-handed as a pair of Russian bombers buzzing the Alaska coast, or as lethal as the public assassination of a defector on the streets of Kiev. Now Putin may be sending a message to the American government through a more subtle channel: an escalating series of U.S. intelligence leaks that last week exposed a National Security Agency operation in the Middle East and the identity of an agency official who participated.

The leaks by self-described hackers calling themselves “the Shadow Brokers” began in the final months of the Obama administration and increased in frequency and impact after the U.S. bombing of a Syrian airfield this month—a move that angered Russia. The group has not been tied to the Kremlin with anything close to the forensic certitude of last year’s election-related hacks, but security experts say the Shadow Brokers’ attacks fit the pattern established by Russia’s GRU during its election hacking. In that operation, according to U.S. intelligence findings, Russia created fictitious Internet personas to launder some of their stolen emails, including the fake whistleblowing site called DCLeaks and a notional Romanian hacker named “Guccifer 2.0.”

“I think there’s something going on between the U.S. and Russia that we’re just seeing pieces of,” said security technologist Bruce Schneier, chief technology officer at IBM Resilient. “What happens when the deep states go to war with each other and don’t tell the rest of us?”
The Shadow Brokers made their deubt in August, appearing out of nowhere to publish a set of secret hacking tools belonging to the “Equation Group”—the security industry’s name for the NSA’s elite Tailored Access Operations program, which penetrates foreign computers to gather intelligence. At that time, the Shadow Brokers claimed to be mercenary hackers trying to sell the NSA’s secrets to the highest bidder. But they went on to leak more files for free, seemingly timed with the public thrusts and parries between the Obama administration and the Russian government.

From the start, outside experts had little doubt that Russian intelligence was pulling the strings. “Circumstantial evidence and conventional wisdom indicates Russian responsibility,” exiled NSA whistleblower Edward Snowden tweeted last August. “Why did they do it? No one knows, but I suspect this is more diplomacy than intelligence, related to the escalation around the [Democratic National Committee] hack.”

The FBI started investigating, and in August agents arrested an NSA contractor named Hal Martin after discovering that Martin had been stockpiling agency secrets in his house for two decades. But even as Martin cooled his heels in federal custody, the Shadow Brokers continued to post messages and files.

Snowden and other experts speculated that the Russians obtained the code without the help of an insider. As a matter of tradecraft, intelligence agencies, including the NSA, secretly own, lease, or hack so-called staging servers on the public internet to launch attacks anonymously. By necessity, those machines are loaded up with at least some of the agency’s tools. Snowden theorized that the Russians penetrated one of those servers and collected an NSA jackpot. “NSA malware staging servers getting hacked by a rival is not new,” he wrote.
Whatever their origin, the leaks dried up on Jan. 12, when the Shadow Brokers announced their “retirement” 10 days before Donald Trump’s swearing-in. The group didn’t reemerge until this month, after the Syrian military’s deadly chemical-weapons attack in Ghouta. Reportedly moved by images of the Syrian children injured or killed in the attack, Trump responded by ordering the launch of 59 Tomahawk missiles at a Syrian government air base—departing drastically from the will of Putin, who considers Syrian President Bashar al-Assad a strategic ally.

The Russian government immediately condemned the U.S. response. Two days later, so did the Shadow Brokers. The group broke its months-long silence and released another tranche of NSA secrets along with a lengthy open letter to Trump protesting the Syrian missile strike. Abandoning any pretense of a profit motive, the Shadow Brokers claimed now to be disillusioned U.S. voters—“the peoples who getting you elected,” as they put in, using phrasing that holds dual meaning coming from a suspected Kremlin operation.

The Shadow Brokers have been playing hardball ever since. Their most recent release, on Friday, exposed the code for a sophisticated NSA toolkit targeting Windows machines, putting some of the agency’s capabilities, circa 2013, in the hands of every newbie hacker able to use a keyboard.

This time, the Shadow Brokers didn’t stop with code. For the first time in their short history, they also released internal NSA spreadsheets, documents, and slide decks, some bedecked with the insignia and “Top Secret” markings familiar to anyone who’s browsed the Snowden leaks.

The leak exposes in detail a 2013 NSA hacking operation called Jeep Flea Market that gained deep access to Dubai-based EastNets, a company that handles wire transfers for a number of Middle East banks, something of obvious interest to U.S. intelligence. (EastNets denies the breach.) But the Shadow Brokers exposed more than just an NSA operation. Metadata left in the files identified the full name of a 35-year-old NSA worker in San Antonio who was apparently involved in the hack. (The Daily Beast was unable to reach him for comment.)
NSA hackers don’t face the same danger as CIA officers working undercover in a foreign country, but the likelihood that Russia has begun exposing them by name, while linking them to specific operations, raises the stakes for the intelligence community. If nothing else, the San Antonio NSA worker could plausibly face criminal and civil charges in the United Arab Emirates, just as hackers working for Russian and Chinese intelligence have been indicted in the U.S.

It’s conceivable that the Shadow Brokers included the name by mistake. Groups like WikiLeaks and the journalists with the Snowden cache are accustomed to scrubbing identifying metadata from documents. But a less-experienced hand might overlook it. Schneier is doubtful. “If we’re assuming an intelligent and strategic actor, which I think we are, then you have to assume that they did that on purpose,” he said.

Nothing is certain; the Shadow Brokers are a puzzle with missing pieces. But Friday’s Shadow Brokers release obliterated one theory on the spot. The NSA would never have put classified spreadsheets and PowerPoint slides on a staging server. They could only have come from inside the NSA.

Which sets the stage for a revival of a storied Cold War intelligence ritual, with the declining agency morale that comes with it: the Russian mole hunt. “I think we’re most likely looking at someone who went rogue from within, or a contractor who had access to this information,” said Eric O’Neill, national-security strategist for Carbon Black. “Either way, we have someone in the intelligence community that’s a pretty high-placed spy.”

A former FBI surveillance specialist, in 2001 O’Neill helped bring down Robert Hannsen, a double agent in the bureau who’d been secretly spying for Russia. “The FBI must be scrambling right now,” he said. “There’s so many leaks going on: this leak, the CIA Vault7 leaks, and at the same time there’s the investigation into any administration ties to Russia, and the DNC intrusion, and all these leaks coming out of the White House. There’s only so much that the FBI’s national security agents can do.”

If Russia did have a mole inside the NSA in 2013, the most recent date of the documents, Schneier thinks it unlikely that it does now, or else the Shadow Brokers wouldn’t exist. “You only publish when it’s more useful as an embarrassment than as intelligence,” he said. “So if you have a human asset inside the NSA, you wouldn’t publish. That asset is too important.”

It’s also possible, though unprecedented in the public record, that Russia found a way into the NSA’s classified network. A competing theory focuses on the FBI’s early suspect, Hal Martin. He’s not the Shadow Brokers, but he reportedly worked in the NSA’s Tailored Access Operations program and had 50,000 gigabytes of classified material in his home. Might he himself have been hacked? Martin is charged in Maryland with 20 counts of willful retention of national defense information, but prosecutors have not made any accusation that his trove slipped into enemy hands.

As Snowden demonstrated when he walked out of the NSA with a thumb drive of secrets, it’s comparatively easy now to steal and smuggle classified information. But O’Neill says the FBI’s counterintelligence mission is easier too, because of the rampant audit trails and server logs in classified networks.

“It’s much easier getting the secrets out now, but on the flip side, it’s also easier for law enforcement and the FBI to track down who had access to the data,” he says. “I like to think this mole hunt is going to be a little easier than it was in the past.”

Until then, expect the Shadow Brokers to stick around. In their Friday dump, they hinted at more revelations this week: “Who knows what we having next time?”

*** WASHINGTON — Forget about spies. It’s rogue insiders that cause heartburn at U.S. intelligence agencies these days.

Few spy cases have broken in the past decade and a half. In contrast, a proliferation of U.S. intelligence and military insiders have gone rogue and spilled secrets to journalists or WikiLeaks, the anti-secrecy group.

The leaks are as damaging as any major spy case, perhaps more so. And they have underscored the ease of stealing secrets in the modern age, sometimes with a single stroke of a keyboard.

Since early March, WikiLeaks has published part of a trove of documents purportedly created by cyber units of the Central Intelligence Agency. WikiLeaks continues to upload the documents and hacking tools, dubbed Vault 7, to the internet for all to see.

For its part, a mysterious group that calls itself the Shadow Brokers has re-emerged and dumped a large catalog of stolen National Security Agency hacking tools on the internet, including evidence the agency had penetrated Middle Eastern banking networks.

“In the past, we’ve lost secrets to foreign adversaries,” retired Air Force Gen. Michael Hayden, a former director of both the CIA and the NSA, said in an interview. “Now we’ve got the self-motivated insider that is our most important counterintelligence challenge.”

Hayden cited the cases of Army Pfc. Chelsea Manning, convicted in 2013 for releasing three-quarters of a million classified or sensitive military and diplomatic documents to WikiLeaks. He also mentioned Edward Snowden, the former NSA contractor who shook public opinion with his disclosures to journalists in 2013 about U.S. surveillance practices. Hayden added the Vault 7 disclosures last month, which others presume were stolen by a contract employee at the CIA. Read more here.

 

 

 

EPA Possible Buyout, Why Not Education?

Personally, why do we have to buyout any government employee? Just begin to defund departments within agencies and non-mandatory employees are laid-off right? Remember that quasi government shutdown during the Obama administration where no one missed anything that government did or didn’t do?

Meanwhile, offering EPA employees an early buyout is an option for sure, but why not apply the same plan to the Department of Education?

The U.S. Department of Education promotes student achievement and preparation for global competitiveness by fostering educational excellence and ensuring equal access to educational opportunity. To support this mission, the Budget provides $70.7 billion in discretionary funding for the Department of Education in 2016, an increase of $3.6 billion, or 5.4 percent, over the 2015 level. The Budget also proposes $145 billion in new mandatory spending and reforms over the next decade to fund early learning, support teachers, and reform postsecondary education.

While investing in education in all domains, the Budget places particular emphasis in four areas: (1) increasing equity; (2) expanding access to high-quality early learning; (3) increasing support for teachers; and (4) expanding college opportunity and quality. In addition, the Budget makes a cross-cutting commitment to using and developing evidence in order to maximize results for taxpayers and students. In recent years, the Department has pioneered several evidence-based programs and introduced priorities for the use of evidence into existing initiatives. By investing in what works, learning more about what works, and sharing what we learn, we can help more students succeed. (blah blah blah, right)

Meanwhile, back to the EPA…. an agency that has declared a temporary rain puddle is the property of the Federal government….

EPA To Offer Employees Buyouts, Early Retirement This Year

The Environmental Protection Agency will begin offering employees financial incentives to leave the agency this year, according to an internal memorandum obtained by Government Executive.

As part of its efforts to meet the requirements of recently issued guidance from the Office of Management and Budget calling on all agencies to restructure themselves and reduce their workforces, EPA will continue a freeze on external hiring and begin offering early retirement and buyouts. Details of the plans were not made clear in the memo, which was sent by acting Deputy Administrator Mike Flynn. He noted only that EPA’s goal was to complete the separation incentive program by Sept. 30, the end of fiscal 2017.

Agencies can offer up to $25,000 to employees who have worked in the federal government at least three years through a Voluntary Separation Incentive Payment and allow employees not otherwise eligible for retirement benefits to receive them through Voluntary Early Retirement Authority. The Office of Personnel Management must approve all early out and buyout programs.

In its guidance, OMB said OPM would “provide expedited reviews for most [VERA and VSIP] requests within 30 days.” While OMB said it would not prescribe any specific strategy or set reduction targets for individual agencies, President Trump’s fiscal 2018 budget called on the EPA to cut 25 percent of its workforce, amounting to 3,200 employees. The proposal suggested slashing 31 percent of the agency’s budget.

EPA has endured significant spending cuts in recent years, with its spending level already reduced more than 20 percent since 2010 and its workforce at its smallest total since 1989. EPA last offered separation incentives to its employees in 2014, targeting mostly regional offices.

A recently released inspector general report found EPA paid $11.3 million to get 456 employees to leave the agency that year. Generally, the IG found the incentives “aided workforce restructuring goals,” though it was unclear if EPA had successfully reached its other goals of obtaining staff with new skillsets and increasing the number of staffers per supervisor. When accounting for the additional annual leave payments, EPA doled out a total of $16.2 million in 2014 to separate the employees. The IG noted the agency could not control how many or which employees would voluntarily leave, but that the various EPA offices adequately analyzed their workforce data to determine which positions to target.

Under OMB’s guidance, all agencies must come up with both short and long-term plans to reduce their staffing levels, with preliminary plans due June 30. Flynn said EPA has recently formed a workgroup to develop its agency reform plan. EPA is at least the third agency to continue its hiring freeze despite Trump ending it last week. Flynn said the agency will approve “very limited exceptions” to the moratorium and allow certain internal reassignments.

“I appreciate your patience as we work through the details of the guidance and will work with you as we move forward,” Flynn said.

Liz Bowman, an EPA spokeswoman, said the approach mirrored the one taken by the Obama administration and would ensure “payroll expenses do not overtake funds used for vital programs to protect the environment.”

“Streamlining and reorganizing is good government and important to maximizing taxpayer dollars,” she said.

John O’Grady, president of the American Federation of Government Employees council that represents many EPA workers, said reaching the administration’s desired cuts through incentive payments would prove prohibitively expensive. EPA, he added, is already “underfunded and understaffed.”

“Any further cuts will absolutely cripple the agency,” O’Grady said.

OPM did not immediately respond to requests for further details on the separation incentives.

Then….the progressives are fighting back on this proposed legislation regarding the EPA:

Honest and Open New EPA Science Treatment Act of 2017 or the HONEST Act

(Sec. 2) This bill amends the Environmental Research, Development, and Demonstration Authorization Act of 1978 to prohibit the Environmental Protection Agency from proposing, finalizing, or disseminating a covered action unless all scientific and technical information relied on to support such action is the best available science, specifically identified, and publicly available in a manner sufficient for independent analysis and substantial reproduction of research results. A covered action includes a risk, exposure, or hazard assessment, criteria document, standard, limitation, regulation, regulatory impact analysis, or guidance. Personally identifiable information, trade secrets, or commercial or financial information obtained from a person and privileged or confidential must be redacted prior to public availability. Read more about it here.

Infrastructure Plan, Highway Grants Still Fleecing Americans

Could the American taxpayer get fleeced again on the proposed Trump infrastructure proposal? History and facts says YES. Presently this is just chatter when it comes to improvements, there is no money allocated much less a plan. Draining that swamp is not underway either…

Image result for highway grants

With Billions in Recession-Era Highway Grants, Why Were Improvements Limited?

New research examines why nearly $28 billion of recession-era funding for highway projects didn’t yield greater improvements to the nation’s road network.

Bill Dupor, an assistant vice president and economist in the research division with the Federal Reserve Bank of St. Louis, digs into the issue in the reserve bank’s latest quarterly Review.

Dupor looks at $27.5 billion funneled through the Federal Highway Administration as part of the 2009 American Recovery and Reinvestment Act. Most of that amount was directed toward grants for state governments, marking a substantial boost in federal highway aid.

But in years before and after the Recovery Act, according to Dupor, the number of structurally deficient bridges in the U.S. was close to unchanged, as was the number of workers on road and bridge projects. And, he says, over 40 percent of the nation’s population lived in states where the overall value of highway construction spending was lower in 2010 than in 2008.

“Despite the tremendous influx of federal funds, the highway system showed little improvement,” Dupor writes.

Why was this the case? An explanation Dupor offers is that as states received the federal grant funding for road projects, they could decrease their own spending on highway infrastructure—freeing up those state dollars for other uses.

“Since states were facing budget stress from declining tax revenues resulting from the recession, it stands to reason that states had the incentive to do so,” Dupor writes, referring to the shifting of state highway funding to other areas.

He found that 15 states cut their total highway capital spending between 2008 and 2010. For instance, across that timeframe, the amount of state money spent per resident on highway infrastructure went down by $109 in Georgia, $98 in Texas and $73 in Maryland.

President Trump is currently pushing for a $1 trillion infrastructure package that would involve both public and private capital. Some city leaders have argued that, if the federal government ups infrastructure spending, more money should go directly to cities rather than through states.

Dupor’s article is titled, “So, Why Didn’t the 2009 Recovery Act Improve the Nation’s Highways and Bridges?” A full copy can be found here.

*** Obama’s shovel ready jobs….remember that?

Forbes: Those with long memories will recall that the way out of the economic difficulties back a few years was to be that we had a fiscal stimulus. The US was going to borrow a whole bunch of money and invest it in those shovel ready infrastructure projects that simply littered the country side. This would pull us up out of recession pretty darn sharpish and all would be well.

No, really, this was what was going to happen:

As President Obama urges Congress to pass the $800 billion-plus stimulus package, one of his favorite selling points is the thousands of projects nationwide that he calls “shovel ready” — meaning planning is complete, approvals are secured and people could be put to work right away once funding is in place.

There is no formal definition for shovel ready. The Federal Highway Administration says it doesn’t use the phrase. Its preferred term is “ready to go,” according to acting administrator Jeff Paniati.

That means a state has already done the preliminary work for that project, he says.

“They’ve addressed all the environmental requirements as required,” Paniati says. “They’ve done the necessary public outreach. In many cases, the design work is already completed … and that they’re on an approved state list.”

One example of a shovel-ready project is the in the notoriously traffic-clogged suburbs of Northern Virginia outside Washington, D.C. The state wants to widen the roads and has done some of the preliminary work, but the project is on hold because Virginia doesn’t have the final $32 million needed to complete it.

The stimulus bill states that for a project to be considered shovel-ready, it must be ready to begin in 90 days. The has a list of almost 19,000 such projects, adding up to almost $150 billion.

I quote at such length as this really was  what was touted as the way out of the then current problems.

FT Alphaville has a nice little chart today showing what actually happened:

Err, yes. The government gears up to massively boost infrastructure spending, borrows $800 billion to go do infrastructure spending and infrastructure spending falls through the floor at the same time.

My conclusion would be rather simple: government’s just not the way to get the job done.

I agree, there are some things that must be done. There are also things that must be done that only government can do: so, let government limit itself to only those things that must be done and can only be done by government. I think we’d be better off working out the rest of it by ourselves quite frankly.

I mean seriously? They insist that they’re going to boost the economy through infrastructure spending and even when they get the money infrastructure spending falls by by a third or more?

Jeff Sessions/FBI and MS-13

Four members of the violent, foreign MS-13 gang were convicted on federal racketeering charges, some of which involved murder.

Miguel Zelaya, 20-years-old, Luis Ordonez-Vega, 36-years-old, Jorge Sosa, 24-years-old and William Gavidia, 23-years-old, were all convicted on a count of conspiracy to commit racketeering, according to the Charlotte Observer:

Zelaya, who also goes by “Most Wanted” and “Ne Ne” is a member of MS-13’s “Coronados Little Cycos Salvatrucha” clique. On Dec. 18, 2013, he shot and killed Jose Orlando Ibarra, an associate of The Latin Kings, a rival gang, the release said.

Ordonez-Vega, also known as “Big Boy,” is a member of the Brentwood Locos Salvatrucha” clique, according to the news release. On June 6, 2013, Ordonez-Vega shot and killed Noel Navarro Hernandez in a strip mall parking lot in Charlotte, believing the victim was a member of a rival gang.

Sosa, who goes by “Koki” and “Loco” is a member of the “Charlotte Locotes Salvatrucha” clique. Prosecutors say he’s been involved in multiple gang-related crimes. In Feb. 2008, he flashed MS-13 gang signs at a rival gang member’s mother and pointed a gun at her while they were stopped in traffic. In June, 2013, he was involved in a gang-related shooting where he and another person followed victims in a neighborhood in Charlotte and opened fire with a high-caliber rifle, the release said.

All of the gang members are either immigrants or the children of immigrants in the U.S. and they are also facing state charges for their crimes.

“Today’s guilty verdicts underscore that even though gang membership may in some ways ‘protect’ gangsters from outsiders, it certainly won’t protect them from the vast reach of the US. Attorney’s Office and our law enforcement partners,” U.S. Attorney for the Western District of North Carolina Jill Westmoreland Rose said in a statement.

The MS-13 gang members were four of 37 who were charged with racketeering after an investigation into the criminal activity by the Organized Crime Drug Enforcement Task Force. Thirty of the other gang members charged with racketeering are either awaiting sentencing or have pleaded guilty to the charges.

According to the U.S. District Attorney, Ordonez-Vega and Zelaya were convicted on charges to murder in aid of racketeering. Those charges are connected to two separate murders. Meanwhile, Sosa was convicted for attempted murder in the aid of racketeering.

***

Image result for ms-13  InSightCrime

In 2015 the U.S. Treasury Department froze the assets of three members of the gang who were funneling funds back to higher-ups in El Salvador from prison. These actions were an attempt “disrupt” MS-13’s financial network by cutting off profits from illegal activities in the United States, the Treasury Department said. In 2012 the Obama administration designated MS-13 a transnational crime organization and implemented sanctions against six members in 2013.

While the U.S. government attempts to target MS-13’s earnings, targeting its culture is proving more difficult. The fierce loyalty among members is unique, Ron Hosko, former assistant director of the FBI’s Criminal Investigative Division, told FOX Business.

“They’re very cohesive and often directed by imprisoned bosses in El Salvador to recruit and expand in American communities. That tends to mean there’s an aggressive internal enforcement mechanism which equates to internal discipline involving physical violence and murder for disrespect or betrayal,” he said.

The FBI in El Salvador Because of MS-13:

CNN Reported Dossier Basis for Trump Surveillance, But…

The FBI last year used a dossier of allegations of Russian ties to Donald Trump’s campaign as part of the justification to win approval to secretly monitor a Trump associate, according to US officials briefed on the investigation.

The dossier has also been cited by FBI Director James Comey in some of his briefings to members of Congress in recent weeks, as one of the sources of information the bureau has used to bolster its investigation, according to US officials briefed on the probe.
This includes approval from the secret court that oversees the Foreign Intelligence Surveillance Act (FISA) to monitor the communications of Carter Page, two of the officials said. Last year, Page was identified by the Trump campaign as an adviser on national security. More here from CNN.
Okay, so everyone remains angry with James Comey right? Okay, well hold on….this could get complicated. We cant dismiss the notion that Obama and Susan Rice had a valid reason for their surveillance
actions, at least some as the below case was provided to the White House.
Enter Evigeniy Mikhailovich Bogachev.
Image result for evgeniy mikhailovich bogachev

U.S. v Evgeniy Mikhailovich Bogachev et al by Brian Ries on Scribd

Bogachev was a case from 2014 investigated by CrowdStrike and then later offered help to the FBI office in Omaha and later the FBI office in Pittsburgh finally after countless months, ran a global cyber operation and succeeded in stopping international bank thefts in the millions of dollars. Many Russian immigrants located in Brighton Beach were recruited to be mules going to domestic banks, opening accounts and later withdrawing funds, cleaning all traces of the stolen millions. It should be noted that CrowdStrike was the same firm the Hillary campaign hired to investigate intrusions.

Image result for evgeniy mikhailovich bogachev

Now it gets even more interesting.

The matter of Bogachev with his named operation of ‘Business Club’ and his global cyber operatives hacking with sophisticated bots, malware and remote servers came to the attention of the Russian Federation. They liked what the Bogachev Zeus operation had the ability to do. So, top Kremlin officials allowed the operation to continue without prosecution if they would work to gather intelligence on the global reaction to Putin annexing Crimea and moving in on Ukraine.

All of this came to the attention also of U.S. based private cyber professional where they studied the code, the IP addresses, the servers, the patterns, names and other common cyber traits. The DNC hack attributions are a dovetail to the ‘Business Club’ operation due to style, coding, networks, language and server locations.

In 2015, the Obama State Department issued sanctions and a $3 million dollar bounty on Bogachev who operated with the alias of ‘Slavik’. Russia of course is not only not cooperating but refuses to admit any such action was real and the evidence is not vetted. This is a usual response by top Russian officials.

An estimated $100 million was stolen via cyber operations by Slavik and computers infected with various versions of Zeus still exist while the FBI was able to seized all those known to their sting operation.

The FBI described the cyber sting operation as hand to hand combat with Bogachev and his operation on the Zeus case was deemed successful. It is unknown at this time who and where is he still operating. The summary of this operation was taken from the full article published by ‘Wired’ under the title ‘The Hunt for Russia’s Most Notorious Hacker’

Late last year, the DHS released a joint statement which read in part:

This activity by Russian intelligence services is part of a decade-long campaign of cyber-enabled operations directed at the U.S. Government and its citizens. These cyber operations have included spearphishing, campaigns targeting government organizations, critical infrastructure, think tanks, universities, political organizations, and corporations; theft of information from these organizations; and the recent public release of some of this stolen information.  In other countries, Russian intelligence services have also undertaken damaging and disruptive cyber-attacks, including on critical infrastructure, in some cases masquerading as third parties or hiding behind false online personas designed to cause victim to misattribute the source of the attack.  The Joint Analysis Report provides technical indicators related to many of these operations, recommended mitigations and information on how to report such incidents to the U.S. Government.

A great deal of analysis and forensic information related to Russian government activity has been published by a wide range of security companies.  The U.S. Government can confirm that the Russian government, including Russia’s civilian and military intelligence services, conducted many of the activities generally described by a number of these security companies.  The Joint Analysis Report recognizes the excellent work undertaken by security companies and private sector network owners and operators, and provides new indicators of compromise and malicious infrastructure identified during the course of investigations and incident response.  The U.S. Government seeks to arm network defenders with the tools they need to identify,, detect and disrupt Russian malicious cyber activity that is targeting our country’s and our allies’ networks.