California Secede from United States, Courtesy of Russia

The movement:

In our view, the United States of America represents so many things that conflict with Californian values, and our continued statehood means California will continue subsidizing the other states to our own detriment, and to the detriment of our children.

Although charity is part of our culture, when you consider that California’s infrastructure is falling apart, our public schools are ranked among the worst in the entire country, we have the highest number of homeless persons living without shelter and other basic necessities, poverty rates remain high, income inequality continues to expand, and we must often borrow money from the future to provide services for today, now is not the time for charity.

However, this independence referendum is about more than California subsidizing other states of this country. It is about the right to self-determination and the concept of voluntary association, both of which are supported by constitutional and international law.

It is about California taking its place in the world, standing as an equal among nations. We believe in two fundamental truths: (1) California exerts a positive influence on the rest of the world, and (2) California could do more good as an independent country than it is able to do as just a U.S. state.

In 2016, the United Kingdom voted to leave the international community with their “Brexit” vote. Our “Calexit” referendum is about California joining the international community. You have a big decision to make.

****

He’s the founder of a Californian independence movement. Just don’t ask him why he lives in Russia.

WaPo: Louis J. Marinelli is a man on a quixotic mission: to help California secede from the United States and become an independent country.

Image result for Louis J. Marinelli

Surprisingly, this quest has been going relatively well of late. Marinelli’s group, Yes California, is attempting to collect 585,000 signatures necessary to place a secessionist question on the 2018 ballot. Buoyed by California’s already tense relationship with President Trump, the campaign has received a large amount of press coverage and support over the past few months.

But for the 30-year-old Yes California president, there remains one annoying problem: People keep asking him why he lives in Russia.

In the wake of Yes California’s recently acquired momentum, a lot of people have taken note of Marinelli’s unusual home base. Numerous articles have appeared in the Californian media noting Marinelli’s choice of residence. On social media, discussions about Marinelli often take on a deeply conspiratorial tone.

“Hands off California, Putin,” a rival secessionist movement, the California National Party, tweeted in January. “We won’t take orders from your puppet Moscow Marinelli.”

Marinelli has perhaps compounded the issue by making numerous appearances on Russian state media (approximately once a week, by his own estimation), at times offering a political viewpoint that seems to line up neatly with the Kremlin’s. In late December, the Russian media gave widespread coverage to Marinelli as his group opened a “Californian Embassy” in Moscow.

Speaking via video chat from his home in Yekaterinburg earlier this month, Marinelli seemed exasperated when quizzed about his decision to live in Russia.

Image result for yekaterinburg russia

“And Barack Obama was born in Kenya, right?” he said incredulously.

“The fact that I’m an English teacher in Yekaterinburg doesn’t mean there’s some Russian government conspiracy or support for our campaign,” Marinelli said. “The fact that I studied Russian language courses at Saint Petersburg State University in 2007 or ’08 doesn’t mean that I know Vladimir Putin, who graduated from there in 1975.”

He offered an explanation for his circumstances that went into more detail than one posted in a FAQ section on the Yes California website. It presented a reasonable — though unusual — set of events that had resulted in him leading a Californian independence movement from half a world away.

It goes like this: Buffalo-born Marinelli moved to California in 2006. A year later, he upped sticks and went to Saint Petersburg State University to study Russian. He lived “on and off” in Russia between 2007 and 2011, during which time he met his wife, a Russian citizen. The pair moved back to San Diego, but Marinelli’s partner ran into problems with the U.S. immigration system.

“Her visa had expired and there was really no way for us to easily adjust her status,” Marinelli said. “If she had left the country, she’d be banned for 10 years, and so that wasn’t an option.”

Marinelli said they received a “glimmer of hope” last August that would allow his wife, who has been unable to leave the country until her legal status in the United States was secured, a chance to return home. She was desperate to visit her family, he said, so Marinelli found an apartment in Yekaterinburg and a job teaching English for a semester that provided him a visa. But then, according to his telling, “the immigration thing kind of fell through,” and his wife was unable to travel.

The end result was that Marinelli was obliged to go to Russia, he said, while his Russian wife was stuck in San Diego. “We’re still working on resolving the problem,” Marinelli said, adding that his wife was in the process of getting a green card. “Hopefully that goes well and we can end this chapter of our lives.”

It’s a strange situation — and not exactly how some of Marinelli’s partners in Yes California describe it (Marcus Ruiz Evans, the group’s vice president, told The Washington Post that Marinelli’s wife also lived in Russia).

But it is a plausible scenario.

Marinelli’s ties to Alexander Ionov are perhaps bigger conspiracy fodder. Ionov is the founder of the Anti-Globalization Movement of Russia, a group that supports various secessionist movements around the world. Last September, he put on a Kremlin-sponsored event in Moscow for Western secessionists that Marinelli and other representatives of Yes California attended.

Reached via email, Ionov said that about 30 percent of the funding for the event came from the Russian government. But he said none of that money was given to any U.S. groups, including Yes California. Marinelli also pushed back on the idea that this represents a link with the Russian government.

“We don’t have any communication with or contact with or receive any support of any kind from the Russian government or any Russian government officials,” Marinelli said.

“We’re not actively pursuing a dialogue with Vladimir Putin here in Russia even though I’m in Russia,” he added.

Would Putin want a dialogue? Some experts said that while Ionov and his group may have some limited ties to the Kremlin, they are ultimately small fry in Moscow.

Simon Saradzhyan, the founding director of the Russia Matters Project at Harvard’s Belfer Center for Science and International Affairs, said that the Russian government probably wasn’t taking the Yes California project very seriously, “if only because that chances that this movement can eventually win independence for that state are close to zero.” But Saradzhyan also noted that Russia could well be interested in getting revenge on Washington for what it saw as U.S. support for Chechen separatism in the 1990s.

Fiona Hill, a Russia expert with Brookings Institution, said in an email that historical Russian links to California added further intrigue to the situation.

“Russia had a major early-19th century colony in California and there has been quite a lot of interest in promoting this from circle’s close to the Kremlin,” Hill said, pointing to Kremlin-connected oligarch Viktor Vekselberg and his interest in Fort Ross, the former colony in what is now Sonoma County.

It sounds outlandish, but after an election in which Russian interference supposedly helped a former reality television star with no political experience gain entry to the White House — well, perhaps it doesn’t seem that outlandish. Marinelli didn’t sound like a fan of the way that election turned out. He repeatedly criticized Trump during his interview with WorldViews, noting how the U.S. president had threatened to defund California.

Marinelli also admitted that he voted for Trump — a tactical decision, he explained. “We need things that we can use to promote the cause, and I think Donald Trump is a daily advertisement for that cause,” he said, noting that his vote didn’t matter much in California, anyway.

When it comes to Marinelli’s thoughts on the other president in his life, Putin, he keeps his cards closer to his chest. He said he doesn’t have an emotional connection to Russia in the same way he does the United States, which is actually “a great thing” about living in Yekaterinburg.

Back home, he said, he was often frustrated by what he saw as America’s failings.

“I think every country has progress to make on some fronts. People say, for example, that Russia has progress to make when it comes to civil rights and human rights,” he said. “And the United States doesn’t? In Russia, police aren’t shooting people because of their skin color. There’s pros and cons.”

Read more:

‘California is a nation, not a state’: This movement wants a break from the U.S.

What did Google Know, When did The Know it?

Image result for google russian hacking Techviral

A Glimpse Into How Much Google Knows About Russian Government Hackers

A 2014 leaked private report from Google shows how much the internet giant knows about government hacking groups.

Motherboard: In October of 2014 an American security company revealed that a group of hackers affiliated with the Russian government, dubbed APT28, had targeted Georgia and other Eastern European countries in a wide-ranging espionage campaign. Two and a half years later, APT28—also known as “Fancy Bear” or “Sofacy”—is a household name not just in the cybersecurity industry, but in the mainstream too, thanks to its attack on the US Democratic party and the ensuing leaks of documents and emails.

Before that report by FireEye, APT28 was a well-kept secret within the cybersecurity industry. At the time, several companies were willing to share information about the hacking group. Even Google investigated the group, and penned a 40-page technical report on the hacking group that has never been published before.

This sort of document, which Motherboard obtained from two independent sources, may be a common sight in the threat intelligence industry, but the public rarely gets to see what such a report from Google looks like. The report draws from one of Google’s most interesting sources of data when it comes to malware and cybersecurity threats: VirusTotal, a public malware repository that the internet giant acquired in 2012.

Sofacy and X-Agent, the report read, referring to the malware used by APT28, “are used by a sophisticated state-sponsored group targeting primarily former Soviet republics, NATO members, and other Western European countries.”

“It looks like Google researchers were well aware of Sofacy before it was publicly disclosed.”

While Google security researchers don’t dwell into who’s really behind these operations, they do hint that they agree with the now widespread belief that APT28 works for the Russian government in a clever, indirect, way—in the very title of the report: “Peering into the Aquarium.”

While that might seem like an obscure title, for those who follow Russian espionage activities, it’s a clear reference to the headquarters of the military intelligence agency known as GRU or Glavnoye Razvedyvatel’noye Upravleniye, which are popularly known as “The Aquarium.”

“It looks like Google researchers were well aware of Sofacy before it was publicly disclosed,” Matt Suiche, a security researcher and the founder of Comae Technologies and the OPCDE  conference, told Motherboard in an online chat after reviewing the report. “And also attributed Sofacy and X-Agent to Russia before it was publicly done by FireEye, ESET or CrowdStrike.”

In its report Google security researcher note that APT28 attacks a large number of targets with its first-stage malware Sofacy, but only uses the more tailored and sophisticated X-Agent, which was recently used against Ukraine’s military units, for “high-priority targets.”

“Sofacy was three times more common than X-Agent in the wild, with over 600 distinct samples,” Google’s report stated.

Asked for comment, a Google spokesperson said via email that the company’s “security teams are constantly monitoring potential threats to internet users, and regularly publish information to better protect them.”

The report noted that Georgia had the highest ratio of submissions of Sofacy malware, followed by Romania, Russia and Denmark.

While this report is now a bit dated, it shows that for all its sophistication, APT28 has been often caught in the act of hacking politically interesting targets, betraying the origin of the hackers behind the dry nickname. It also reveals how much a company like Google, which doesn’t have software installed on thousands of customers computers like other antivirus and security vendors that is designed to specifically detect malware, can still learn a lot about government hacking groups thanks to the other data it has access to.

*** Related reading:

State-sponsored hackers targeting prominent journalists, Google warns

Politico: Google has warned a number of prominent journalists that state-sponsored hackers are attempting to steal their passwords and break into their inboxes, the journalists tell POLITICO.

Jonathan Chait of New York Magazine said he received several messages from Google warning him about an attack from a government-backed hacker starting shortly after the election. He said the most recent warning came two to three weeks ago.

Julia Ioffe, who recently started at The Atlantic and has covered Russia for years, said she got warnings as recently as two weeks ago. (See one of the warnings: http://bit.ly/2kMUyRb)

Some journalists getting the warnings say they suspect the hackers could be Russians looking to find incriminating emails they could leak to embarrass journalists, either by revealing alleged liberal bias or to expose the sausage-making of D.C. journalism.

“The fact that all this started right after the election suggests to me that journalists are the next wave to be targeted by state-sponsored hackers in the way that Democrats were during it,” said one journalist who got the warning. “I worry that the outcome is going to be the same: Someone, somewhere, is going to get hacked, and then the contents of their gmail will be weaponized against them — and by extension all media.”

The Russian embassy did not respond to a request for comment.

Image result for russian embassy washington dc Russian embassy Washington DC

Google cautioned that the warnings did not mean the accounts had been compromised already and were sent due to “an abundance of caution.”

“Since 2012, we’ve notified users when we believe their Google accounts are being targeted by government-backed attackers,” said a Google spokesperson in a statement. “We send these warnings out of an abundance of caution — they do not indicate that a user’s account has already been compromised or that a more widespread attack is occurring when they receive the notice.”

Ezra Klein, the founder of Vox, said he had received the warning as recently as a few days back. CNN senior media reporter Brian Stelter said he has been getting the alerts for the past few months.

Other journalists who confirmed they’ve recently gotten the warnings include New York Times national security correspondent David Sanger, Times columnist Paul Krugman and Yahoo Washington bureau chief Garance Franke-Ruta.

GQ special contributor Keith Olbermann said the warnings started a few weeks after the election, and he received the most recent alert earlier this week, a “big bright red bar” across the top of his Gmail. Some of the reporters say they are tightening up their email security to try to prevent the hackers from getting in.

Chait also said he was “contacted over email by a stranger who offered to help me by giving me an encryption key to protect me from hackers. He would not give me his name, meet me or talk on the phone, despite repeated requests.”

The stranger also emailed The Atlantic’s David Frum, James Fallows and Adam Serwer, Andrew Sullivan and Ars Technica’s Dan Goodin.

Stanford professor Michael McFaul, the former U.S. ambassador to Russia, said he also received hacking warnings from Google. He added: “Given my background, one would have to guess that it’s the Russians.”

Russian Spy Operations History in the U.S.

In 2015:

The FBI announced on Monday that it had busted a Russian spy ring that was allegedly focused on obtaining economic information including details about US markets and sanctions on Russian banks.

According to a federal complaint filed by FBI special agent Gregory Monaghan in a Manhattan federal court on Friday, an alleged spy, Evgeny Buryakov, posed as a banker in the New York office of an unnamed Russian bank.

Buryakov is reportedly being arraigned in the Southern District of New York.

Monaghan said Buryakov (aka”Zhenya”) was on “deep cover” and working for Russia’s Foreign Intelligence Service (SVR) to gather intelligence and transmit it back to Moscow. The SVR used multiple forms of cover.

The complaint includes several stunning revelations, including claims that staffers at an unidentified Russian news organization in the US are engaged in spying; and indications that American law enforcement bugged the New York office of the Foreign Intelligence Service.

According to the complaint, Buryakov worked with two other men who were involved in intelligence-gathering activities for the SVR: Victor Podobnyy and Igor Sporyshev. The complaint said Sporyshev served as a trade representative to the Russian Federation in New York. Podobnyy was allegedly an attaché to the permanent mission of the Russian Federation to the United Nations. More here from BusinessInsider.

***

Related reading: Russian Hacking, We knew Because we had an Inside Operative(s)

SPIES, SPIES EVERYWHERE
A journey through D.C. espionage

WaPo: Mystery and intrigue are running wild in the capital these days. Secret conversations with dangerous diplomats, explosive foreign dossiers on American leaders, handwringing over national security and leaky intelligence. If you dip into our new book “Spy Sites of Washington, D.C.,” you will find that sneaking, lying and skullduggery are as old as the republic itself. And our region is full of the traces: hotels and parks and saloons and embassies and government offices where the deceitful and disloyal got up to their antics. Here is a sampling of sites where our nation’s espionage history has played out.

Presidential Daily Briefing for Trump on Russia

There are rumors flying that the intelligence agencies are holding back on key items that would otherwise be included in the PDB’s, especially items regarding Russia. Okay, we cannot know for sure that is true or not. In fact there are denials this is accurate. While countless media outlets are reporting that some ‘higher-ups’ in some intel agencies are in a war with President Trump, it is all because he is in a war with them. Sheesh….while all this is going on, other allied world leaders are watching all this and are feeling quite uneasy over intelligence collaboration and most especially where all this leads.

Image result for russian spy ship norfolk, virginia

Some one needs to restore order and confidence here and do it fast. At issue is Russia and Iran.

  1. The Russian spy ship doing an ‘in-your-face’ Atlantic coast water adventure and is presently just outside of Norfolk, Virginia and headed back to the Cuba region.
  2. Meanwhile, the new Secretary of State, Rex Tillerson is in Germany meeting with his Russian counterpart Sergey Lavrov.
  3. Another item is General Dunford is in Azerbaijan, meeting with Russian Chief of General Staff of the Armed Forces, Gerasimov.
  4. Qassem Soleimani, head of the Iranian Qods Force is in Moscow. Soleimani has a U.S. and U.N. travel ban and sanctions on him such that he is not allowed to travel. Hah…
  5. Ciaran Martin, head of GCHQ’s new National Cyber Security Centre states that Russia is escalating the rate of hacks against the UK. The United States, Canada, Australia and the UK are the four countries of record that make up GCHQ.
  6. Deputy Defense Secretary Bob Work met with Ukrainian Foreign Affairs Minister Pavlo Klimkin at the Pentagon regarding discussion over the recent escalation of violence by combined Russian separatist forces in eastern Ukraine.
  7. Because of Russian aggression and the lasting threat to the Baltic States, General Mattis has ordered U.S. troops deploy in Bulgaria.
  8. Russian troops attacked Ukrainian positions 139 times using heavy armor in all sectors in Donbas in the past 48 hours.

    Situation in Donbas February 13, 2017 Ukraine conflict map

    9.  Russia tells White House it will not return Crimea to Ukraine.
    10. Russia has secretly deployed a new cruise missile that American officials say violates a landmark arms control treaty, posing a major test for President Trump as his administration is facing a crisis over its ties to Moscow. The missile (Kalibr) is a SSC-8. It is a nuclear capable missile first tested in 2008. While this launch was ground based, it can also be launched from a submarine and is capable of holding 1000 lbs of conventional explosives or a nuclear warhead. There are variants to this weapon, there is also the Iskander and the 9M728. Nonetheless, it is a violation of the INF Treaty.
    Lastly and a very good thing, while Vladimir Putin is calling for full intelligence cooperation with the United States, General Mattis has not, no….not ready. Further, Mattis said that Russia needs to prove itself….tic tic tic…

    11. Soldiers, tanks and M88 recovery vehicles from the 1st Battalion, 8th Infantry Regiment’s “Fighting Eagles” recently arrived at the airbase in Romania in support of Operation Atlantic Resolve. So far, more than 350 U.S. soldiers have arrived this month with another 150 set to arrive before the end of February.

So, should there be some normalizing of relations between the White House and the Kremlin? Nah….has not worked out so well when it comes to Iran or Cuba…

Operation Blockbuster: Lazarus Group Hacks Again

Why should you care? There was a long investigation in separate yet concentrated efforts by both government and private/independent cyber corporations as it related to the hack of Sony. Enter the Lazarus Group, an applied name to hackers that have hit industries such as government, military, financial and entertainment. Few countries are really exempt, as their signature malware has also been found in Japan, India and China.

Image result for lazarus group cyber

Lazarus Group has been active since 2009 and to date cannot be attributed to any single actor or country.

For the comprehensive report, go here. Operation Blockbuster: Image result for operation blockbuster cyber

Recent malware attacks on Polish banks tied to wider hacking campaign

Hackers targeted more than 100 organizations in more than 30 countries

ComputerWorld: Malware attacks that recently put the Polish banking sector on alert were part of a larger campaign that targeted financial organizations from more than 30 countries.

Researchers from Symantec and BAE Systems linked the malware used in the recently discovered Polish attack to similar attacks that have taken place since October in other countries. There are also similarities to tools previously used by a group of attackers known in the security industry as Lazarus.

The hackers compromised websites that were of interest to their ultimate targets, a technique known as watering-hole attacks. They then injected code into the websites that redirected visitors to a custom exploit kit.

The exploit kit contained exploits for known vulnerabilities in Silverlight and Flash Player; the exploits only activated for visitors who had Internet Protocol addresses from specific ranges.

“These IP addresses belong to 104 different organizations located in 31 different countries,” researchers from Symantec said in a blog post Sunday. “The vast majority of these organizations are banks, with a small number of telecoms and internet firms also on the list.”

In the case of the targeted Polish banks, it’s suspected that the malicious code was hosted on the website of the Polish Financial Supervision Authority, the government watchdog for the banking sector. The BAE Systems researchers found evidence that similar code pointing to the custom exploit kit was present on the website of the National Banking and Stock Commission of Mexico in November. This is the Mexican equivalent to the Polish Financial Supervision Authority.

The same code was also found on the website of the Banco de la República Oriental del Uruguay, the largest state-owned bank in that South American country, according to BAE Systems.

Included in the list of targeted IP addresses were those of 19 organizations from Poland, 15 from the U.S., nine from Mexico, seven from the U.K., and six from Chile.

The payload of the exploits was a previously unknown malware downloader that Symantec now calls Downloader.Ratankba. Its purpose is to download another malicious program that can gather information from the compromised system. This second tool has code similarities to malware used in the past by the Lazarus group.

Lazarus has been operating since 2009, and has largely focused on targets from the U.S. and South Korea in the past, the Symantec researchers said. The group is also suspected of being involved in the theft of $81 million from the central bank of Bangladesh last year. In that attack, hackers used malware to manipulate the computers used by the bank to operate money transfers over the SWIFT network.

“The technical/forensic evidence to link the Lazarus group actors … to the watering-hole activity is unclear,” the BAE Systems researchers said in a blog post Sunday. “However, the choice of bank supervisor and state-bank websites would be apt, given their previous targeting of central banks for heists — even when it serves little operational benefit for infiltrating the wider banking sector.”