An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

The Russians Hacked the NSA? Ah…What?

This is bad bad bad….and panic has struck Washington DC ….payment is to be in Bitcoins…

Graphics of files below courtesy of Arstechnica.

    

More here in further detail.

*****

Most outside experts who examined the posts, by a group calling itself the “Shadow Brokers,” said they contained what appeared to be genuine samples of the code — though somewhat outdated — used in the production of the NSA’s custom-built malware. Most of the code was designed to break through network firewalls and get inside the computer systems of competitors like Russia, China and Iran. That, in turn, allows the NSA to place “implants” in the system, which can lurk unseen for years and be used to monitor network traffic or enable a debilitating computer attack.  More here.

NSA and the No Good, Very Bad Monday

LawFare: Monday was a tough day for those in the business of computer espionage. Russia, still using the alias Guccifer2.0, dumped even more DNC documents. And on Twitter, Mikko Hypponen noted an announcement on Github that had gone overlooked for two days, a group is hosting an auction for code from the “Equation Group,” which is more commonly known as the NSA. The auctioneer’s pitch is simple, brutal, and to the point:

How much you pay for enemies cyber weapons? Not malware you find in networks. Both sides, RAT + LP, full state sponsor tool set? We find cyber weapons made by creators of stuxnet, duqu, flame. Kaspersky calls Equation Group. We follow Equation Group traffic. We find Equation Group source range. We hack Equation Group. We find many many Equation Group cyber weapons. You see pictures. We give you some Equation Group files free, you see. This is good proof no? You enjoy!!! You break many things. You find many intrusions. You write many words. But not all, we are auction the best files.

This release included two encrypted files, and the password to one was provided as proof while the other remains encrypted. The attackers claim that they will provide the password to the second file to the winner of a Bitcoin auction.

The public auction part is nonsense. Despite prevailing misconceptions on cryptocurrency, Bitcoin’s innate traceability means that no one could really expect to launder even $1M out of a high profile Bitcoin wallet like this one without risking detection, let alone the $500M being requested for a full public release. The auction is the equivalent of a criminal asking to be paid in new, marked, sequential bills. Because the actors here are certainly not amateurs, the auction is presumably a bit of “Doctor Evil” theater—the only bids will be $20 investments from Twitter jokesters.

But the proof itself appears to be very real. The proof file is 134 MB of data compressed, expanding out to a 301 MB archive. This archive appears to contain a large fraction of the NSA’s implant framework for firewalls, including what appears to be several versions of different implants, server side utility scripts, and eight apparent exploits for a variety of targets.

The exploits themselves appear to target Fortinet, Cisco, Shaanxi Networkcloud Information Technology (sxnc.com.cn) Firewalls, and similar network security systems. I will leave it to others to analyze the reliability, versions supported, and other details. But nothing I’ve found in either the exploits or elsewhere is newer than 2013.

Because of the sheer volume and quality, it is overwhelmingly likely that this data is authentic. And it does not appear to be information taken from compromised targets. Instead, the exploits, binaries with help strings, server configuration scripts, 5 separate versions of one implant framework, and all sort of other features indicate that this is analyst-side code—the kind that probably never leaves the NSA.

It is also unlikely that this data is from the Snowden cache. Those documents focused on PowerPoint slides and shared data, not detailed exploits. Besides NSA, the only plausible candidate for ownership is GCHQ—and the implications of stealing Top Secret data from GCHQ and modifying it to frame the NSA would themselves be startling.

All this is to say that there is relatively high confidence that these files contain genuine NSA material.

From an operational standpoint, this is not a catastrophic leak. Nothing here reveals some special “NSA magic.” Instead, this is evidence of good craftsmanship in a widely modular framework designed for ease of use. The immediate consequence is probably a lot of hours of work down the drain.

But the big picture is a far scarier one. Somebody managed to steal 301 MB of data from a TS//SCI system at some point between 2013 and today. Possibly, even probably, it occurred in 2013. But the theft also could have occurred yesterday with a simple utility run to scrub all newer documents. Relying on the file timestamps—which are easy to modify—the most likely date of acquisition was June 11, 2013 (see Update, however). That is two weeks after Snowden fled to Hong Kong and six days after the first Guardian publication. That would make sense, since in the immediate response to the leaks, as the NSA furiously ran down possible sources, it may have accidentally or deliberately eliminated this adversary’s access.

As with other recent cyber conflicts, the  espionage aspect is troubling but not entirely new. It’s very, very bad that someone was able to go rummaging through a TS//SCI system—or even an unclassified Internet staging system where the NSA operator unwisely uploaded all this data—and to steal 300 MB of data. But whoever stole this data now wants the world to know—and that has much graver implications. The list of suspects is short: Russia or China. And in the context of the recent conflict between the US and Russia over election interference, safe money is on the former.

Right now, I’d imagine that the folks at NSA are having rather unpleasant conversations about what the other encrypted file might contain, and what other secrets this attacker may have gained access to. Even if they were aware of the attack that resulted in this leak, there’s no way of knowing what is in the other archive. Is there evidence of another non-Snowden insider who went silent three years ago? Was a TS//SCI system remotely compromised? Was there some kind of massive screw-up at an agency which prides itself on world class OPSEC? Some combination of the three?

And—most chillingly—what else might be released before this war of leaks is over?

 

Update:  Thanks to @botherder for pointing out that a couple files have a newer date:  One file has a date of June 17th, 2013; another has a date of July 5th, 2013; three setup strips are dated September 4th, 2013; and two have dates of October 18th 2013.  One of those files (which I’m currently investigating) is the database of allocated Ethernet MAC addresses, which may be able to identify a later minimum date of compromise.  If the latter date of October 18th, 2013 is correct, this is even more worrysome, as this suggests that the compromise happened four months after the initial Snowden revelations—a period of time when the NSA’s systems should have been the most secure.

Update 2: Looking at the dates again, it now does seem somewhat likely that this was data copied on June 11th, 2013 with a few updates with a compromise after October 18th.  This does make it more likely that this was taken from a set of files deliberately moved onto a system on the Internet used for attacking others.  To my mind, this is actually an even scarier possibility than the NSA internal system compromise: This scenario would have the NSA, after the Snowden revelations, practicing some incredibly awful operational security.  Why should the NSA include five different versions of the same implant on a system used to attack other systems on the Internet?  Let alone implants which still have all the debugging strings, internal function names, and absolutely no obfuscation?

Update 3: Kaspersky confirms that the particular use of RC6 matches the unique design present in other Equation Group malcode.  XORcat apparently confirmed that the Cisco exploit works and, due to the versions it can attack, was a zero day at the time.  This exploit would generally work to take over a firewall from the inside of a target network since it did require limited access that is almost always blocked from the outside.

*****

In part from the WashingtonPost:

A cache of hacking tools with code names such as Epicbanana, Buzzdirection and Egregiousblunder appeared mysteriously online over the weekend, setting the security world abuzz with speculation over whether the material was legitimate.

The file appeared to be real, according to former NSA personnel who worked in the agency’s hacking division, known as Tailored Access Operations (TAO).

“Without a doubt, they’re the keys to the kingdom,” said one former TAO employee, who spoke on the condition of anonymity to discuss sensitive internal operations. “The stuff you’re talking about would undermine the security of a lot of major government and corporate networks both here and abroad.”

Said a second former TAO hacker who saw the file: “From what I saw, there was no doubt in my mind that it was legitimate.”

“Faking this information would be monumentally difficult, there is just such a sheer volume of meaningful stuff,” Nicholas Weaver, a computer security researcher at the University of California at Berkeley, said in an interview. “Much of this code should never leave the NSA.”

The tools were posted by a group calling itself the Shadow Brokers using file-sharing sites such as BitTorrent and DropBox.

At the same time, other spy services, like Russia’s, are doing the same thing to the United States.

It is not unprecedented for a TAO operator to accidentally upload a large file of tools to a redirector, one of the former employees said. “What’s unprecedented is to not realize you made a mistake,” he said. “You would recognize, ‘Oops, I uploaded that set’ and delete it.”

Critics of the NSA have suspected that the agency, when it discovers a software vulnerability, frequently does not disclose it, thereby putting at risk the cybersecurity of anyone using that product. The file disclosure shows why it’s important to tell software-makers when flaws are detected, rather than keeping them secret, one of the former agency employees said, because now the information is public, available for anyone to employ to hack widely used Internet infrastructure. Read the full article here.

The Authority of the Internet is Turned Over in 2 Months

This is surrender of the one place in the world where there is some freedom, the internet. The transfer date is September 30, 2016. Is this a big deal? Yes…..China and Russia don’t have a 1st amendment and it appears only one senator is waging the war to stop the transfer, Ted Cruz.

“From the very first days of the internet, the American government has maintained domain names and ensured equal access to everyone with no censorship whatsoever,” Cruz says in the video. “Obama wants to give that power away.”

That move poses a “great threat” to national security, Cruz said. Starting on the transfer date of Sept. 30, ICANN control could allow foreign governments to prohibit speech that they don’t agree with, he added.

Cruz has added an amendment to the Senate’s Highway Bill that would require an up-or-down vote on the administration’s plan to give ICANN control over names and numbers. And Cruz’s Protecting Internet Freedom Act, proposed with Republican Rep. Sean Duffy (Wis.), would prevent the transfer of authority to the global group. More from The Blaze.

*****

Twenty-five advocacy groups and some individuals have told leaders in the Senate and the House of Representatives that key issues about the transition are “not expected to be fully resolved until summer 2017.”

“Without robust safeguards, Internet governance could fall under the sway of governments hostile to freedoms protected by the First Amendment,” wrote the groups, which include TechFreedom, Heritage Action for America and Taxpayers Protection Alliance. “Ominously, governments will gain a formal voting role in ICANN for the first time when the new bylaws are implemented.” Read more here from PCWorld.

America to hand off Internet in under two months

WashingtonExaminer: The Department of Commerce is set to hand off the final vestiges of American control over the Internet to international authorities in less than two months, officials have confirmed.

The department will finalize the transition effective October 1, Assistant Secretary Lawrence Strickling wrote on Tuesday, barring what he called “any significant impediment.”

The move means the Internet Assigned Numbers Authority, which is responsible for interpreting numerical addresses on the Web to a readable language, will move from U.S. control to the Internet Corporation for Assigned Names and Numbers, a multistakeholder body that includes countries like China and Russia.

Critics of the move, most prominently Texas Republican Sen. Ted Cruz, have pointed out the agency could be used by totalitarian governments to shut down the Web around the globe, either in whole or in part.

Opponents similarly made the case that Congress has passed legislation to prohibit the federal government from using tax dollars to allow the transition, and pointed out that the feds are constitutionally prohibited from transferring federal property without approval from Congress. A coalition of 25 advocacy groups like Americans for Tax Reform, the Competitive Enterprise Institute, and Heritage Action sent a letter to Congress making those points last week.

While those issues could, in theory, lead to a legal challenge being filed in the days following the transfer, the administration has expressed a desire to finish it before the president leaves office, a position that Strickling reiterated.

“This multistakeholder model is the key reason why the Internet has grown and thrived as a dynamic platform for innovation, economic growth and free expression,” Strickling wrote. “We appreciate the hard work and dedication of all the stakeholders involved in this effort and look forward to their continuing engagement.”

China Expanding Militarization of Disputed Islands

Into the equation comes Vietnam.

BI: Vietnam has discreetly fortified several of its islands in the disputed South China Sea with new mobile rocket launchers capable of striking China’s runways and military installations across the vital trade route, according to Western officials.

Diplomats and military officers told Reuters that intelligence shows Hanoi has shipped the launchers from the Vietnamese mainland into position on five bases in the Spratly islands in recent months, a move likely to raise tensions with Beijing.

The launchers have been hidden from aerial surveillance and they have yet to be armed, but could be made operational with rocket artillery rounds within two or three days, according to the three sources. More here from BusinessInsider.

Photos suggest China built reinforced hangars on disputed islands: CSIS

Reuters: Satellite photographs taken in late July show China appears to have built reinforced aircraft hangars on its holdings in disputed South China Sea islands, a Washington-based research group said.

The hangars on Fiery Cross, Subi and Mischief Reefs in the Spratly islands have room for any fighter jet in the Chinese air force, the Center for Strategic and International Studies (CSIS) said in a report on the photographs.

The images have emerged about a month after an international court in The Hague ruled against China’s claims in the resource-rich area, a decision rejected by Beijing. China claims most of the South China Sea, through which $5 trillion in ship-borne trade passes every year. The Philippines, Vietnam, Malaysia, Taiwan and Brunei have overlapping claims.

Related reading: U.S. publicly challenges China’s moves in disputed islands

The United States has urged China and other claimants not to militarize their holdings in the South China Sea.

CSIS said that apart from a brief visit to Fiery Cross Reef by a military transport plane earlier in the year, “there is no evidence that Beijing has deployed military aircraft to these outposts.”

The rapid construction of the hangars, however, “indicates that this is likely to change.”

A U.S. defense official, speaking on condition of anonymity, said it was unlikely the hangers would be used for civilian purposes.

“It’s not like the hangers are for mail planes, they are likely for jets,” the official said.

The official added, however, that the Chinese move was seen as skirting around the line rather than crossing it, and there would be increased concern if China actually moved in military aircraft and started using a reef as a forward operating base.

China has repeatedly denied doing so and has in turn criticized U.S. patrols and exercises for ramping up tensions.

“China has indisputable sovereignty over the Spratly islands and nearby waters,” China’s Defence Ministry said in a faxed response to a request for comment on Tuesday.

“China has said many times, construction on the Spratly islands and reefs is multipurpose, mixed, and with the exception of necessary military defensive requirements, are more for serving all forms of civil needs.”

The hangars all show signs of structural strengthening, CSIS said. The new images were first reported by the New York Times.

Other facilities including unidentified towers and hexagonal structures have also been built on the islets in recent months, CSIS said.

Ties around the region have been strained in the lead-up to and since The Hague ruling.

China has sent bombers and fighter jets on combat patrols near the contested South China Sea islands, state media reported on Saturday. Japan has complained about what it has said were multiple intrusions into its territorial waters around another group of islands in the East China Sea.

Beijing Defiant After Ruling on S. China Sea Claims

Hague Court Strikes Down Beijing’s South China Sea Claims

Due to Sanctions, North Korea Declares Act of War

Counter North Korean ThreatsPress Release

Media Contact 202-225-5021

Washington, D.C. – House Foreign Affairs Committee Chairman Ed Royce (R-CA) released the following statement regarding the joint South Korea-U.S. decision to deploy the U.S. Army’s Terminal High Altitude Area Defense System (THAAD) to defend against North Korean threats:

“The North Korean regime’s continued belligerence is a threat to South Korea and the entire Pacific region. The deployment of the THAAD defensive missile system will help protect against Kim Jong Un’s illicit weapons programs. Along with new sanctions mandated by my North Korea Sanctions and Policy Enhancement Act of 2016, this action demonstrates the strong resolve of the U.S. and South Korea to promote peace, stability, and respect for human rights.”

NKorea: US sanctions tantamount to act of war

SEOUL, South Korea (AP)— North Korea said Thursday that U.S. sanctions on leader Kim Jong Un and other top officials for human rights abuses are tantamount to declaring war.

The country’s Foreign Ministry issued a statement carried by the official Korean Central News Agency saying the announcement of sanctions on Kim and 10 other officials was “peppered with lies and fabrications” and demanding the sanctions be withdrawn.

“Now that the U.S. declared a war on the DPRK, any problem arising in the relations with the U.S. will be handled under the latter’s wartime law,” the statement says, using the initials of the country’s official name, the Democratic People’s Republic of Korea.

North Korea has already been sanctioned heavily because of its nuclear weapons program. However, Wednesday’s action by the Obama administration was the first time Kim has been personally targeted, and the first time that any North Korean official has been blacklisted by the U.S. Treasury in connection with reports of rights abuses.

The North Korean statement called the sanctions a “hideous crime.” It demanded that the sanctions be retracted or else “every lever and channel for diplomatic contact between the DPRK and the U.S. will be cut off at once.”

U.S. and North Korea do not have formal diplomatic relations, although they retain a channel of communication through the North’s diplomatic mission at the United Nations in New York.

State Department spokesman John Kirby said that the U.S. stands by its decision to impose the sanctions.

“We once again call on North Korea to refrain from actions and rhetoric that only further raise tensions in the region. I can’t see how this rhetoric does anything but that,” he told reporters in Washington when asked about the North Korean response.

North Korea frequently uses harsh rhetoric and denunciations of the United States, and threats of hostilities are not uncommon.

On Wednesday, the State Department also released a report, mandated by Congress, on human rights abuses in North Korea. Administration officials said it was intended to name and shame responsible officials in North Korea’s government, and send a message to lower and mid-ranking officials to think twice before engaging in acts of cruelty and oppression.

Secretary of State John Kerry said Thursday the new sanctions could cause North Korean officials to think twice before committing rights abuses.

“It is important,” he told reporters during a visit to Ukraine, “that all North Korean officials know and understand going forward that at all levels there are consequences for actions and they hopefully might consider the implications of those actions,” he said.

In addition to blacklisting Kim, the Treasury Department blacklisted officials at the Ministry of State Security — which it said administers political prison camps and is engaged in torture and inhumane treatment of detainees — and the Ministry of People‘s Security which operates a network of police stations, interrogation centers and labor camps.

The State Department said North Korean political prison camps hold between 80,000 to 120,000 prisoners, including children and other family members.

***** Mostly importantly from 6 months ago:

After Bomb Test, North Korea, Iran Continue Illicit Nuke Cooperation

After test explosion, lawmakers, experts warn of illicit nuclear axis

FreeBeacon: One day after North Korea claimed to have successfully tested a miniaturized hydrogen bomb, lawmakers and regional experts are warning that Pyongyang and Tehran are continuing an illicit clandestine partnership enabling the rogue nations to master nuclear technology.

Loopholes in the nuclear pact recently reached between Iran and the international community have allowed the Islamic Republic and North Korea to boost their nuclear cooperation, which includes the exchange of information and technology, according to material provided to Congress over the past year.

Iran is believed to be housing some of its key nuclear weapons-related technology in North Korea in order to avoid detection by international inspectors. Iranian dissidents once tied to the regime have disclosed that both countries have consulted on a nuclear warhead.

Following the test, however, the White House publicly denied that Iran and North Korea are working together, according to multiple statements issued by the administration on Wednesday.

Still, the Iranian-North Korean nuclear axis is coming under renewed scrutiny by lawmakers in light of Pyongyang’s most recent detonation, which is the fourth of its kind in recent years.

Congressional critics now warn that the Obama administration cannot be trusted to clamp down on North Korea given its recent efforts to appease Iran by dropping a new set of sanctions that were meant to target its illicit ballistic weapons program.

Iran, on the other hand, thinks that the bomb test will give it “media breathing space” by drawing attention away from its own nuclear pursuits, according to Persian-language reports carried by state-controlled media outlets closely aligned with the country’s Revolutionary Guards Corps.

“The entire world may well consider North Korea a failed state, but from the view point of the [Iranian Revolutionary Guard Corps], North Korea is a success story and a role model: A state which remains true to its revolutionary beliefs and defies the Global Arrogance,” said Ali Alfoneh, an expert on the inner workings of the Iranian regime.

Prominent members of Congress are now warning that North Korea’s latest nuclear test is a sign of what could come from Iran, which they claim is closely following the North Korean nuclear playbook.

Rep. Ileana Ros Lehtinen (R, Fla.), chair of House’s foreign relations subcommittee on the Middle East and North Africa, described North Korea’s latest test as “a precursor to what we can expect from Iran in a few years.”

Iran, Ros-Lehtinen told the Washington Free Beacon, “is following the North Korea playbook” and “stands to be the main beneficiary of Pyongyang’s continued nuclear progress.”

“Iran and North Korea have a history of collaboration on military programs and have long been suspected of collaborating on nuclear related programs,” she said, noting that the Iran deal provides the Islamic Republic with the cash necessary to purchase advanced nuclear technology.

“Iran won’t even need to make any progress on its domestic nuclear program—once it perfects its ballistic missiles it could purchase a weapon from North Korea and all of the conditions and monitoring in the [nuclear deal] would be ineffective in detecting or stopping that,” she said.

“Let’s not forget, Iranians have reportedly been present at each of North Korea’s previous nuclear tests,” Sen. David Perdue (R., Ga.), a member of the Senate Foreign Relations Committee, said in a statement. “We cannot turn a blind eye to ongoing ties between North Korea and Iran. President Obama must act now to stop these rogue nations from supporting each other’s nuclear weapons efforts aimed at harming America and our allies.”

Rep. Patrick Meehan (R., Pa.) expressed concern that Iran is following in North Korea’s footsteps, and that the nuclear deal will collapse just as  Bill Clinton’s agreement with North Korea did in the mid-1990s.

“This test is just the latest sign that North Korea is a regime hell-bent on building and developing a sophisticated nuclear program,” Meehan said. “The passage of the 1995 nuclear deal with [North Korea] came with it promises from the Clinton administration of accountability and transparency for Kim’s regime.”

“Those same sort of assurances are echoed today by the Obama White House as it seeks to assure us that its own deal with Iran will be more successful,” Meehan said. “The Iran deal and the North Korean deal were sold with the same promises, the same assurances, to the American people, sometimes even word-for-word.”

“When you put the rhetoric of the 90’s and the North next to the rhetoric of today and Iran, it’s hard to tell the difference,” he added.

Sen. Mark Kirk (R., Ill.), a chief advocate for increased economic sanctions on Iran, highlighted what he called North Korea’s “alarming record” of “cooperating on missile development with Iran.”

With Iran set to receive billions of dollars in sanctions relief later this month, regional experts have informed Congress that the nuclear deal “creates conditions and incentives that are highly likely to result in the expansion” of Iran and North Korea’s illicit nuclear exchange, according to testimony submitted last year by Claudia Rossett, an expert at the Foundation for Defense of Democracies.

The deal fails to “cut off the pathways between Iran and nuclear-proliferating North Korea” and even has made “it safer for Iran to cheat,” according to Rossett’s testimony.

Additionally, sanctions relief gives Iran a chance to “go shopping in North Korea,” she said.

The Obama administration denied the ties between Iran and North Korea, telling reporters on Wednesday that “they’re entirely two different issues altogether.”

“We consider the Iran deal as a completely separate issue handled in a completely different manner than were the—than was the Agreed Framework with North Korea,” said John Kirby, a State Department spokesman, echoing similar remarks issued by the White House.

The administration’s hesitance to link the two nuclear issues has angered some critics of the Iran deal.

“This is exactly the kind of dishonest incoherence that the Iran nuclear deal forces its advocates to defend,” said Omri Ceren, the managing director of press and strategy at The Israel Project, a D.C.-based organization that works with journalists on Middle East issues.

“The Obama administration can’t admit that the [deal] provided the Iranians with hundreds of billions of dollars, some of which they’re going to invest in nuclear research beyond their borders, allowing them to get sanctions relief while advancing their program anyway,” Ceren said. “So instead they have to deny that there are links between Iran and North Korea’s nuclear program, even though that’s laughable.”