WTH: Siphoning off Cellphone Data in DC is Real

First

An IMSIcatcher (International Mobile Subscriber Identity) is a telephony eavesdropping device used for intercepting mobile phone traffic and tracking movement of mobile phone users. Essentially a “fake” mobile tower acting between the target mobile phone(s) and the service provider’s real towers, it is considered a man-in-the-middle (MITM) attack.

Low-cost IMSI catcher for 4G/LTE networks tracks phones’ precise locations

$1,400 device can track users for days with little indication anything is amiss.

The researchers have devised a separate class of attacks that causes phones to lose connections to LTE networks, a scenario that could be exploited to silently downgrade devices to the less secure 2G and 3G mobile specifications. The 2G, or GSM, protocol has long been known to be susceptible to man-in-the-middle attacks using a form of a fake base station known as an IMSI catcher (like the Stingray). 2G networks are also vulnerable to attacks that reveal a phone’s location within about 0.6 square mile. 3G phones suffer from a similar tracking flaw. The new attacks, described in a research paper published Monday, are believed to be the first to target LTE networks, which have been widely viewed as more secure than their predecessors.

“The LTE access network security protocols promise several layers of protection techniques to prevent tracking of subscribers and ensure availability of network services at all times,” the researchers wrote in the paper, which is titled “Practical attacks against privacy and availability in 4G/LTE mobile communication systems.”

Second

ESD Overwatch:

Generate a continuously updated national situation report by means of distributed detection and localization of a multitude of baseband attacks as well as the manipulation of cellular signaling.

Detect and monitor cellular attacks in real-time

  • IMSI Catchers

    IMSI Catchers

  • Baseband Attacks

    Baseband Processor Attacks

  • Rogue Basestation

    Rogue Basestations

  • Cellular Jamming

    Cellular Jamming

Third

Suspected Hack Attack Snagging Cell Phone Data Across D.C.

Malicious entity could be tracking phones of domestic, foreign officials

FreeBeacon: An unusual amount of highly suspicious cellphone activity in the Washington, D.C., region is fueling concerns that a rogue entity is surveying the communications of numerous individuals, likely including U.S. government officials and foreign diplomats, according to documents viewed by the Washington Free Beacon and conversations with security insiders.

A large spike in suspicious activity on a major U.S. cellular carrier has raised red flags in the Department of Homeland Security and prompted concerns that cellphones in the region are being tracked. Such activity could allow pernicious actors to clone devices and other mobile equipment used by civilians and government insiders, according to information obtained by the Free Beacon.

It remains unclear who is behind the attacks, but the sophistication and amount of time indicates it could be a foreign nation, sources said.

Mass amounts of location data appear to have been siphoned off by a third party who may have control of entire cell phone towers in the area, according to information obtained by the Free Beacon. This information was compiled by a program that monitors cell towers for anomalies supported by DHS and ESD America and known as ESD Overwatch.

Cell phone information gathered by the program shows major anomalies in the D.C.-area indicating that a third-party is tracking en-masse a large number of cellphones. Such a tactic could be used to clone phones, introduce malware to facilitate spying, and track government phones being used by officials in the area.

“The attack was first seen in D.C. but was later seen on other sensors across the USA,” according to one source familiar with the situation. “A sensor located close to the White House and another over near the Pentagon have been part of those that have seen this tracking.”

The data gathered by the ESD Overwatch program indicates the U.S. cell carrier has experienced “unlawful access to their network for the purpose of large scale subscriber tracking,” according to a report prepared by ESD Overwatch, a contractor working on behalf of DHS, and viewed by the Free Beacon.

Information gathered by the program shows a massive uptick in efforts to identify and track cellphones. The third-party hacker appears to be identifying phones as they connect with local cellphone towers and recording this information.

This method of hacking could permit a malicious actor to track an individual’s cellphone and pinpoint phones that may be of importance, such as government entities.

The cellular network involved in the attack is being abused in order to track phones subscribed to the carrier, according to one source familiar with the situation.

DHS’s Office of Public Affairs confirmed that the ESD Overwatch program has been operating under a 90-day pilot program that began Jan. 18. Before the surveillance program was initiated the federal government did not have a method to detect intrusions of the nature seen over the past several months.

The attack on this network is still underway, according to sources monitoring the situation.

An official with ESD Overwatch acknowledged the existence of the DHS program, but would not comment further on the matter.

The issue of cellphone vulnerabilities has been a top concern in Congress, where lawmakers petitioned DHS on Wednesday to outline steps the government is taking to prevent foreign governments from performing the type of attacks observed by Overwatch.

“For several years, cyber security experts have repeatedly warned that U.S. cellular communications networks are vulnerable to surveillance by foreign governments, hackers, and criminals exploiting vulnerabilities in Signaling System 7,” which is used by cellular phones and text messaging applications, according to a letter set by Sen. Ron Wyden (D., Ore.) and Rep. Ted Lieu (D., Calif.).

“U.S. cellular phones can be tracked, tapped, and hacked—by adversaries thousands of miles away—through SS7-enabled surveillance,” the lawmakers write. “We are deeply concerned that the security of America’s telecommunications infrastructure is not getting the attention it deserves.”

“We suspect that most Americans simply have no idea how easy it is for a relatively sophisticated adversary to track their movements, tap their calls, and hack their smartphones,” the lawmakers write.

Concerns continue to mount that the government is not adequately taking steps to secure cellular networks.

The lawmakers request that DHS outline specific steps being taken to insulate networks from attacks and ensure that U.S. cell carriers are doing the same.

 

Gen. Flynn Worked for Several Russian Companies

  Image result for general flynn

WSJ: President Trump’s former national security adviser, Mike Flynn, was paid tens of thousands of dollars by Russian companies shortly before he became a formal adviser to the then-candidate, according to documents obtained by a congressional oversight committee that revealed business interests that hadn’t been previously known.

Mr. Flynn was paid $11,250 each by a Russian air cargo company that had been suspended as a vendor to the United Nations following a corruption scandal, and by a Russian cybersecurity company that was then trying to expand its business with the U.S. government, according to the documents, which were reviewed by The Wall Street Journal.

The speaking engagements took place in the summer and fall of 2015, a year after Mr. Flynn had been fired as the director of the Defense Intelligence Agency and while he continued to maintain a top-secret level security clearance.

In December 2015, the Kremlin-backed news organization RT also paid Mr. Flynn $33,750 to speak about U.S. foreign policy and intelligence matters at a conference in Moscow.

In February 2016, Mr. Flynn became an official adviser to the presidential campaign of Donald Trump, who at the time was taking a softer stance toward Moscow than his Republican rivals.

Mike Flynn resigned Monday as Trump’s national security adviser. He came under fire for making conflicting statements on whether he discussed sanctions with a Russian official before the president’s inauguration. Photo: Reuters (Originally published Feb., 14, 2017)

Price Floyd, a spokesman for Mr. Flynn, said he reported his RT appearance to the Defense Intelligence Agency, as required. Mr. Floyd didn’t immediately respond to questions about the other fees.

The new details about Mr. Flynn’s speaking engagements are contained in emails and documents provided to congress by his speaker’s bureau, Leading Authorities, and shed light on a continuing inquiry into Mr. Flynn’s and other Trump associates’ ties to Moscow.

On Monday, FBI Director James Comey and other current and former U.S. officials are scheduled to testify about possible Russian interference in the 2016 presidential election before a congressional committee that is also probing Trump associates’ ties to Russia.

Attorney General Jeff Sessions has recused himself from any investigation related to the 2016 presidential campaign after he failed to disclose the extent of his own contacts with the Russian ambassador to the U.S., Sergei Kislyak.

Mr. Flynn resigned under pressure in February after he failed to tell White House officials about phone calls he had with Mr. Kislyak, in which the two discussed the potential lifting of U.S. sanctions on Russia, according to U.S. officials familiar with the contents of the conversations.

While the documents from Mr. Flynn’s speaker’s bureau provide the most detail to date on his business dealings with Russia, they don’t show what other work he may have been doing outside his role as a paid speaker. Mr. Flynn commanded high fees for speaking on the state of global security and talking about his role as one of the most senior intelligence officials in the Obama administration.

Mr. Flynn was removed from his post as DIA chief after complaints of poor management and organization, not because of a policy dispute, according to people who worked with him at the time.

Last week, Mr. Flynn filed papers with the Justice Department disclosing that his firm was paid $530,000 to work in the U.S. on behalf of the interests of the Turkish government. Mr. Flynn had performed those services while he was advising Mr. Trump, then a presidential candidate.

Little additional information has become public about other clients the former military intelligence chief’s private consulting firm, Flynn Intel Group, may have had before the retired general’s appointment as national security adviser.

In a letter sent Thursday by Rep. Elijah Cummings (D., Md.) to Mr. Trump, Defense Secretary Jim Mattis and Mr. Comey, Mr. Cummings wrote that by taking the RT speaking fee, Mr. Flynn had “accepted funds from an instrument of the Russian government.”

Mr. Cummings, the top Democrat on the House Oversight and Government Reform Committee, pointed to a Central Intelligence Agency analysis written in 2012, while Mr. Flynn was running the DIA, that said RT was “created and financed by the Russian government,” which spent hundreds of millions of dollars a year to help the network create and disseminate programming that is broadcast in English around the world, including in the U.S.

Mr. Cummings said that by taking the fee, Mr. Flynn had violated the emoluments clause of the Constitution, which prohibits people in public office from accepting money from foreign governments. Some analysts have said this prohibition may apply to retired officers as well, because they could be recalled to service.

“I cannot recall anytime in our nation’s history when the president selected as his national security adviser someone who violated the Constitution by accepting tens of thousands of dollars from an agent of a global adversary that attacked our democracy,” Mr. Cummings wrote.

Though Mr. Flynn’s RT appearance had been reported, the documents provided new details about how he came to speak at the RT conference in December 2015, an event marking the network’s 10th anniversary.

While Mr. Flynn’s speakers’ bureau acted as a middleman, email communications indicate that RT sought to orchestrate the event and the content of his remarks.

“Using your expertise as an intelligence professional, we’d like you to talk about the decision-making process in the White House—and the role of the intelligence community in it,” an official from RT TV-Russia wrote in an email on Nov. 20, 2015, the month before Mr. Flynn’s appearance in Moscow.

In an earlier email in October, an RT official described the event as a networking opportunity for Mr. Flynn and an occasion to meet “political influencers from Russia and around the world.” At a gala dinner during the event, Mr. Flynn sat at the head table next to Russian President Vladimir Putin.

“It was something of a surprise to see General Flynn there,” said Ray McGovern, a former CIA officer and political activist who also attended.

Before the dinner, Mr. Flynn gave an interview on stage with an RT correspondent and chastised the Obama administration for objecting to Russia’s intervention in Syria.

“The United States can’t sit there and say, ‘Russia, you’re bad,’” Mr. Flynn said, according to a video of the interview, noting that both countries had shared global interests and were “in a marriage, whether we like it or not.” The countries should “stop acting like two bullies in a playground” and “quit acting immature with each other,” Mr. Flynn said.

Mr. Flynn attended with his son, Michael Flynn Jr., who worked as the chief of staff to his consulting firm. Records show that RT paid for travel and lodging expenses for both Flynns, including business-class airfare, accommodations at Moscow’s Hotel Metropol, and meals and incidental expenses while in Russia.

Mr. Putin entered the dinner late with two body guards, Mr. McGovern said. He waved and took his seat at the table, where he remained for about 20 minutes. After a fifteen-minute speech, Mr. Putin sat down, listened to a performance by the Russian Army chorus and then left, Mr. McGovern said.

It isn’t clear what Mr. Flynn said during speeches to the other two companies, computer security firm Kaspersky and Russian airliner Volga-Dnepr.

Mr. Flynn appears to have to spoken to Kaspersky at a conference the company sponsored in Washington, D.C., in October 2015. It wasn’t clear where Mr. Flynn spoke to Volga-Dnepr, but records from his speaker’s bureau show the engagement took place on August 19, 2015.

Kaspersky sponsors a number of events world-wide and in recent years has been trying to expand its business in the U.S., looking to supply government clients with antivirus products for industrial control systems.

Kaspersky said in a statement that its U.S. subsidiary paid Mr. Flynn a speaker fee for remarks at the 2015 Government Cyber Security Forum in Washington, D.C.

“As a private company, Kaspersky Lab has no ties to any government, but the company is proud to collaborate with the authorities of many countries, as well as international law enforcement agencies in the fight against cybercrime,” the company said.

Volga-Dnepr didn’t respond to a request for comment. The Russian cargo air firm is known for operating one of the largest military transport aircraft in the world, the An-124, which the U.S. has contracted in the past to lift military equipment, including Russian helicopters, into Afghanistan. The plane has a larger capacity than the U.S. military’s biggest cargo plane.

***

In part from Associated Press: Flynn’s sparkling military resume had included key assignments at home and abroad, and high praise from superiors.

The son of an Army veteran of World War II and the Korean war, Flynn was commissioned as a second lieutenant in May 1981 after graduating from the University of Rhode Island. He started in intelligence, eventually commanding military intelligence units at the battalion and then brigade level. In the early years of the Iraq war, he was intelligence chief for Joint Special Operations Command, the organization in charge of secret commando units like SEAL Team 6 and Delta Force. He then led intelligence efforts for all U.S. military operations in the Middle East and then took up the top intelligence post on the Joint Staff in the Pentagon.

Ian McCulloh, a Johns Hopkins data science specialist, became an admirer of Flynn while working as an Army lieutenant colonel in Afghanistan in 2009. At the time, Flynn ran intelligence for the U.S.-led international coalition in Kabul and was pushing for more creative approaches to targeting Taliban networks, including use of data mining and social network analysis, according to McCulloh.

“He was pushing for us to think out of the box and try to leverage technology better and innovate,” McCulloh said, crediting Flynn for improving the effectiveness of U.S. targeting. “A lot of people didn’t like it because it was different.”

It was typical of the determined, though divisive, approach Flynn would adopt at the Defense Intelligence Agency, which provides military intelligence to commanders and defense policymakers. There, he quickly acquired a reputation as a disruptive force. While some applauded Flynn with forcing a tradition-bound bureaucracy to abandon old habits and seek out new, more effective ways of collecting and analyzing intelligence useful in the fight against extremist groups, others saw his efforts as erratic and his style as prone to grandstanding.

In the spring of 2014, after less than two years on the job, he was told to pack his bags.

According to Flynn’s telling, it was his no-nonsense approach to fighting Islamic extremist groups that caused the rift.

A former senior Obama administration official who was consulted during the deliberations disputed that account. Flynn was relieved of his post for insubordination after failing to follow guidance from superiors, including James Clapper, Obama’s director of national intelligence, said the official, who asked for anonymity to discuss personnel matters.

Plunged into civilian life for the first time in 33 years, Flynn moved quickly to capitalize on his military and intelligence world connections and experience. He did so in an unorthodox way.

“I didn’t walk out like a lot of guys and go to big jobs in Northrup Grumman or Booz Allen or some of these other big companies,” Flynn told Foreign Policy magazine in 2015.

Instead, he opened his own consulting firm, Flynn Intelligence Group, in Alexandria, Va. He brought in his son, Michael G. Flynn as a top aide, and began assembling a crew of former armed forces veterans with expertise in cyber, logistics and surveillance, and sought out ties with lesser-known figures and companies trying to expand their profiles as contractors in the military and intelligence spheres.

One “team” member listed on the firm’s site was James Woolsey, President Bill Clinton’s former CIA director. Woolsey briefly joined Flynn on Trump’s transition team as a senior adviser, but quit in January. Another was lobbyist Robert Kelley.

Kelley proved a central player in the Flynn Group’s decision to help a Turkish businessman tied to Turkey’s government. At the same time that Flynn was advising Trump on national security matters, Kelley was lobbying legislators on behalf of businessman Ekim Alptekin’s firm between mid-September and December last year, lobbying documents show.

It was an odd match. Flynn has stirred controversy with dire warnings about Islam, calling it a “political ideology” that “definitely hides behind being a religion” and accusing Obama of preventing the U.S. from “discrediting” radical Islam. But his alarms apparently didn’t extend to Turkish President Recep Tayyip Erdogan’s government as it cracked down on dissent and jailed thousands of opponents after a failed coup last summer. Erdogan’s power base is among Turkey’s conservative Muslim voters and many affected by his crackdown are secularists. More here.

Russian FSB Officers Charged in Yahoo Hack and More

  NBC, Washington

Yahoo announced on Thursday that the account information of at least 500 million users was stolen by hackers two years ago, in the biggest known intrusion of one company’s computer network.

In a statement, Yahoo said user information — including names, email addresses, telephone numbers, birth dates, encrypted passwords and, in some cases, security questions — was compromised in 2014 by what it believed was a “state-sponsored actor.” More here from NYT’s.

U.S. Charges Russian FSB Officers and Their Criminal Conspirators for Hacking Yahoo and Millions of Email Accounts

FSB Officers Protected, Directed, Facilitated and Paid Criminal Hackers

Image result for Dmitry Aleksandrovich Dokuchaev Image result for Igor Anatolyevich Sushchin Image result for Alexsey Alexseyevich Belan

Image result for Karim Akehmet Tokbergenov Karim Taloverov, arrested in Canada

A grand jury in the Northern District of California has indicted four defendants, including two officers of the Russian Federal Security Service (FSB), for computer hacking, economic espionage and other criminal offenses in connection with a conspiracy, beginning in January 2014, to access Yahoo’s network and the contents of webmail accounts. The defendants are Dmitry Aleksandrovich Dokuchaev, 33, a Russian national and resident; Igor Anatolyevich Sushchin, 43, a Russian national and resident; Alexsey Alexseyevich Belan, aka “Magg,” 29, a Russian national and resident; and Karim Baratov, aka “Kay,” “Karim Taloverov” and “Karim Akehmet Tokbergenov,” 22, a Canadian and Kazakh national and a resident of Canada.

The defendants used unauthorized access to Yahoo’s systems to steal information from about at least 500 million Yahoo accounts and then used some of that stolen information to obtain unauthorized access to the contents of accounts at Yahoo, Google and other webmail providers, including accounts of Russian journalists, U.S. and Russian government officials and private-sector employees of financial, transportation and other companies. One of the defendants also exploited his access to Yahoo’s network for his personal financial gain, by searching Yahoo user communications for credit card and gift card account numbers, redirecting a subset of Yahoo search engine web traffic so he could make commissions and enabling the theft of the contacts of at least 30 million Yahoo accounts to facilitate a spam campaign.

The charges were announced by Attorney General Jeff Sessions of the U.S. Department of Justice, Director James Comey of the FBI, Acting Assistant Attorney General Mary McCord of the National Security Division, U.S. Attorney Brian Stretch for the Northern District of California and Executive Assistant Director Paul Abbate of the FBI’s Criminal, Cyber, Response and Services Branch.

“Cyber crime poses a significant threat to our nation’s security and prosperity, and this is one of the largest data breaches in history,” said Attorney General Sessions. “But thanks to the tireless efforts of U.S. prosecutors and investigators, as well as our Canadian partners, today we have identified four individuals, including two Russian FSB officers, responsible for unauthorized access to millions of users’ accounts. The United States will vigorously investigate and prosecute the people behind such attacks to the fullest extent of the law.”

“Today we continue to pierce the veil of anonymity surrounding cyber crimes,” said Director Comey. “We are shrinking the world to ensure that cyber criminals think twice before targeting U.S. persons and interests.”

“ The criminal conduct at issue, carried out and otherwise facilitated by officers from an FSB unit that serves as the FBI’s point of contact in Moscow on cybercrime matters, is beyond the pale,” said Acting Assistant Attorney General McCord. “Once again, the Department and the FBI have demonstrated that hackers around the world can and will be exposed and held accountable. State actors may be using common criminals to access the data they want, but the indictment shows that our companies do not have to stand alone against this threat. We commend Yahoo and Google for their sustained and invaluable cooperation in the investigation aimed at obtaining justice for, and protecting the privacy of their users.”

“This is a highly complicated investigation of a very complex threat. It underscores the value of early, proactive engagement and cooperation between the private sector and the government,” said Executive Assistant Director Abbate. “The FBI will continue to work relentlessly with our private sector and international partners to identify those who conduct cyber-attacks against our citizens and our nation, expose them and hold them accountable under the law, no matter where they attempt to hide.”

“Silicon Valley’s computer infrastructure provides the means by which people around the world communicate with each other in their business and personal lives. The privacy and security of those communications must be governed by the rule of law, not by the whim of criminal hackers and those who employ them. People rightly expect that their communications through Silicon Valley internet providers will remain private, unless lawful authority provides otherwise. We will not tolerate unauthorized and illegal intrusions into the Silicon Valley computer infrastructure upon which both private citizens and the global economy rely,” said U.S. Attorney Stretch. “Working closely with Yahoo and Google, Department of Justice lawyers and the FBI were able to identify and expose the hackers responsible for the conduct described today, without unduly intruding into the privacy of the accounts that were stolen. We commend Yahoo and Google for providing exemplary cooperation while zealously protecting their users’ privacy.”

Summary of Allegations

According to the allegations of the Indictment:

The FSB officer defendants, Dmitry Dokuchaev and Igor Sushchin, protected, directed, facilitated and paid criminal hackers to collect information through computer intrusions in the U.S. and elsewhere. In the present case, they worked with co-defendants Alexsey Belan and Karim Baratov to obtain access to the email accounts of thousands of individuals.

Belan had been publicly indicted in September 2012 and June 2013 and was named one of FBI’s Cyber Most Wanted criminals in November 2013. An Interpol Red Notice seeking his immediate detention has been lodged (including with Russia) since July 26, 2013. Belan was arrested in a European country on a request from the U.S. in June 2013, but he was able to escape to Russia before he could be extradited.

Instead of acting on the U.S. government’s Red Notice and detaining Belan after his return, Dokuchaev and Sushchin subsequently used him to gain unauthorized access to Yahoo’s network. In or around November and December 2014, Belan stole a copy of at least a portion of Yahoo’s User Database (UDB), a Yahoo trade secret that contained, among other data, subscriber information including users’ names, recovery email accounts, phone numbers and certain information required to manually create, or “mint,” account authentication web browser “cookies” for more than 500 million Yahoo accounts.

Belan also obtained unauthorized access on behalf of the FSB conspirators to Yahoo’s Account Management Tool (AMT), which was a proprietary means by which Yahoo made and logged changes to user accounts. Belan, Dokuchaev and Sushchin then used the stolen UDB copy and AMT access to locate Yahoo email accounts of interest and to mint cookies for those accounts, enabling the co-conspirators to access at least 6,500 such accounts without authorization.

Some victim accounts were of predictable interest to the FSB, a foreign intelligence and law enforcement service, such as personal accounts belonging to Russian journalists; Russian and U.S. government officials; employees of a prominent Russian cybersecurity company; and numerous employees of other providers whose networks the conspirators sought to exploit. However, other personal accounts belonged to employees of commercial entities, such as a Russian investment banking firm, a French transportation company, U.S. financial services and private equity firms, a Swiss bitcoin wallet and banking firm and a U.S. airline.

 

During the conspiracy, the FSB officers facilitated Belan’s other criminal activities, by providing him with sensitive FSB law enforcement and intelligence information that would have helped him avoid detection by U.S. and other law enforcement agencies outside Russia, including information regarding FSB investigations of computer hacking and FSB techniques for identifying criminal hackers. Additionally, while working with his FSB conspirators to compromise Yahoo’s network and its users, Belan used his access to steal financial information such as gift card and credit card numbers from webmail accounts; to gain access to more than 30 million accounts whose contacts were then stolen to facilitate a spam campaign; and to earn commissions from fraudulently redirecting a subset of Yahoo’s search engine traffic.

 

When Dokuchaev and Sushchin learned that a target of interest had accounts at webmail providers other than Yahoo, including through information obtained as part of the Yahoo intrusion, they tasked their co-conspirator, Baratov, a resident of Canada, with obtaining unauthorized access to more than 80 accounts in exchange for commissions. On March 7, the Department of Justice submitted a provisional arrest warrant to Canadian law enforcement authorities, requesting Baratov’s arrest. On March 14, Baratov was arrested in Canada and the matter is now pending with the Canadian authorities.

 

An indictment is merely an accusation, and a defendant is presumed innocent unless proven guilty in a court of law.

 

The FBI, led by the San Francisco Field Office, conducted the investigation that resulted in the charges announced today. The case is being prosecuted by the U.S. Department of Justice National Security Division’s Counterintelligence and Export Control Section and the U.S. Attorney’s Office for the Northern District of California, with support from the Justice Department’s Office of International Affairs.

Defendants: At all times relevant to the charges, the Indictment alleges as follows:

    • Dmitry Aleksandrovich Dokuchaev, 33, was an officer in the FSB Center for Information Security, aka “Center 18.” Dokuchaev was a Russian national and resident.
    • Igor Anatolyevich Sushchin, 43, was an FSB officer, a superior to Dokuchaev within the FSB, and a Russian national and resident. Sushchin was embedded as a purported employee and Head of Information Security at a Russian investment bank.
    • Alexsey Alexseyevich Belan, aka “Magg,” 29, was born in Latvia and is a Russian national and resident. U.S. Federal grand juries have indicted Belan twice before, in 2012 and 2013, for computer fraud and abuse, access device fraud and aggravated identity theft involving three U.S.-based e-commerce companies and the FBI placed Belan on its “Cyber Most Wanted” list.  Belan is currently the subject of a pending “Red Notice” requesting that Interpol member nations (including Russia) arrest him pending extradition. Belan was also one of two criminal hackers named by President Barack Obama on Dec. 29, 2016, pursuant to Executive Order 13694, as a Specially Designated National subject to sanctions.
    • Karim Baratov, aka “Kay,” “Karim Taloverov” and “Karim Akehmet Tokbergenov,” 22. He is a Canadian and Kazakh national and a resident of Canada.

Victims: Yahoo; more than 500 million Yahoo accounts for which account information about was stolen by the defendants; more than 30 million Yahoo accounts for which account contents were accessed without authorization to facilitate a spam campaign; and at least 18 additional users at other webmail providers whose accounts were accessed without authorization.

 

Time Period: As alleged in the Indictment, the conspiracy began at least as early as 2014 and, even though the conspirators lost their access to Yahoo’s networks in September 2016, they continued to utilize information stolen from the intrusion up to and including at least December 2016.

 

Crimes:

Count(s) Defendant(s) Charge Statute                 18 U.S.C. Conduct Maximum Penalty
1 All Conspiring to commit computer fraud and abuse § 1030(b) Defendants conspired to hack into the computers of Yahoo and accounts maintained by Yahoo, Google and other providers to steal information from them.

 

First, Belan gained access to Yahoo’s servers and stole information that allowed him, Dokuchaev, and Sushchin to gain unauthorized access to individual Yahoo user accounts.

Then, Dokuchaev and Sushchin tasked Baratov with gaining access to individual user accounts at Google and other Providers (but not Yahoo) and paid Baratov for providing them with the account passwords. In some instances, Dokuchaev and Sushchin tasked Baratov with targeting accounts that they learned of through access to Yahoo’s UDB and AMT (e.g., Gmail accounts that served as a Yahoo user’s secondary account).

10 years
2 Dokuchaev

Sushchin

Belan

Conspiring to engage in economic espionage § 1831(a)(5) Starting on Nov. 4, 2014, Belan stole, and the defendants thereafter transferred, received and possessed the following Yahoo trade secrets:

  • the Yahoo UDB, which was proprietary and confidential Yahoo technology and information, including subscriber names, secondary accounts, phone numbers, challenge questions and answers;
  • the AMT, Yahoo’s interface to the UDB; and
  • Yahoo’s cookie “minting” source code, which enabled the defendants to manufacture account cookies to then gain access to individual Yahoo user accounts.
15 years
3 Dokuchaev

Sushchin

Belan

Conspiring to engage in theft of trade secrets § 1832(a)(5) See Count 2 10 years
4-6 Dokuchaev

Sushchin

Belan

Economic espionage §§ 1831(a)(1), (a)(4), and 2 See Count 2 15 years (each count)
7-9 Dokuchaev

Sushchin

Belan

Theft of trade secrets §§ 1832(a)(1), and 2 See Count 2 10 years (each count)
10 Dokuchaev

Sushchin

Belan

Conspiring to commit wire fraud § 1349 The defendants fraudulently schemed to gain unauthorized access to Yahoo’s network through compromised Yahoo employee accounts and then used the Yahoo trade secrets to gain unauthorized access to valuable non-public information in individual Yahoo user accounts. 20 years
11-13 Dokuchaev

Sushchin

Belan

Accessing (or attempting to access) a computer without authorization to obtain information for the purpose of commercial advantage and private financial gain. §§ 1030(a)(2)(C), 1030(c)(2)(B)(i)-(iii), and 2 The defendants gained unauthorized access to Yahoo’s corporate network and obtained information regarding Yahoo’s network architecture and the UDB. 5 years

(each count)

14-17 Dokuchaev

Sushchin

Belan

Transmitting code with the intent to cause damage to computers. §§ 1030(a)(5)(A), 1030(c)(4)(B), and 2 During the course of their unauthorized access to Yahoo’s network, the defendants transmitted code on Yahoo’s network in order to maintain a persistent presence, to redirect Yahoo search engine users and to mint cookies for individual Yahoo accounts. 10 years (each count)
18-24 Dokuchaev

Sushchin

Belan

Accessing (or attempting to access) a computer without authorization to obtain information for the purpose of commercial advantage and private financial gain. §§ 1030(a)(2)(C), 1030(c)(2)(B)(i)-(iii), and 2 Defendants obtained unauthorized access to individual Yahoo user accounts. 5 years

(each count)

25-36 Dokuchaev

Sushchin

Belan

Counterfeit access device fraud §§ 1029(a)(1), 1029(b)(1), and 2 Defendants used minted cookies to gain unauthorized access to individual Yahoo user accounts. 10 years (each count)
37 Dokuchaev

Sushchin

Belan

Counterfeit access device making equipment §§ 1029(a)(4) Defendants used software to mint cookies for unauthorized access to individual Yahoo user accounts. 15 years
38 Dokuchaev

Sushchin

Baratov

Conspiring to commit access device fraud §§ 1029(b)(2) Defendants Dokuchaev and Sushchin tasked Baratov with gaining unauthorized access to individual user accounts at Google and other Providers and then paid Baratov for providing them with the account passwords. In some instances, Dokuchaev and Sushchin tasked Baratov with targeting accounts that they learned of through access to Yahoo’s UDB and AMT (e.g., Gmail accounts that served as a Yahoo user’s secondary account). 7 ½ years.
39 Dokuchaev

Sushchin

Baratov

Conspiring to commit wire fraud § 1349 See Count 38 20 years
40-47 Dokuchaev

Baratov

Aggravated identity theft § 1028A(a)(1) See Count 38 2 years

Dmitri Dokuchae et al Indictment Redacted

17-278

National Security Division (NSD)

USAO – California, Northern

Topic:

Counterintelligence and Export Control

Updated March 15, 2017

North Korea = Iran, China, Syria, Russia, Egypt

There are many worries about building military actions by North Korea such that deployments of U.S. military assets along with that of Japan, S. Korea and other nations in the region are preparing for various conditions due to continued threats by the DPRK.

Image result for north korea sanctions CNN

There is a standing sanction program against North Korea, but they are not holding due to Africa.

JOHANNESBURG (AP) — North Korean weapons barred by U.N. sanctions ended up in the hands of U.N. peacekeepers in Africa, a confidential report says. That incident and others in more than a half-dozen African nations show how North Korea, despite facing its toughest sanctions in decades, continues to avoid them on the world’s most impoverished continent with few repercussions.

The annual report by a U.N. panel of experts on North Korea, obtained by The Associated Press, illustrates how Pyongyang evades sanctions imposed for its nuclear and ballistic missile programs to cooperate “on a large scale,” including military training and construction, in countries from Angola to Uganda.

Among the findings was the “largest seizure of ammunition in the history of sanctions” against North Korea, with 30,000 rocket-propelled grenades found hidden under iron ore that was destined for Egypt in a cargo vessel heading toward the Suez Canal. The intended destination of the North Korean-made grenades, seized in August, was not clear.

A month before that, the report says, a U.N. member state seized an air shipment destined for a company in Eritrea containing military radio communications items. It was the second time military-related items had been caught being exported from North Korea to Eritrea “and confirms ongoing arms-related cooperation between the two countries.” Eritrea is also under U.N. sanctions for supporting armed groups in the Horn of Africa.

***  Image result for north korea sanctions

Experts point to China as the father and manager of North Korea and there is real truth to that, yet the collaborations go far beyond China, to include Iran, Syria and Russia and in some cases Egypt. Nearly all of the North Korea country’s communications and Internet traffic is routed through China. Firms that monitor that traffic say it is comparable to only about 1,000 high-speed homes in the United States. 

North Korea has intermediate-range ballistic missiles as well. North Korea has tested nuclear weapons on three occasions; Iran and Syria’s nuclear programs have raised suspicions that those countries are pursuing nuclear weapons. However, Iran has, according to the IC, halted its nuclear weapons program, and Syria does not appear to have an active nuclear weapons program.

Congress has held numerous hearings regarding these countries’ nuclear and missile programs. It has also passed legislation providing for sanctions on countries whose entities assist Iran, North Korea, and Syria to obtain weapons of mass destruction (WMD) and missile delivery systems. For example, the Iran, North Korea and Syria Nonproliferation Act (INKSNA, P.L. 106-178) imposes penalties on countries whose companies’ exports. See report here.

***

Secretary of State Rex Tillerson will warn China’s leaders that the United States is prepared to step up missile defenses and pressure on Chinese financial institutions if they fail to use their influence to restrain North Korea’s nuclear and missile programs, according to several officials involved in planning his first mission to Asia.

Reinforcing military ties, Gen. Joseph F. Dunford Jr., the chairman of the Joint Chiefs of Staff, conducted a 30-minute phone call on Tuesday with his South Korean counterpart, Gen. Lee Sun-jin. A Pentagon statement said the generals discussed the possibility that North Korea could carry out “provocative actions” during the joint American and South Korean exercises now underway, or in April when North Korean authorities commemorate the birthday of Kim Il-sung, the founder and first leader of the country.

Daniel L. Glaser, a former Treasury official who constructed many of the sanctions, and now a principal at the Financial Integrity Network, said in an interview that the largest Chinese banks often shun dealings with North Korea and that some of the smaller ones have little exposure to the American banking system. More here from the NYT’s.

Trump administration officials have signaled there will be even greater financial pressure placed on Beijing if it doesn’t cut off North Korea, a step that risks Chinese retaliation. “We are putting the world on notice: The games are over,” Commerce Secretary Wilbur Ross said while announcing the sanctions on ZTE last week. [….]

U.S. officials said Mr. Tillerson would be discussing North Korea at all his stops in Asia, including the issue of “secondary” sanctions against non-North Korean companies that have been aiding Pyongyang. “All of the existing tools that we have to try to bring pressure on North Korea are on the table, and we’ll be looking to try to see what the most effective combination is,” said a senior U.S. official briefed on the Asia trip.

Republican senators wrote Treasury Secretary Steven Mnuchin last month and called for an investigation into the Bank of China and other Chinese firms for their alleged roles in helping North Korea. [Wall Street Journal, Jay Solomon; link to senator’s letter here]

***

Nuclear Proliferation

Kumsan Trading. Member states are supposed to freeze the assets of, and expel the representatives of, companies involved in North Korean nuclear, missile, and other WMD proliferation. According to the Panel, the Korea Kumsan Trading Corporation is a front for North Korea’s General Bureau of Atomic Energy and helps it procure materials and fund its operations. Kumsan advertises itself online openly as dealing in sanctioned products, including vanadium and precious metals, with locations in both Moscow and Dandong. (Paras. 18-20.)

Korea Mining Development Trading Corp. (KOMID) is North Korea’s main arms dealer. It was designated in 2009 for WMD proliferation, but probably earns most of its revenue through violations of an embargo on conventional arms sales, by selling to governments in Africa and the Middle East. KOMID operates through multiple front companies that do business more-or-less openly in China. China is required to expel the representatives of these companies, but it almost never does. When one of them is exposed, it may revoke a business license or registration, but the operative goes right back into business under a new name at a new address. The Panel also found that at least nine KOMD representatives traveled through China in 2016, despite a requirement that member states deny them entry. (Table 8, Page 68.)

One of KOMID’s fronts is Namchongang Trading, which was designated by the U.N. in 2009 for procuring nuclear-related items. It operates openly in Beijing and Dandong, China, through several Chinese commercial websites. (Para. 156.) Namchongang has also operated as (or in cahoots with) Taeryonggang Trading, Namhung Trading, and Sobaeksu United Corporation, which operates in Beijing, Yingkou and Dandong. The EU designated Sobaeksu in 2010 for “the research and acquisition of sensitive products and equipment.” The Panel suspects that this entire network is involved with KOMID. (Paras. 156-59.) KOMID also does business through a front company called Beijing New Technology. (Para. 163.)

Another KOMID front, Korea Heungjin Trading, which was designated in 2012, for nuclear, missile, and other WMD proliferation, also operates openly in Dandong and Dalian. A North Korean diplomat posted at the embassy in Beijing serves as its director. (Para. 187-89.)

Green Pine Associated was designated by the U.N. in 2012 for its involvement in North Korea’s nuclear, missile, and other WMD programs. It’s still doing business openly in both Beijing, Shenyang, and Hong Kong as Green Pine, Natural Resources Development Investment Corporation, King Helong International Trading, Korea Unhasu Trading Company, and Saeng Pil Trading Corporation. (Paras. 166-83.) Green Pine is the company behind the attempted sale of the lithium from … guess where:

24. The Panel investigated the 2016 attempted online sale of lithium metal by the Democratic People’s Republic of Korea. The enriched lithium-6 isotope, and products or devices containing it, are on the list of prohibited nuclear-related items adopted by the Security Council (see annex 4-4). According to IAEA, lithium-6 is used to produce tritium, an isotope found in boosted nuclear devices. This sales attempt suggests that the Democratic People’s Republic of Korea has access to remaining quantities of the material.

25. Li-6 is advertised for sale by a company of the Democratic People’s Republic of Korea, General Precious Metal, which the European Union has identified as an alias of Green Pine Associated Corporation (Green Pine). Mr. Chol Yun was listed as the contact person of General Precious Metal for sale of the mineral and has an address and phone numbers in Beijing (see annex 4-5). The same name appeared as third secretary of the embassy of the Democratic People’s Republic of Korea in Beijing on an official diplomatic list dated 24 September 2012 (see annex 4-6). The Panel notes a pattern whereby the Democratic People’s Republic of Korea has accredited Green Pine overseas representatives as diplomats. The Panel continues to investigate this diplomat’s involvement in prohibited activities and his possible connection with another prohibited activity (see para. 91).

Korea Ryonha Machinery Joint Venture was designated in 2013 for WMD proliferation, mainly for buying, selling, and manufacturing machine tools used for making both conventional weapons and WMDs. It shows up in POE reports year after year because it continues to operate, and to display its wares at trade shows, in both Russia and China. In 2016, a Chinese company exported several machine tools to North Korea, and the Chinese government was reportedly investigating (!) Ryonha’s involvement. (Para. 196.)

[From the U.N. Panel’s 2014 report]

Training of scientists. The resolutions ban member states from training North Koreans in sensitive technology that could be used for North Korea’s WMD programs. The North Korean universities that train the country’s nuclear and missile scientists have exchange agreements with universities in Russia and China. The Panel asked the Chinese universities to explain, but they never responded. (Para. 135.)

Missile Proliferation

Kwangmyongsong missile parts. Someone, presumably the U.S. Navy, recovered the pieces of a Kwangmyongsong missile North Korea launched in February 2016 and found that it contained “ball bearings and engraved Cyrillic characters … identical to those from the 2012 Unha-3, and a “camera [and] EMI filter” from a “Chinese manufacturer, Beijing East Exhibition High-Tech Technology Co. Ltd.” (Paras. 57-58.) That “someone” also discovered the Pyongyang had imported pressure transmitters from the U.K. and Ireland, via the manufacturer’s distributor in China, via middlemen in China. (Para. 59.) This suggests several layers of violations — China’s failure to expel North Korean representatives of sanctioned entities, to enforce export controls, or to inspect cargo going to North Korea.

Shipment of Scud parts to Egypt. Paragraphs 71-77 of last year’s report discuss a shipment of Scud missile parts to Egypt. Since then, the Panel has determined that the whole scheme was run out of the North Korean embassy in Beijing. (Paras. 88-89.) The shipper was Ryongsong Trading Company, and the seller was Rungrado Trading Company, which you may remember for its human trafficking in Europe. Rungrado was designated by the Treasury Department last year for “the exportation of workers” from North Korea to earn foreign currency for Pyongyang, some of which went to North Korean agencies that were designated for supporting WMD programs. South Korea considers Rungrado to be an alias for Ryongsong. (FN.99.) Although the U.S. Treasury Department routinely designates aliases, it has not designated Ryongsong.

Weapons Trafficking

North Korea is subject to a U.N. embargo on the import, export, sale, or purchase of weapons, including weapons components, technology, services, training, and dual-use items. Since March, China has been required to inspect all cargo “that has originated in the DPRK, or that is destined for the DPRK, or has been brokered or facilitated by the DPRK or its nationals, or by individuals or entities acting on their behalf or at their direction, or entities owned or controlled by them, or by designated individuals or entities, or that is being transported on DPRK flagged aircraft or maritime vessels.”  (Para. 18.) Pretty clearly, that isn’t happening.

Syria rocket shipment. You’ve already read my post on this, right? Last August, Egyptian authorities seized a record haul of North Korean weapons, mostly PG-7 antitank rockets, hidden under iron ore aboard the M/V Jie Shun. I guessed that Syria was the destination because of the geography, but it’s possible that the client could have been Hamas or Hezbollah (which have also been Pyongyang’s arms clients).

This transaction also relied heavily on North Korean agents based in China. The bill of lading lists a shipper whose address is a hotel room in Dalian, a city often used by North Korean operatives. (Para. 63.) The holder of the ship’s compliance document was one Fan Mintan. A second man, Zhang Qiao, was its emergency contact, arranged for the ship’s insurance, and registered the ship’s operator in the Marshall islands. (Paras. 65-66.) Zhang is also involved in the coal trade with North Korea (para. 68), and thus played a role in violating UNSCR 2270 and 2321. He is also linked to another suspected North Korean smuggling ship, the M/V Light. A third man, Li Anshan, whom the Panel links to Ocean Maritime Management, a North Korean shipping company designated by the U.N. for arms smuggling, helped arrange for the Jie Shun’s Cambodian registration.

Eritrea radios shipment and Glocom. I previously posted about Glocom, the Reconnaissance General Bureau front company that manufactured sophisticated military radios and was based in Malaysia. Glocom made headlines after it was exposed just after the assassination of Kim Jong-nam. Starting at Paragraph 72 of its report, the Panel described how Glocom shipped radios to Eritrea. According to the Panel, that shipment “originated in China.”

75. The air waybills listed the shipper as Beijing Chengxing Trading Co. Ltd. According to the Chinese business registry, the company is still active, mainly trading in electronics, mining equipment and machinery (see annex 8-3). Mr. Pei Minhao (???) was listed as a legal representative until 26 February 2016 and still owns most shares in the company (see para. 164).

Glocom had North Korean representatives based in both Malaysia and China; had bank accounts, front companies, and procurement agents in both Malaysia and China; used mostly Chinese suppliers; and shipped its components to Beijing or Dandong for assembly (the report didn’t specify where). (Para. 77-84, 164.) Glocom did most of its business in U.S. dollars or euro through a sanctioned bank, Daedong Credit Bank, “to transfer funds to a supply chain of more than 20 companies located primarily on the Chinese mainland; in Hong Kong, China; and in Singapore.” (Paras. 233-25.)

Naval vessel repair & construction. Last year, the Panel reported that Green Pine had refurbished military patrol boats for Angola in violation of the arms embargo. The parts were shipped from China, the Panel has asked China for an explanation, and China still hasn’t given one. (Para. 103.)

North Korean UAV that crashed in South Korea. A Beijing company, Microfly Engineering and Technology, made it. After that, the trail leads to another Chinese company and two middlemen, who either point fingers at one another or deny all involvement. The Panel asked China to investigate, but China hasn’t responded. (Para. 107.)  More here to FreeKorea, remarkable work.

 

Vault 7 Breach the Worst Yet or this Military Holy Grail Breach?

Image result for s86 security clearance

Image result for security clearance cyber briefings

Do we have a concept of the insider threat condition within government with emphasis added on contractors within the intelligence community? Anyone? Combined with stupidity, lax security measures, no passwords and dated software platforms, is there anything left our adversaries don’t know by now?

Referencing Vault 7 and the CIA, the agency has agreements with several outside contractor firms. The employees of those firms have a much lower standard of security, behavior and access than that of the CIA. The agency holds contracts with 5 major outside firms that do 80% of the private contract work to include Booz, Allen and Hamilton. The next logical question is who else besides the CIA holds private contract work agreements, DNI, Defense Department, Geo-Spatial, NSA? Yes.

Where does one begin to document cyber vulnerabilities and how to close those gaps immediately and at what cost? Meanwhile little is being reported about NSA documents thief Harold Martin.

US military leak exposes ‘holy grail’ of security clearance files

Exclusive: These security clearance applications contain sensitive personal information, and are highly valuable to foreign adversaries seeking to undermine US national security.

ZDNet: A unsecured backup drive has exposed thousands of US Air Force documents, including highly sensitive personnel files on senior and high-ranking officers.

Security researchers found that the gigabytes of files were accessible to anyone because the internet-connected backup drive was not password protected.

The files, reviewed by ZDNet, contained a range of personal information, such as names and addresses, ranks, and Social Security numbers of more than 4,000 officers. Another file lists the security clearance levels of hundreds of other officers, some of whom possess “top secret” clearance, and access to sensitive compartmented information and codeword-level clearance.

Phone numbers and contact information of staff and their spouses, as well as other sensitive and private personal information, were found in several other spreadsheets.

The drive is understood to belong to a lieutenant colonel, whose name we are not publishing. ZDNet reached out to the officer by email but did not hear back.

The data was secured last week after a notification by MacKeeper security researcher Bob Diachenko.

Among the most damaging documents on the drive included the completed applications for renewed national security clearances for two US four-star generals, both of whom recently had top US military and NATO positions.

Both of these so-called SF86 applications contain highly sensitive and detailed information, including financial and mental health history, past convictions, relationships with foreign nationals, and other personal information.

These completed questionnaires are used to determine a candidate’s eligibility to receive classified material.

Several national security experts and former government officials we spoke to for this story described this information as the “holy grail” for foreign adversaries and spies, and said that it should not be made public.

For that reason, we are not publishing the names of the generals, who have since retired from service.

Nevertheless, numerous attempts to contact the generals over the past week went unreturned.

“Some of the questions ask for information that can be very personal, as well as embarrassing,” said Mark Zaid, a national security attorney, in an email. The form allows prospective applicants to national security positions to disclose arrests, drug and alcohol issues, or mental health concerns, among other things, said Zaid.

Completed SF86 forms aren’t classified but are closely guarded. These were the same kinds of documents that were stolen in a massive theft of sensitive files at the Office of Personnel Management, affecting more than 22 million government and military employees.

“Even if the SF86 answers are innocuous, because of the personal information within the form there is always the risk of identity theft or financial fraud that could harm the individual and potentially compromise them,” said Zaid.

One spreadsheet contained a list of officers under investigation by the military, including allegations of abuses of power and substantiated claims of wrongdoing, such as wrongfully disclosing classified information.

A former government official, who reviewed a portion of the documents but did not want to be named, said that the document, in the wrong hands, provided a “blueprint” for blackmail.

Even officers who have left in recent years may still be vulnerable to coercion if they are still trusted with historical state secrets.

“Foreign powers might use that information to target those individuals for espionage or to otherwise monitor their activity in the hopes of gaining insight into US national security posture,” said Susan Hennessey, a Brookings fellow and a former attorney at the National Security Agency.

Government officials use the form as a screening mechanism, said Hennessey, but it also offers applicants the chance to inform the government of past indiscretions or concerns that eliminate the possibility of blackmail in the future, she added. “These are people whose lives can depend on sensitive information being safeguarded, so the notion they would fail to put country over self in that kind of circumstance is far-fetched and supported by relatively few historical examples,” she said.

“Still, it is the obligation of the government to keep this kind of information safe, both in order to protect the privacy of those who serve and their families and to protect them against being placed in difficult situations unnecessarily,” said Hennessey.

Though many of the files were considered “confidential” or “sensitive,” a deeper keyword-based search of the files did not reveal any material marked as classified.

A completed passport application for one of the generals was also found in the same folder, as well as scans of his own and his wife’s passports and driving licenses.

Other data included financial disclosures, bank account and routing information, and some limited medical information.

Another document purported to show the lieutenant colonel’s username and password for a sensitive internal Dept. of Defense system, used to check staff security clearances.

Another document listed the clearance levels of one of the generals.

And, a smaller spreadsheet contained a list of Social Security numbers, passport numbers, and other contact information on high-profile figures and celebrities, including Channing Tatum.

The records were collected in relation to a six-day tour to Afghanistan by Tatum in 2015. An email to Tatum’s publicist went unreturned.

The drive also contained several gigabytes of Outlook email files, covering years worth of emails. Another document purported to be a backup.

Nevertheless, this would be the second breach of military data in recent months.

Potomac, a Dept. of Defense subcontractor, was the source of a large data exposure of military personnel files of physical and mental health support staff. Many of the victims involved in the data leak are part of the US Special Operations Command (SOCOM), which includes those both formerly employed by US military branches, such as the Army, Navy, and Air Force, and those presumably still on active deployment.

It’s not known how long the backup drive was active. Given that the device was public and searchable, it’s not known if anyone other than the security researchers accessed the files.

The Office of Personnel Management, which processes security clearance applications, referred comment to the Pentagon.

A Pentagon spokesperson would not comment in an email Monday.