Category Archives: Cyber War
More TPP, Transpacific Partnership Pact Facts
During Hillary Clinton’s time as Secretary of State, she was for the TPP and now, well she has flipped on that position.
This is yet another shot across the bow of the White House where she is separating herself from Barack Obama, but is she really?
Hillary Clinton announced Wednesday that she opposes the Trans-Pacific Partnership trade deal.
“I’m continuing to learn about the details of the new Trans-Pacific Partnership, including looking hard at what’s in there to crack down on currency manipulation, which kills American jobs, and to make sure we’re not putting the interests of drug companies ahead of patients and consumers,” she said in a statement. “But based on what I know so far, I can’t support this agreement.”
At the end of the segment of Senator Rand Paul this week with Bret Baier on Fox, Paul describes some of the classified maneuvers of the TPP.
One particular group, left leaning for sure is WikiLeaks, who has been an interesting champion of trying to get all the details on the Transpacific Partnership Part.
Wikileaks has released the Intellectual Property Rights chapter of the controversial Trans-Pacific Partnership (TPP) agreement, which they claim contains rules and regulations that would have “wide-ranging effects on internet services, medicines, publishers, civil liberties and biological patents.”
The idea behind the TPP is free trade – amongst the member states, it aims to lower trade barriers, create a common standard for intellectual property, enforce labour and environmental law standards and promote economic growth.
The agreement has come under severe criticism and scrutiny, however, for the policy of total secrecy during the years-long negotiations.
Others have criticised the more stringent intellectual property laws it would introduce, which could extend copyright terms and mean harsher penalties for file-sharers.
A number of trade unions and economists, such as Joseph Stiglitz, have said the agreement “serves the interest of the wealthiest”, and caters to the needs of corporations rather than the citizens of member nations.
Concerns have also been raised over the effect it could have on the cost of medicines – by extending the intellectual property rights of certain branded drugs, delays in the development of cheaper, ‘generic’ versions of these drugs could ensue, potentially leading to poorer people having to wait much longer than the wealthy to get access to the newest medicines.
The chapter on these intellectual property issues is what has been leaked by Wikileaks, and is one of the more controversial chapters in the whole agreement.
Peter Maybarduk, the program director at Public Citizen’s Global Access to Medicines, said that if the TPP is ratified, “people in the Pacific-Rim countries would have to live by the rules of this leaked text.”
“The new monopoly rights for big pharmaceutical firms would compromise access to medicines in TPP countries. The TPP would cost lives.”
The document, dated 5 October, was apparently produced on the day it was announced that the 12 member states to the treaty had reached an agreement after five and a half years of negotiations.
The nations of Vietnam, Peru, Mexico, Malaysia, Japan, Canada, Australia, USA, Singapore, New Zealand, Chile and Brunei are all prospective member states to the free-trade agreement, between them representing over 40 per cent of the world economy.
Despite the leak, the final text of the TPP is reportedly being held until after the Canadian general election, on 19 October.
While, as Wikileaks says, there still needs to a be a final “legal scrub” of the document before it is finished, negotiations on the document between signatories have now ended.
LinkedIn Infiltrated by Iranian Hackers
Going back to 2012, Congress held hearings on how the United States is losing the cyber espionage war. To date, there has been no ground gained outside of the scope of creating more task forces and adding cyber personnel. To stop the intrusions by China, Russia and Iran has been a failure.
For a report on the major hacks in 2014, go here. This is by no means a complete list of corporations but it does give a view into the depth of the cyber threat.
WASHINGTON: The United States is “losing the cyber espionage war” against China, Russia and other countries, but even in the face of such a grave threat the country cannot agree on how to protect its precious intellectual seed capital from these predations, the chairman of the House Intelligence Committee says.
“We are running out of time on this,” Rep. Mike Rogers, respected for working closely with his ranking member, said in a speech at today’s Intelligence and National Security Alliance‘s (INSA) cyber conference here.
China is stealing intellectual property on a massive scale, as Gen. Keith Alexander, head of both the National Security Agency and Cyber Command, has made clear with his estimates of such thefts topping $1 trillion. While China is not alone, U.S government officials have made clear that no country engages in cyber espionage as systematically, as thoroughly or as broadly as does the People’s Republic of China.
“China is investing hugely in this technology,” Rogers notes. And the impact of that investment is felt not only in the economic sphere, important as that is. Cyber is now an integral of military planning and operations, as the Russians have demonstrated several times.
To help stem those thefts and to protect critical infrastructure such as power grids, Rogers and Rep. Dutch Ruppersberger, his Democratic colleague on the HPSCI, met with hundreds of business leaders, civil rights and privacy groups over several months as they began to craft what became their 13-page bill. It would have offered businesses liabliity insurance in return for their agreeing to share threat information with the government. The government also would have shared threat information with the businesses.
But there was a catch. Because of how sensitive sources and methods are in the cyber world, the businesses would have to get top secret clearance for senior officials, build and maintain a Sensitive Compartmented Information Facility (SCIF), and maintain the physical and bureaucratic complex required of anyone dealing with classified information.
As Rogers put it, his committee had offered industry a “carrot and a stick.” But his colleagues in the Senate wanted to chart a different path, so the Rogers-Ruppersberger bill is on life support. I asked him today what he planned to do with his “dead” bill. “All is not lost. I am reaching out to members of the Senate just to see what our options are,” as is Ruppersberger. “We are not giving up.”
LinkedIn profiles said to be part of Iranian cyber-espionage campaign
WashingtonTimes: Iranian hackers are suspected of operating a network of bogus LinkedIn accounts that security researchers believe is part of a campaign targeting employees of corporations in the Middle East.
By creating phony profiles containing fabricated job histories and endorsements from other concocted accounts, researchers at Dell said this week that a group of hackers, likely acting on behalf of Iran, attempted to collect intelligence from legitimate LinkedIn users employed in the Arabian and African telecommunications and defense industries. Twenty-five fake LinkedIn accounts have been identified by researchers working for the company’s SecureWorks Counter Threat Unit, including those of supposed recruitment consultants with hundreds of connections apiece, Dell said on Wednesday.
“CTU researchers assess with high confidence the purpose of this network is to target potential victims through social engineering,” Dell said in the latest report, referring to a tactic in which sensitive data becomes compromised when an individual reveals information to an attacker, often under false pretenses.
Dell has named the actors “Threat Group-2889” and said it’s likely the same organization dubbed “Operation Cleaver” in a report released last year by Cylance, a security firm that linked the group to Iran and claimed it was working to undermine the security of over 50 companies across 15 industries in the region, possibly as retaliation for the U.S.-led Stuxnet campaign.
“Creating a network of seemingly genuine and established LinkedIn personas helps TG-2889 identify and research potential victims. The threat actors can establish a relationship with targets by contacting them directly, or by contacting one of the target’s connections. It may be easier to establish a direct relationship if one of the fake personas is already in the target’s LinkedIn network,” Dell said.
“The level of detail in the profiles suggests that the threat actors invested substantial time and effort into creating and maintaining these personas.”
According to the findings published by Cylance in December, the “Operation Cleaver” hackers used social engineering to trick targets into installing malware that would allow data to then be stolen from infected computers.
Cylance’s report had linked the group to attacks across the world, but Dell’s CTU team said the LinkedIn campaign seems to largely target account holders in the Middle East and northern Africa, a quarter of which work in telecommunications.
“Updates to profile content such as employment history suggest that TG-2889 regularly maintains these fake profiles. The persona changes and job alterations could suggest preparations for a new campaign, and the decision to reference Northrup Grumman and Airbus Group may indicate that the threat actors plan to target the aerospace vertical,” Dell said.
Last month, Director of National Intelligence James Clapper told a congressional committee that Iran uses its cyber program to carry out “asymmetric but proportional retaliation against political foes, as well as a sophisticated means of collecting intelligence.” He went on to blame Iranian hackers for cyberattacks against American banks in 2012 and 2013, as well as an assault last year on the Las Vegas Sands casino company.
Gen. Allen Quit, Russia Demands U.S. Aircraft Leave Syria
“They could start at any moment,” the official said. “They are ready.”After several days of Russian familiarization flights, there is no reason they could not begin, the official added. And Russian drones have been collecting potential targeting information in their flights. But the U.S. doesn’t know what the Russians have in mind and when they will make a decision on airstrikes.
Four Russian Su-34 Fullback fighter jets are now at the Latakia air base in Syria, and more than 600 Russian troops are in place.
Pentagon spokesman Peter Cook told reporters Tuesday that Secretary of Defense Ash Carter directed his staff to “open lines of communication with Russia on de-confliction.”
The timing of these discussions is to be worked out in the coming days. The purpose of the discussions is “to ensure the safety of coalition air crews,” he said.
Cook added that the two nations have common ground when it comes to fighting ISIS, also known as ISIL, with Carter making clear that “the goal should be to take the fight to ISIL and not to defend the Assad regime.”
The Russia government unanimously voted to authorize Russia troops in Syria, meanwhile, Putin tells the United States to remove all fighter aircraft out of Syria and the region. Never in the history of the United States has our country taken orders from a foreign power much less Russia. It is proven under Barack Obama the United States has taken a back seat to Iran in Iraq and now Russia in Syria.
France has launched airstrikes and Bashir al Assad stays in power. At the behest and orders by the White House, the Pentagon has been sent back to the locker room.
How does this begin and end?
The official told Fox News that Russian diplomats sent an official demarche ordering U.S. planes out of Syria, adding that Russian fighter jets were now flying over Syrian territory. U.S. military sources told Fox News that U.S. planes would not comply with the Russian demand.
“There is nothing to indicate that we are changing operations over Syria,” a senior defense official said.
“We have had every indication in recent weeks that (the Russians) were going to do something given the build-up,” another defense official added.
The move by Moscow marks a major escalation in ongoing tensions between the two countries over military action in the war-torn country and comes moments after Russian lawmakers formally approved a request from the country’s president, Vladimir Putin, to authorize the use of troops in Syria.
The Russian demand also mirrors one made by Turkey this past July, when Ankara asked U.S. planes to fly only in airspace south of Mosul, Iraq. In that case, 24 Turkish jets bombed Kurdish positions, catching the U.S. off guard.
Can Putin succeed where White House has not in ISIS fight?
Warm-water port key to Putin’s interest in Syria?
President Obama attempts to save face on Syrian conflict
The Federation Council, the upper house of Russia’s parliament, discussed Putin’s request for the authorization behind the closed doors. Sergei Ivanov, chief of Putin’s administration, said in televised remarks that the parliament voted unanimously to approve the request.
Ivanov said the authorization is necessary “not in order to achieve some foreign policy goals” but “in order to defend Russia’s national interests.”
Putin is obligated to request parliamentary approval for any use of Russian troops abroad, according to the Russian constitution. The last time he did so was before Russia annexed Ukraine’s Crimean Peninsula in March 2014.
Putin’s request comes after his bilateral meeting with President Barack Obama on the sidelines of the United Nations General Assembly meeting in New York, where the two were discussing Russia’s recent military buildup in Syria.
A U.S. official told Fox News Monday the two leaders agreed to discuss political transition in Syria but were at odds over the role that Assad should play in resolving the civil conflict. The official said Obama reiterated to Putin that he does not believe there is a path to stability in Syria with Assad in power. Putin has said the world needs to support Assad because his military has the best chance to defeat ISIS militants.
Putin said the meeting, which lasted a little over 90 minutes, was “very constructive, business-like and frank”.
“We are thinking about it, and we don’t exclude anything.” Putin told reporters at the time
The Kremlin reported that Putin hosted a meeting of the Russian security council at his residence Tuesday night outside of Moscow, saying that they were discussing terrorism and extremism.
On Tuesday, French Foreign Minister Laurent Fabius called on Russia to make a real contribution to the fight against ISIS, telling reporters at the United Nations that Moscow “is against the terrorists, it’s not abnormal to launch strikes against them.”
“The international community has hit (ISIS). France has hit (ISIS), Bashar al-Assad very little, and the Russians not at all. So one has to look at who does what,” Fabius added.
Russia has been a staunch supporter of Syrian president Bashar al-Assad during Syria’s bloody civil war, and multiple reports have previously indicated that Russian troops are aiding Assad’s forces. Israel’s defense minister also said earlier this month that Russian troops are in Syria to help Assad fight the ISIS terror group.
On Wednesday, Reuters reported that Russia’s Foreign Ministry told the news agency Interfax that a recently established operations center in Baghdad would help coordinate air strikes and ground troops in Syria. Fox News first reported last week that the center had been set up by Russian, Syrian and Iranian military commanders with the goal of working with Iranian-backed Shia militias fighting ISIS.
Over the weekend, the Iraqi government announced that it would begin sharing “security and intelligence” information with Russia, Syria and Iran to help combat ISIS.
Meanwhile, intelligence sources told Fox News Friday that Iranian Quds Force commander Qasem Soleimani met with Russian military commanders in Baghdad September 22. Fox News reported earlier this month that Soleimani met Putin in Moscow over the summer to discuss a joint military plan in Syria.
“The Russians are no longer advising, but co-leading the war in Syria,” one intelligence official said at the time.
Fox News’ Jennifer Griffin and Lucas Tomlinson and the Associated Press contributed to this report.
Obama vs. China President Xi, Hacking
A new unit of the People’s Liberation Army was identified last week by cyber security researchers as Unit 78020 based in Kunming, in Yunnan Province.
The unit’s operations have been tracked for five years and have included targeted attacks on states in the region that are challenging Beijing’s strategic program of seeking to control the sea through building up small islands and reefs and then deploying military forces on them.
“Unit 78020 conducts cyber espionage against Southeast Asian military, diplomatic, and economic targets,” according to a security report on the unit that included a satellite photo of the unit’s Kunming compound.
“The targets include government entities in Cambodia, Indonesia, Laos, Malaysia, Myanmar, Nepal, the Philippines, Singapore, Thailand, and Vietnam as well as international bodies such as United Nations Development Program (UNDP) and the Association of Southeast Asian Nations (ASEAN).” More details here.
Chinese president Xi Jinping is supposed to have dinner this evening with U.S. president Barack Obama. Wonder if the name Ge Xing will come up?Ge Xing is the subject of a joint report published this morning by ThreatConnect and Defense Group Inc., computer and national security service providers respectively. Ge is alleged to be a member of the People’s Liberation Army unit 78020, a state-sponsored hacking team whose mission is to collect intelligence from political and military sources to advance China’s interests in the South China Sea, a key strategic and economic region in Asia with plenty of ties to the U.S.
The report connects PLA 78020 to the Naikon advanced persistent threat group, a state-sponsored outfit that has followed the APT playbook to the letter to infiltrate and steal sensitive data and intellectual property from military, diplomatic and enterprise targets in a number of Asian countries, as well as the United Nations Development Programme and the Association of Southeast Asian Nations (ASEAN).
Control over the South China Sea is a focal point for China; through this region flows trillions of dollars of commerce and China has not been shy about claiming its share of the territory. The report states that China uses its offensive hacking capabilities to gather intelligence on adversaries’ military and diplomatic intentions in the regions, and has leveraged the information to strengthen its position.“The South China Sea is seen as a key geopolitical area for China,” said Dan Alderman, deputy director of DGI. “With Naikon, we see their activity as a big element of a larger emphasis on the region and the Technical Reconnaissance Bureau fitting into a multisector effort to influence that region.”The report is just the latest chess piece hovering over Jinping’s U.S. visit this week, which began in earnest yesterday with a visit to Seattle and meetings with giant technology firms such as Microsoft, Apple and Google, among others.
Those companies want to tap into the growing Chinese technology market and the government there is using its leverage to get them to support stringent Internet controls imposed by the Chinese government. A letter sent to American technology companies this summer, a New York Times report last week, said that China would ask American firms to store Chinese user data in China. China also reportedly asked U.S.-built software and devices sold in China to be “secure and controllable,” which likely means the Chinese would want backdoor access to these products, or access to private encryption keys.Jinping, meanwhile, tried to distance himself from the fray when he said in a Wall Street Journal interview: “Cyber theft of commercial secrets and hacking attacks against government networks are both illegal; such acts are criminal offences and should be punished according to law and relevant international conventions.”Journal reporter Josh Chin connected with Ge Xing over the phone and Ge confirmed a number of the dots connected in the report before hanging up on the reporter and threatening to report him to the police.
While that never happened, the infrastructure connected to Ge and this slice of the Naikon APT group, was quickly shut down and taken offline. In May, researchers at Kaspersky Lab published a report on Naikon and documented five years of activity attributed to the APT group. It describes a high volume of geo-politically motivated attacks with a high rate of success infiltrating influential organizations in the region. The group uses advanced hacking tools, most of which were developed externally and include a full-featured backdoor and exploit builder.Like most APT groups, they craft tailored spear phishing messages to infiltrate organizations, in this case a Word or Office document carrying an exploit for CVE-2012-0158, a favorite target for APT groups. The vulnerability is a buffer overflow in the ActiveX controls of a Windows library, MSCOMCTL.OCX. The exploit installs a remote administration tool, or RAT, on the compromised machine that opens a backdoor through which stolen data is moved out and additional malware and instructions can be moved in.Chin’s article describes a similar attack initiated by Ge, who is portrayed not only as a soldier, but as an academic.
The researchers determined through a variety of avenues that Ge is an active member of the military, having published research as a member of the military, in addition to numerous postings to social media as an officer and via his access to secure locations believed to be headquarters to the PLA unit’s technical reconnaissance bureau.“Doing this kind of biopsy, if you will, of this threat through direct analysis of the technical and non-technical evidence allows us to paint a picture of the rest of this group’s activity,” said Rich Barger, CIO and cofounder of ThreatConnect. “We’ve had hundreds of hashes, hundreds of domains, and thousands of IPs [related to PLA unit 78020].
Only looking at this from a technical lens only gives you so much. When you bring in a regional, cultural and even language aspect to it, you can derive more context that gets folded over and over into the technical findings and continues to refine additional meaning that we can apply to the broader group itself.”The report also highlights a number of operational security mistakes Ge made to inadvertently give himself away, such as using the same handle within the group’s infrastructure, even embedding certain names in families of malware attributed to them. All of this combined with similar mistakes made across the command and control infrastructure and evidence pulled from posts on social media proved to be enough to tie Ge to the Naikon group and elite PLA unit that is making gains in the region.“If you look at where China is and how assertive they are in region, it might be a reflection of some of the gains and wins this group has made,” Barger said. “You don’t influence what they’re influencing in the region if you don’t have the intel support capabilities fueling that operational machine.”