Space X Zuma Launched Failed, or did it?

Could this have been a classified payload to destroy North Korea’s own spy satellite or their next ICBM launch or Iran’s or Russia’s such that the real answers will never be forthcoming, meaning it is a ploy? Maybe even China?

Image result for zuma payload photo and more information here.

Space-Track has cataloged the Zuma payload as USA 280, international designation 2018-001A. Catalog number 43098. No orbit details given. No reentry date given, but for a secret payload it might not be. Implication is Space-Track thinks it completed at least one orbit.

Related reading: Did SpaceX’s secret Zuma mission actually fail?

SpaceX’s latest rocket may have launched successfully – but the mission didn’t end as a win. The Zuma payload it was carrying, a mysterious classified piece of cargo for the U.S. government believed to be a spy satellite, was lost after it failed to separate from the second stage of the rocket after the first stage of the Falcon 9 separated as planned and returned to Earth.

The WSJ reports, and we’ve confirmed separately, that the payload is thought to have fallen back through the Earth’s atmosphere after reaching space, because of the failure to separate. The failure is one that can happen when cargo doesn’t properly detach as planned, since the second stage is designed to fall back to Earth and burn up in re-entry.

SpaceX had launched as planned on January 7 in its target window, and recovered the first stage of the booster with a landing at its Cape Canaveral facility. Because of the nature of the mission, coverage and information regarding the progress of the rocket and its payload from then on was not disclosed.

The payload, codenamed Zuma, was contracted for launch by Northrop Grumman by the U.S. government, and Northrop selected SpaceX as the launch provider. SpaceX had previously launched the U.S. Air Force’s X-37B spacecraft, and was approved for flying U.S. government payloads with national security missions.

The satellite was likely worth billions, according to the WSJ, which makes this the second billion-dollar plus payload that SpaceX has lost in just over two years; the last was Facebook’s internet satellite, which was destroyed when the Falcon 9 it was supposed to launch on exploded during preflight preparations in September 2016.

This could be a significant setback for SpaceX, since these kinds of contracts can be especially lucrative, and it faces fierce competition from existing launch provider ULA, jointly operated by Boeing and Lockheed Martin.

We’ve reached out to SpaceX and will update if they provide additional comment.

Update – SpaceX provided the following statement regarding the mission, which could suggest the fault lies with something provided by launch partner Northrop Grumman or the payload itself:

“We do not comment on missions of this nature; but as of right now reviews of the data indicate Falcon 9 performed nominally.“

Iran’s Supreme Leader, the Nuclear Deal, Protests and Boeing

It is the conglomerate that the Supreme Leader, the Ayatollah Khamenei owns exclusively. “Setad Ejraiye Farmane Hazrate Emam,” or Setad.

Image result for Setad Ejraiye Farmane Hazrate Emam

Setad was originally sanctioned by the U.S. Treasury in June 2013. The conglomerate “produces billions of dollars in profits for the Iranian regime each year,” said David Cohen, then the Treasury’s under secretary for terrorism and financial intelligence, at a Senate banking committee hearing that year.

Setad, Cohen said at the time, controls “massive off-the-books investments” hidden from the Iranian people and regulators.

All entities sanctioned for being part of the Iranian government are being taken off the SDN list as part of the nuclear deal, also called the Joint Comprehensive Plan of Action (JCPOA), though U.S. persons and entities will still be banned from dealing with them.

In January of 2017, a review by Reuters noted: But a Reuters review of business accords reached since then shows that the Iranian winners so far are mostly companies owned or controlled by the state, including Iran’s Supreme Leader, Ayatollah Ali Khamenei.

Of nearly 110 agreements worth at least $80 billion that have been struck since the deal was reached in July 2015, 90 have been with companies owned or controlled by Iranian state entities, the Reuters analysis shows.

In December of 2017: Treasury Department officials must publish a report chronicling the financial assets of Iran’s top leaders, under a bill that passed the House on Wednesday.

The legislation, which passed 289-135, must still clear the Senate before President Trump can sign it into law. It’s a potential boon to Iranian dissidents against the regime, who stand to gain insight into corruption by top officials.

Related:

Podcast – Upheaval in Iran: Causes and Consequences

Meanwhile, as the protests continue in Iran against the regime and rightly so, questions arise due to not only Senate votes on sanctions but staying with the Joint Comprehensive Plan of Action, meaning the Iran nuclear deal.

Image result for Setad Ejraiye Farmane Hazrate Emam photo

Why is there even a question based on additional facts surfacing in the last year? Well, the left and those that remain with John Kerry and Barack Obama are adding new pressures to stay in the JCPOA. Further, complications arise from those countries that are also part of the deal. They too want the deal sustained.

In a story titled “U.S. security experts back Iran nuclear deal, as Trump faces deadlines,” Reuters reports that a coalition of national security experts want the president to continue the Iran deal. The report claims, without any context, that all of the people who signed a letter in favor of the deal are “national security experts.” Additionally, these “experts” are from an organization called the “National Coalition to Prevent an Iranian Nuclear Weapon.”

It turns out, however, that some of those listed on the document have severe conflicts of interests, none of which were disclosed in the letter.

It also turns out that the National Coalition to Prevent an Iranian Nuclear Weapon is not an actual organization. A Google search of the group turned up nothing before Monday. The group was created this week with the apparent purpose of garnering support for the nuclear deal. None of this is reported in the Reuters article. It is only revealed through the group’s statement provided on The National Interest website.

The outfit’s title also presumes its members are national security hawks, when this is far from the case.

Members of the “National Coalition” include a who’s who of the prominent organizers of the campaign to rally support for the Obama administration’s nuclear deal with Tehran.

Included on the list is Joseph Cirincione, who served as the money man for President Obama’s Iran “echo chamber.” Cirincione has admitted to paying off a “network of 85 organizations and 200 individuals” who were “decisive in the battle for public opinion” over the Iran deal.

Gary Sick, another signee, was one of the chief organizers of the Iran echo chamber. According to the Washington Free Beacon, Sick created an invite-only listserv to distribute pro-Tehran talking points to Obama-friendly journalists and influential figures.

The coalition also includes Ambassador Thomas Pickering, who is a paid lobbyist for Boeing. The aviation company is attempting to secure a multi-billion-dollar jetliner deal with the Iranian regime. If the Iran deal falls through, so does Boeing’s deal.

Paul Pillar, a disgraced former CIA officer who was also on the letter, once drafted talking points arguing that it’s not a big deal if Iran is able to develop a nuclear weapon. “If Iran develops a nuclear weapon, the United States and the West could live with it, without important compromise to U.S. interests,” he wrote, according to Eli Lake of Bloomberg News.

It remains a mystery what President Trump will decide this time around. He has been troubled by Iran’s violent response to countrywide protests. The president has leveraged social media and several executive departments to raise awareness about the plight of Iranian protesters. He has also mulled enacting further sanctions against the regime.

As an aside, there too is pressure from Boeing, they want to protect the sale agreements of planes to Iran such that they have offered to ‘finance’ the payments, essentially layaway. Iran is looking for a method to make payments of $44B to both Air Bus and Boeing. Humm….but that Supreme leader has a major conglomerate remember?

 

 

CDC Planning for a Nuclear Attack

“Join us for this session of Grand Rounds to learn what public health programs have done on a federal, state, and local level to prepare for a nuclear detonation,” urges the CDC email advising people on one of the agency’s mailing lists about the session. “Learn how planning and preparation efforts for a nuclear detonation are similar and different from other emergency response planning efforts.”

The CDC holds grand rounds virtually monthly on topics such as birth defects prevention, diseases spread by ticks, and sodium reduction. A previous grand rounds on radiological and nuclear disaster preparedness was offered in March 2010. More here.

Image result for nuclear detonation photo

Hawaii has already been preparing and practicing.

Perhaps CNN and MSNBC would do well to report this rather than the constant harangue of Donald Trump… CNN kinda has reported this, but you had to look hard to find it.

Welcome to 2018. It’s been an apocalyptic start to the new year. And according to the US Centers for Disease Control and Prevention, the worst could be yet to come.

The agency wants the American public to get ready for the possibility of a nuclear strike, reports Politico, and it has posted a notice for a Jan. 16 briefing titled “Public Health Response to a Nuclear Detonation.” The session in Atlanta, Georgia will include experts on radiation and disaster preparedness and discuss what federal, state and local governments are doing to prepare.

The CDC is pictured. | AP Photo Over the weekend, a former chairman of the joint chiefs of staff under two presidents said the U.S. is closer to nuclear war with North Korea “than we have ever been.” | AP Photo

While they are meeting, here is a 204 page document for review.

Kinda serious here:

The CDC wants the public to be prepared for nuclear war.

The agency has posted a notice touting a Jan. 16 briefing about the work that federal, state and local governments are doing in case of a possible nuclear strike.

CDC on Friday said that the event has been in the works since last April.

The briefing is part of the agency’s monthly “Grand Rounds” sessions at its Atlanta headquarters. Upcoming briefings are mostly devoted to more conventional public health concerns, such as childhood vaccinations and hepatitis C. More here.

*** Here is a recommendation document by government agencies for review.

While a nuclear detonation is unlikely, it would have devastating results and there would be limited time to take critical protection steps. Despite the fear surrounding such an event, planning and preparation can lessen deaths and illness. For instance, most people don’t realize that sheltering in place for at least 24 hours is crucial to saving lives and reducing exposure to radiation. While federal, state, and local agencies will lead the immediate response efforts, public health will play a key role in responding.

Join us for this session of Grand Rounds to learn what public health programs have done on a federal, state, and local level to prepare for a nuclear detonation. Learn how planning and preparation efforts for a nuclear detonation are similar and different from other emergency response planning efforts.

 

 

Singapore IP Address Hacking the Winter Olympics

BBC: Hackers have attempted to steal sensitive data from groups involved with next month’s Winter Olympics, cyber-security firm McAfee said.

The report found malware-infected emails were sent last month to organisations linked to the Pyeongchang Games.

It did not identify those responsible, but said more attacks tied to the upcoming Olympics were likely.

In similar past attacks, hackers tried to obtain passwords and financial data.

‘Casting net wide’

McAfee said a number of groups associated with the Olympics had received malicious emails – including several affiliated with ice hockey.

“The majority of these organisations had some association with the Olympics, either in providing infrastructure or in a supporting role,” the security firm said.

“The attackers appear to be casting a wide net with this campaign.”

The emails were sent from a Singapore IP address and told readers to open a text document in Korean.

McAfee said the hackers were trying to trick recipients into believing the emails had come from South Korea’s National Counter-Terrorism Center – which at the time was in the process of conducting anti-terror drills in the region.

In some cases the hackers used a technique in known as steganography which hides malware in text and images.

McAfee echoed recent warnings from University of California researchers to expect more cyber-attacks targeting major sporting events.

“With the upcoming Olympics, we expect to see an increase in cyber attacks using Olympics-related themes,” the security firm said.

It comes as Pyongyang prepares to hold official talks with South Korea for the first time in more than two years.

North Korea accepted an offer to attend the meeting on 9 January that will focus on finding a way for its athletes to attend the Games.

***

It uses a previously unseen form of malware designed to hand control of the victim’s machine over to the attackers. Among those sent the messages are individuals associated with the ice hockey tournament at the Games. The attack has been dubbed ‘Operation PowerShell Olympics’ by the researchers at McAfee Labs, who uncovered it taking place in late December.

winter-oympic-phishing.png

The lure document used in the cyber-attacks targeting the South Korea Winter Olympics.

Image: McAfee Labs

During the course of the investigation, researchers discovered a cached Apache server log which showed an IP address from South Korea connecting to the specific URL paths contained in the PowerShell implants, indicating that the intended targets were likely to have been infected.

Further investigation revealed the IP address from the PowerShell implant was connected to an anonymous domain provider based in Costa Rica, with the attacker using this domain to link up to the South Korean Ministry of Agriculture and Forestry, which the attacker has somehow managed to use parts of to carry out the attack.

Researchers are uncertain how many have been infected by the attack, but the campaign is thought to have targeted a wide range of South Korean organisations in the run up to the Winter Olympics. In similar campaigns in the past, victims were targeted for their passwords and financial information.

The phishing document was created on December 22, but rather than containing macros, it uses OLE (Objective Linking and Embedding) streams to carry out the attack. The document has been created by the same author, ‘John’, who created the malicious PowerShell script.

However, despite some evidence about how the attacks took place, researchers haven’t been able to identify the perpetrator — but they do note that whoever is behind the campaign must be fluent in the Korean language and the motive is to gather intelligence about organisations involved in the South Korea-hosted Winter Olympics.

“Technical details alone are often not enough to determine attribution. We are able to ascertain that the attackers have been trained in Korean language to ensure that the targets open the attachment, and the objective seems to be to gather information on the planning, direction and infrastructure related to the Olympics,” said Sherstobitoff.

Researchers warn that in the run up to the Winter Olympics, attackers will continue to use the event as a lure to carry out cyber-attacks.

To avoid falling victim to such attacks — including fileless malware distributed as part of Operation Powershell Olympics — organisations should educate their employees to be mindful of suspicious emails and unexpected attachments. More here from zdnet

Huma Abedin Shared Official Passwords

A grand jury in the Northern District of California has indicted four defendants, including two officers of the Russian Federal Security Service (FSB), for computer hacking, economic espionage and other criminal offenses in connection with a conspiracy, beginning in January 2014, to access Yahoo’s network and the contents of webmail accounts. The defendants are Dmitry Aleksandrovich Dokuchaev, 33, a Russian national and resident; Igor Anatolyevich Sushchin, 43, a Russian national and resident; Alexsey Alexseyevich Belan, aka “Magg,” 29, a Russian national and resident; and Karim Baratov, aka “Kay,” “Karim Taloverov” and “Karim Akehmet Tokbergenov,” 22, a Canadian national and a resident of Canada.

The defendants used unauthorized access to Yahoo’s systems to steal information from about at least 500 million Yahoo accounts and then used some of that stolen information to obtain unauthorized access to the contents of accounts at Yahoo, Google and other webmail providers, including accounts of Russian journalists, U.S. and Russian government officials and private-sector employees of financial, transportation and other companies. One of the defendants also exploited his access to Yahoo’s network for his personal financial gain, by searching Yahoo user communications for credit card and gift card account numbers, redirecting a subset of Yahoo search engine web traffic so he could make commissions and enabling the theft of the contacts of at least 30 million Yahoo accounts to facilitate a spam campaign.

***

An international flight risk

Enter Hillary Clinton, Sidney Blumenthal and Huma Abedin….

Image result for huma abedin photo

Huma Abedin forwarded sensitive State Department emails, including passwords to government systems, to her personal Yahoo email account before every single Yahoo account was hacked, a Daily Caller News Foundation analysis of emails released as part of a lawsuit brought by Judicial Watch shows.

Abedin, the top aide to former Secretary of State Hillary Clinton, used her insecure personal email provider to conduct sensitive work. This guarantees that an account with high-level correspondence in Clinton’s State Department was impacted by one or more of a series of breaches — at least one of which was perpetrated by a “state-sponsored actor.”

The U.S. later charged Russian intelligence agent Igor Sushchin with hacking 500 million Yahoo email accounts. The initial hack occurred in 2014 and allowed his associates to access accounts into 2015 and 2016 by using forged cookies. Sushchin also worked for the Russian investment bank Renaissance Capital, which paid former President Bill Clinton $500,000 for a June 2010 speech in Moscow.

A separate hack in 2013 compromised three billion accounts across multiple Yahoo properties, and the culprit is still unclear. “All Yahoo user accounts were affected by the August 2013 theft,” the company said in a statement.

Abedin, Clinton’s deputy chief of staff, regularly forwarded work emails to her personal [email protected] address. “She would use these accounts if her (State) account was down or if she needed to print an email or document. Abedin further explained that it was difficult to print from the DoS system so she routinely forwarded emails to her non-DoS accounts so she could more easily print,” an FBI report says.

Abedin sent passwords for her government laptop to her Yahoo account on Aug. 24, 2009, an email released by the State Department in September 2017 shows.

Huma sends laptop password to Yahoo / Source: State Department

Long-time Clinton confidante Sid Blumenthal sent Clinton an email in July 2009 with the subject line: “Important. Not for circulation. You only. Sid.” The message began “CONFIDENTIAL… Re: Moscow Summit.” Abedin forwarded the email to her Yahoo address, potentially making it visible to hackers.

The email was deemed too sensitive to release to the public and was redacted before being published pursuant to the Judicial Watch lawsuit. The released copy says “Classified by DAS/ A/GIS, DoS on 10/30/2015 Class: Confidential.” The unredacted portion reads: “I have heard authoritatively from Bill Drozdiak, who is in Berlin…. We should expect that the Germans and Russians will now cut their own separate deals on energy, regional security, etc.”

The three email accounts Abedin used were [email protected], [email protected], and [email protected]. Though the emails released by the State Department partially redact personal email addresses, the Yahoo emails are displayed as humamabedin[redacted].

Clinton forwarded Abedin an email titled “Ambassadors” in March 2009 from Denis McDonough, who served as foreign policy adviser to former President Barack Obama’s campaign and later as White House chief of staff. The email was heavily redacted before being released to the public.

Stuart Delery, chief of staff to the deputy attorney general, sent a draft memo titled “PA/PLO Memo” in May 2009, seemingly referring to two Palestinian groups. The content was withheld from the public with large letters spelling “Page Denied.” Abedin forwarded it to her Yahoo account.

Abedin routed sensitive information through Yahoo multiple times, such as notes on a call with the U.N. secretary-general, according to messages released under the lawsuit.

Contemporaneous news reports documented the security weaknesses of Yahoo while Abedin continued to use it.  Credentials to 450,000 Yahoo accounts had been posted online, a July 2012 CNN article reported. Five days later, Abedin forwarded sensitive information to her personal Yahoo email.

Abedin received an email “with the subject ‘Re: your yahoo acct.’ Abedin did not recall the email and provided that despite the content of the email she was not sure that her email account had ever been compromised,” on Aug. 16, 2010,  an FBI report says.

The FBI also asked her about sending other sensitive information to Yahoo. “Abedin was shown an email dated October 4, 2009 with the subject ‘Fwd: US interest in Pak Paper 10-04’ which Abedin received from [redacted] and then forwarded to her Yahoo email account…. At the time of the email, [redacted] worked for Richard Holbrooke who was the Special Representative for Afghanistan and Pakistan (SRAP). Abedin was unaware of the classification of the document and stated that she did not make judgments on the classification of materials that she received,” the report said.

The U.S. charged Sushchin with hacking half a billion Yahoo accounts in March 2017, in one of the largest cyber-breaches in history, the Associated Press reported. Sushchin was an intelligence agent with Russia’s Federal Security Service — the successor to the KGB — and was also working as security director for Renaissance Capital, Russian media said.

“It is unknown to the grand jury whether [Renaissance] knew of his FSB affiliation,” the indictment says.

Renaissance Capital paid Bill Clinton $500,000 for a speech in 2010 that was attended by Russian officials and corporate leaders. The speech received a thank-you note from Russian President Vladimir Putin. Renaissance Capital is owned by Russian oligarch Mikhail Prokhorov, who also owned the Brooklyn Nets basketball team. He unsuccessfully ran for Russian president against Putin in 2012.

Sushchin’s indictment says “the conspirators sought access to the Yahoo, Inc. email accounts of Russian journalists; Russian and U.S. government officials,” and others. Information about the accounts such as usernames and password challenge questions and answers were stolen for 500 million accounts, the indictment says. The indictment does not mention Abedin’s account.

A hacker called “Peace” claimed to be selling data from 200 million Yahoo users.

The user data also included people’s alternate email addresses, that were often work accounts tying a Yahoo user to an organization of interest. The hackers were able to generate “nonces” that allowed them to read emails “via external cookie minting” for some accounts.

The New York Times reported that in the 2013 hack, which affected all Yahoo accounts, “Digital thieves made off with names, birth dates, phone numbers and passwords of users that were encrypted with security that was easy to crack. The intruders also obtained the security questions and backup email addressed used to reset lost passwords — valuable information for someone trying to break into other accounts owned by the same user, and particularly useful to a hacker seeking to break into government computers around the world.”

Yahoo published a notification on Sept. 22, 2016, saying: “Yahoo has confirmed that a copy of certain user account information was stolen from the company’s network in late 2014 by what it believes is a state-sponsored actor.”

Clinton downplayed the risks of her email use days later, saying it was simply a matter of convenience.

“After a year-long investigation, there is no evidence that anyone hacked the server I was using and there is no evidence that anyone can point to at all, anyone who says otherwise has no basis, that any classified materials ended up in the wrong hands. I take classified materials very seriously and always have,” Clinton said on Oct. 9, 2016, at the second presidential debate,

Abedin’s use of Yahoo email is consistent with the determination by the FBI that Clinton associates’ emails were, in fact, compromised. “We do assess that hostile actors gained access to the private email accounts of individuals with whom Secretary Clinton was in regular contact from her private account,” then-FBI director Jim Comey  said in 2016.