Republicans Hacked, Data Sent to Russian Domain

Republicans hacked, skimmed NRSC donations sent to Russian domain

Hundreds, if not thousands of donations made to the NRSC this year were likely compromised

CSO: Republicans who gave money to the National Republican Senatorial Committee (NRSC) this year, in order to help support incumbent Republican senators, might want to check their credit card statements.

Those who donated to the NRSC between March 16 and October 5, 2016, conducted their transaction on a platform that was compromised by malicious code designed to steal credit card details and personal information. The NRSC quietly corrected the problem sometime around October 6, 2016.

The hacked storefront, which powers the NRSC donation system, was discovered by Willem de Groot – a Dutch developer who discovered thousands of compromised websites running vulnerable versions of the Magento e-commerce platform.

The compromised NRSC transactions included the donor’s first name, last name, email address, billing details (address, city, state, and zip code), employer details, occupation, card type, card number, card expiration, and security code.

Once the data was collected by the malicious code, the compromised transactions were then sent to one of two different domains.

Earlier this year, the criminals responsible for skimming the card data were using jquery-cloud[.]net to receive the compromised records. Later, the code on the NRSC website was altered to send skimmed transactions to jquery-code[.]su.

The malicious .su domain is still operational, and it’s hosted on a network (Dataflow) with some suspicious, if not outright criminal clients – including those that deal with drugs, money laundering, Phishing, and spam.

It isn’t clear who is behind the attack, as anyone can register a domain and obtain hosting. One interesting observation made by de Groot during his research, was that Dataflow and jquery-cloud[.]net came online together during the same week in November of 2015.

As for impact, it’s hard to tell how many transactions on the NRSC website were compromised. Going by traffic, de Groot said that upwards of 3,500 compromised transactions per month were possible.

Based on reporting to the Federal Election Commission, the NRSC collected more than $30 million in contributions since March 2016, when the card skimming code was first observed on their domain. But again, this total is for all funds collected, and doesn’t single out credit card donations.

As mentioned, once the issue became public earlier this month, the NRSC quietly replaced the compromised storefront with a new one powered by WordPress.

Salted Hash attempted to reach out to the NRSC over the weekend, but the committee hasn’t responded to queries. As of October 17, the NRSC website makes no mention of the new storefront, or the compromised e-commerce platform.

Unfortunately, this means GOP supporters who had their credit card information compromised could be caught by surprise once their accounts show signs of fraudulent activity, and left completely unaware of the problem’s root cause.

During his research, de Groot determined that more than 5,400 storefronts were compromised by the same type of malicious code used on the NRSC domain. So far, he has discovered nine variants of the skimming code, suggesting that multiple people (or groups) are involved.

When de Groot reached out to victims, in an attempt to alert them about their compromised domains, many of the website owners failed to understand the full impact of the situation.

Some responded to the warnings by arguing to de Groot that the code added by the criminals didn’t matter because – “our payments are handled by a 3rd party payment provider” or “our shop is safe because we use HTTPS.”

Those responding like this are missing the bigger point; if the code running the payment processing system is compromised, 3rd-party processing and HTTPS will not prevent a criminal from obtaining your card data or personal information.

A full list of the storefronts compromised by the skimming code is available on GitLab. Over the weekend, GitLab removed the list in error, but they’ve since restored the list with an apology.

A video demonstrating how the NRSC hack worked is below:

 

Going deeper, BuzzFeed tells us who Fancy Bear really is:

SAN FRANCISCO — On the morning of March 10, nine days after Hillary Clinton had won big on Super Tuesday and all but clinched the Democratic nomination, a series of emails were sent to the most senior members of her campaign.

At a glance, they looked like a standard message from Google, asking that users click a link to review recent suspicious activity on their Gmail accounts. Clicking on them would lead to a page that looked nearly identical to Gmail’s password reset page with a prompt to sign in. Unless they were looking closely at the URL in their address bar, there was very little to set off alarm bells.

From the moment those emails were opened, senior members in Clinton’s campaign were falling into a trap set by one of the most aggressive and notorious groups of hackers working on behalf of the Russian state. The same group would shortly target the Democratic National Committee (DNC) and Democratic Congressional Campaign Committee (DCCC). It was an orchestrated attack that — in the midst of one of the most surreal US presidential races in recent memory — sought to influence and sow chaos on Election Day.

The hack first came to light on June 15, when the Washington Post published a story based on a report by the CrowdStrike cybersecurity firm alleging that a group of Russian hackers had breached the email servers of the DNC. Countries have spied on one another’s online communications in the midst of an election season for as long as spies could be taught to use computers — but what happened next, the mass leaking of emails that sought to embarrass and ultimately derail a nominee for president, had no precedent in the United States. Thousands of emails — some embarrassing, others punishing were available for public perusal while the Republican nominee for president, Donald Trump, congratulated Russia on the hack and invited it to keep going to “find the 30,000 emails that are missing” from Clinton’s private email server. It was an attack that would edge the US and Russia closer to the brink of a cyberwar that has been simmering for the better part of a decade.

The group behind the hacks is known as Fancy Bear, or APT 28, or Tsar Team, or a dozen other names that have been given to them over the years by cybersecurity researchers. Despite being one of the most reported-on groups of hackers active on the internet today, there is very little researchers can say with absolute certainty. No one knows, for instance, how many hackers are working regularly within Fancy Bear, or how they organize their hacking squads. They don’t know if they are based in one city or scattered in various locations across Russia. They don’t even know what they call themselves.

The group is, according to a White House statement last week, receiving their orders from the highest echelons of the Russian government and their actions “are intended to interfere with the US election process.” For the cybersecurity companies and academic researchers who have followed Fancy Bear’s activities online for years, the hacking and subsequent leaking of Clinton’s emails, as well as those of the DNC and DCCC, were the most recent — and most ambitious — in a long series of cyber-espionage and disinformation campaigns. From its earliest-known activities, in the country of Georgia in 2009, to the hacking of the DNC and Clinton in 2016, Fancy Bear has quickly gained a reputation for its high-profile, political targets.

“Fancy Bear is Russia, or at least a branch of the Russian government, taking the gloves off,” said one official in the Department of Defense. “It’s unlike anything else we’ve seen, and so we are struggling with writing a new playbook to respond.” The official would speak only on condition of anonymity, as his office had been barred from discussing with the press the US response to Fancy Bear’s attacks. “If Fancy Bear were a kid in the playground, it would be the kid stealing all the juice out of your lunch box and then drinking it in front of you, daring you to let him get away with it.”

For a long time, they did get away with it. Fancy Bear’s earliest targets in Georgia, Ukraine, Poland, and Syria meant that few in the US were paying attention. But those attacks were where Fancy Bear honed their tactics — going after political targets and then using the embarrassing or strategic information to their advantage. It was in those earliest attacks, researchers say, that Fancy Bear learned to couple their talent for hacking with a disinformation campaign that would one day see them try to disrupt US elections.

“If Fancy Bear were a kid in the playground, it would be the kid stealing all the juice out of your lunch box and then drinking it in front of you, daring you to let him get away with it.”

In late July 2008, three weeks before Russia invaded Georgia in a show of force that altered the world’s perception of the Kremlin, a network of zombie computers was already gearing up for an attack against the Georgian government. Many of the earliest attacks were straightforward — the website of then-President Mikheil Saakashvili was overloaded with traffic, and a number of news agencies found their sites hacked. By Aug. 9, with the war underway, much of Georgia’s internet traffic, which routes through Russia and Turkey, was being blocked or diverted, and the president’s website had been defaced with images comparing him to Adolf Hitler.

 

Sophos Secruity

It was one of the earliest cases of cyberwarfare coinciding with a real-world physical war, and Fancy Bear, say researchers, was one of the groups behind it.

“When this group first sprung into action, we weren’t necessarily paying attention to the various Russian threat actors, inasmuch as we weren’t distinguishing them from each other,” said one former cybersecurity researcher, who has since left the private sector to work for the Pentagon. He said he could not be quoted on record due to his current job, but that in 2010, when he was still employed with a private company, they had only just started to distinguish Fancy Bear from the rest of the cyber operations being run by the Russian government.

Kurt Baumgartner, a researcher with the Moscow-based Kaspersky cybersecurity company, said the group had the types of financial and technical resources that only nation-states can afford. They would “burn through zero days” said Baumgartner, referring to rare, previously unknown bugs that can be exploited to hack into systems. The group used sophisticated malware, such as Sourface, a program discovered and named by the California-based FireEye cybersecurity company, which creeps onto a computer and downloads malware allowing that computer to be controlled remotely. Other programs attributed to Fancy Bear gave them the ability to wipe or create files, and to erase their footsteps behind them. FireEye researchers wrote that clues left behind, including metadata in the malware, show that the language settings are in Russian, that the malware itself was built during the workday in Moscow and St. Petersburg, and that IP addresses used in attacks could be traced back to Russian sources.

It wasn’t surprising to cybersecurity experts at that time that Russia would be at the forefront of a cyberattack on a nation-state. Along with China, the US, and Israel, Russia was considered to have one of the most sophisticated cyber-offensive capabilities in the world. While China appeared to have its offensive cyber teams largely organized within its military, the US under the NSA, and Israel under Unit 8200, much of Russia’s cyber operations remained obscure.

There are reports from inside Russia that have helped draw a better picture of Russia’s cyber ops. Russian investigative journalists, like Andrei Soldatov, author of The Red Web, have reported on how, following the dismantling of the KGB, Russia’s cyber operations were organized under the FSB, the KGB’s main successor agency. It was a unit operating under the FSB, for instance, that US intelligence officials believe was responsible for years-long cyber-espionage operations into the White House and State Department, discovered in the summer of 2015. At some point, Russia’s main foreign intelligence agency, the GRU, began its own cyber ops. Soldatov said it’s not clear exactly when that happened — though he says it was likely around the time of the war with Georgia — but Fancy Bear is the name given to the most notorious, and apparently prolific, group of hackers working under the GRU.

“Russia’s intelligence agency operates differently. You won’t see officers [in] uniform and hacking into infrastructure. They embed people in various infrastructure places, like ISPs, or power companies,” said Vitali Kremez, a cybercrime intelligence researcher with the Flashpoint cybersecurity firm. “To orchestrate the DNC hack wouldn’t require dozens of people, it would take two or three people, even one person, if he was talented enough. That person would have his orders for that part of the operation, and someone else, somewhere else, might have orders for a different part.”

For years, cybersecurity companies wrote up reports about Fancy Bear, often adding only in the postscript that the group they were talking about was working on behalf of Russia’s GRU. It wasn’t until last week that the US government officially named them as being tied to the highest echelons of Russia’s government.

“What first caught our attention about Fancy Bear was the targets it went after,” the Pentagon researcher said. “This was a group interested in high-stakes targets, and given who they were after — Georgia, Poland, Russian dissidents — it seemed obvious that a Russian government agency would be after those targets.”

In the years following Georgia, the targets that Fancy Bear went after grew in size, sophistication, and scope. One report, by Germany’s intelligence agency BfV, categorized the group as engaging in “hybrid warfare,” meaning a mix of conventional warfare and cyberwarfare. It gave the example of a Dec. 23, 2015, attack on Ukraine’s power grid that left more than 230,000 people without power, and said that Fancy Bear had also tried to lure German state organizations, including the Parliament and Angela Merkel’s CDU party, into installing malware on their systems that would have given the hackers direct access to German government systems. It’s unclear if anyone opened the emails that installed the malware.

The BfV report concluded that these “cyberattacks carried out by Russian secret services are part of multiyear international operations that are aimed at obtaining strategic information.” It was the first time a government had publicly named Fancy Bear as a Russian cyber operation. And there was one attack, on a French TV station, that cybersecurity researchers say was a precursor of things yet to come.

BuzzFeed News; Getty

It was just past 10 p.m. on April 8, 2015, when the French television network TV5Monde suddenly began to broadcast ISIS slogans, while its Facebook page started to post warnings: “Soldiers of France, stay away from the Islamic State! You have the chance to save your families, take advantage of it,” read one message. “The CyberCaliphate continues its cyberjihad against the enemies of Islamic State.”

The posts prompted headlines around the world declaring that the ISIS hacking division, known as the “cyber caliphate,” had successfully hacked into the French television network and taken over the broadcast.

It took nearly a month for cybersecurity companies investigating the attack to determine that it had, in actuality, been carried out by Fancy Bear. One of the companies, FireEye, told BuzzFeed News that they had traced the attack back to the group by looking at the IP addresses used to attack the station, and comparing them to IP addresses used in previous attacks carried out by Fancy Bear. The ISIS claims of responsibility planted on TV5Monde were just a disinformation campaign launched by the Russians to create public hysteria over the prospect of a terror group launching a cyberattack.

“Russia has a long history of using information operations to sow disinformation and discord, and to confuse the situation in a way that could benefit them,” Jen Weedon, a researcher at FireEye told BuzzFeed News following the attack. “In this case, it’s possible that the ISIS cyber caliphate could be a distraction. This could be a touch run to see if they could pull off a coordinated attack on a media outlet that resulted in stopping broadcasts, and stopping news dissemination.”

For nearly a month, headlines in France and across Europe had speculated about ISIS’ cyber capabilities and motives for the attack on TV5Monde. The stories setting the record straight, and reporting that a Russian group had, in fact, launched the attack, ran in a handful of newspapers for a day or two after the discovery.

At the same time, Fancy Bear was running other experiments, including a campaign to harass British journalist Eliot Higgins, and his citizen journalist website, Bellingcat. Higgins, who had published a number of articles documenting Russia’s alleged involvement in the shooting down of a Malaysian jetliner over Ukraine and the Russian shelling of military positions in eastern Ukraine, suddenly received an onslaught of spear-phishing emails. It wasn’t until this year, when Higgins saw a report by the ThreatConnect cybersecurity company on the DNC hacks that he realized that the emails targeting his site might have been similar to those targeting the DNC. He forwarded the spear-phishing emails to ThreatConnect, which confirmed that he, as well, had been targeted by Fancy Bear.

“I think it is possible that the things we were reporting on caught the eye of the hackers,” said Higgins. “More than anything it’s a badge of honor if they are going through so much effort to attack us. We must be getting something right.”

Russian media outlets, including Kremlin-owned Sputnik and Russia Today, have run articles suggesting that Bellingcat is linked to the CIA. The Bellingcat website has been defaced with personal photos of a contributor and his girlfriend.

“I think they are worried,” Higgins said. “So they are trying to discredit us.” He said it surprised him that the spear-phishing emails that targeted him and his campaign followed — almost to a formula — those sent to the DNC. The hackers didn’t bother to change the IP address, URL service, or fake Gmail message they used on either his website or the DNC. It was almost, he said, as if they didn’t mind being traced. “They have a government backing them that doesn’t care about taking down airliners, and bombing civilians in Syria so maybe they don’t care about being caught.”

Both Bellingcat and TV5Monde were, researchers now say, practice runs for Fancy Bear on the use of disinformation campaigns. People would remember a story about a ISIS-led cyberattack on France far more than a story pointing out that it was actually the Russians. Bellingcat’s work on exposing Russian operations would forever be linked, at least in the Russian media, to the accusations that they were CIA operatives. Fancy Bear was honing its skills.

The emails that Higgins, Clinton and the rest of the DNC received were variations of the millions of spear-phishing emails that go out each day. The success of those emails is predicated on the idea that everyone, no matter how savvy or suspicious, will eventually succumb to a spear-phishing attempt given enough time and effort by the attackers.

While Fancy Bear has used sophisticated — and expensive — malware during its operations, its first and most commonly used tactic has been a simple spear-phishing email, or a malicious email engineered to look like it was coming from a trusted source.

“These hacks almost always start with spear-phishing emails, because why would you start with something more complex when something so simple and easy to execute works?” said Anup Ghosh, CEO of the Invincea cybersecurity firm, which has studied the malware found on the DNC systems. “It is the easiest way to get malware onto a machine, just having the person click a link or open an executable file and they have opened the front door for you. Our analysis is on the malware itself, which had remote command and control capabilities. They essentially got the DNC to download malware which let them remotely control their computers.”

Once a spear-phishing email is clicked on, users not only give up their passwords but, in many cases, including in the case of the DNC, download malware onto their computers that gives the attackers instant access to their entire systems.

Cybersecurity experts report that 50% of people will click on a spear-phishing email. In the case of the Democratic Party, Fancy Bear’s success rate was about half of that — but good enough to get them into the accounts of some of the most senior members of the party.

From March 10, 2016, emails appearing to come from Google were sent to 108 members of Democratic presidential nominee Hillary Clinton’s campaign, and another 20 people from the Democratic National Convention (DNC), according to research published by the cybersecurity firm SecureWorks. They found the emails by tracing the malicious URLs set up by Fancy Bear using Bitly, the same service used to target Bellingcat. Fancy Bear had set the URL they sent out to read accounts-google.com, rather than the official Google URL, accounts.google.com. Dozens of people were fooled.

“They did a great job with capturing the look and feel of Google”

“We were monitoring bit.ly and saw the accounts being created in real time,” said Phil Burdette, a senior security researcher at SecureWorks, explaining how they stumbled upon the URLs set up by Fancy Bear. Bitly also keeps data on when a link is clicked, which allowed Burdette to determine that of the 108 email addresses targeted at the Clinton campaign, 20 people clicked on the links (at least four people clicked the link more than once). At the DNC, 16 email addresses were targeted, and 4 people clicked on them.

“They did a great job with capturing the look and feel of Google,” said Burdette, who added that unless a person was paying clear attention to the URL or noticed that the site was not HTTPS secure, they would likely not notice the difference.

Once Democratic Party officials entered their information into the fake Gmail page, Fancy Bear had access to not just their email accounts, but to the shared calendars, documents, and spreadsheets on their Google Drive. Among those targeted, said Burdette, were Clinton’s national political director, finance director, director of strategic communications, and press secretary. None of Clinton’s staff responded to repeated requests for comment from BuzzFeed News.

In their June 14 report, CrowdStrike found that not only was Fancy Bear in the DNC system, but that another group linked to Russia known as Cozy Bear, or APT 29, had also hacked into the DNC and was lurking in the system, collecting information. The report stated, “Both adversaries engage in extensive political and economic espionage for the benefit of the government of the Russian Federation and are believed to be closely linked to the Russian government’s powerful and highly capable intelligence services.”

The linked names, say the cybersecurity researchers who come up with them according to their own personal whims, are no coincidence. While both bears sought out intelligence targets and infiltrated government agencies across the world, their styles were distinct. Cozy Bear would go after targets en masse, spear-phishing an entire wing at the State Department or White House and then lurking quietly in the system for years. Fancy Bear, meanwhile, would be more specific in its targets, aggressively going after a single person by mining social media for details of their personal lives.

Both bears were in the DNC system, but whereas Cozy Bear might have been there for years, undetected in the background, CrowdStrike has said that it was Fancy Bear, with their more aggressive intelligence-gathering operation, that tipped off security teams that something was amiss. It was also Fancy Bear, cybersecurity researchers believe, who was behind the disinformation campaigns that made public the thousands of emails from the DNC and Clinton.

Making those emails public, say cybersecurity experts and US intelligence officials, is what shifted the hack from another Russian cyber-espionage operation to a game changer in the long-simmering US–Russia cyberwar. Using the well-established WikiLeaks platform, as well as newly invented figureheads, ensured that the leaked emails got maximum exposure. Within 24 hours of the CrowdStrike report, a Twitter account under the name @Guccifer_2 was established and began tweeting about the hack on the DNC. One of the first tweets claimed responsibility for hacking the DNC’s servers, and in subsequent private messages with journalists, including BuzzFeed News, the account claimed that it was run by a lone Romanian hacker, and that he alone had been responsible for hacking into the DNC servers and, later, the Clinton Foundation, as well as senior members of Clinton’s staff. The account offered to send BuzzFeed News emails from the hacks and appeared to make the same offer to several US publications, including Gawker and the Smoking Gun.

Julian Assange, founder of the online leaking platform WikiLeaks Steffi Loos / AFP / Getty Images

Within the week, WikiLeaks had published more than 19,000 DNC emails. Though WikiLeaks would not reveal the source, Guccifer 2.0 gleefully messaged journalists that he had been the source of the leak. Few bought the story — a language analysis on the Guccifer 2.0 account showed it made mistakes typical of Russian speakers, and when asked questions in Romanian by reporters in an online chat, Guccifer 2.0 appeared to not be able to answer. Meanwhile, metadata in the docs, such as Russian-language settings and software versions popular in Russia, led cybersecurity experts to believe that not only were the emails leaked by Russia, but that Guccifer 2.0 was an account created by the Russian state to try and deflect attention.

The same week, a site calling itself DCLeaks suddenly appeared, claiming it was run by “American hacktivists,” and began publishing hacked emails as well.

US intelligence agencies now believe that Guccifer 2.0 and DCLeaks were created by Fancy Bear, or a Russian organization working in conjunction with Fancy Bear, in order to disseminate the hacked emails and launch a disinformation campaign about their origin. WikiLeaks, whose founder Julian Assange has been dogged by his own accusations of close ties to Russia, has refused to state how he got the emails.

“We hope to be publishing every week for the next 10 weeks, we have on schedule, and it’s a very hard schedule, all the US election-related documents to come out before Nov. 8,” Assange said in a recent press conference.

Just weeks before Americans go to the polls, no one knows what material is yet to be published.


In a background briefing earlier this year, one US intelligence officer described cyberwar as “a war with no borders, no innocents, and no rules.” The officer, who has been working on US cyberpolicy for over a decade, said he didn’t think it was a question of if the US and Russia would one day be fighting a full-out cyberwar — it was a question of when.

“They’ve been dancing around each other like two hungry bears for a long time. At some point, one of them is going to take a bite,” said the officer. (His use of the word “bears” appeared to be coincidental.)

The White House’s naming of the Russian government as being behind the hacks attributed to Fancy Bear took the US and Russia into uncharted territory. While no one used the word cyberwar, the statement by the Department of Homeland Security and Director of National Intelligence did not mince words.

“The U.S. Intelligence Community (USIC) is confident that the Russian Government directed the recent compromises of e-mails from US persons and institutions, including from US political organizations. The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts. These thefts and disclosures are intended to interfere with the US election process,” the statement read. “We believe, based on the scope and sensitivity of these efforts, that only Russia’s senior-most officials could have authorized these activities.”

Russian President Vladimir Putin has continued to deny Russia’s involvement in the hacks and said the leaked emails are a “public service.” In a televised address this week, Putin said the hacks were not in Russia’s interest.

Russian President Vladimir Putin Sputnik / Reuters

“There’s nothing in Russia’s interest here; the hysteria has been created only to distract the American people from the main point of what was revealed by hackers. And the main point is that public opinion was manipulated. But no one talks about this. Is it really important who did this? What is inside this information — that is what important,” Putin said.

The US is still “writing the playbook,” as one Department of Defense official put it, on what happens next, though sanctions, diplomatic action, and offensive cyberattacks are all being considered. Members of Congress have come forward, asking the White House to take aggressive action against Russia. The two countries are, undoubtedly, facing the lowest point in relations in decades.

Fancy Bear and other Russian hacking groups are still active. As countries in Europe — including France, the UK, and Germany — face upcoming elections, what is to stop Fancy Bear from engaging in the same type of hacking and disinformation campaigns?

“They did this to the United States — there is nothing to stop them from doing this to our allies in Europe,” said Jason Healey, former White House director of cyber infrastructure, and a senior research scholar at Columbia University’s School of International and Public Affairs. “We need to be working with our allies and sharing what we know so that this group doesn’t interfere with elections across Europe.”

Baumgartner, the researcher with Kaspersky, said he’s noticed big changes with Fancy Bear. They appear to be spreading out their operations and focus, he said.

“What used to be one focused and narrow group is now several subgroups,” he said. “They might be running independent of each other, or in parallel, but they seem to be spreading out operations.”

Higgins, who runs the Bellingcat website, said that after a lull of almost a year, he suddenly started getting spear-phishing emails again this week that look identical to the ones Fancy Bear hackers sent him last year.

“They’re sending them every day again,” said Higgins. “They are clearly not going to stop.”

CORRECTION

The Bellingcat website was defaced by photos of one of its contributors. The original version of this story stated that it was defaced with photos of its founder, Higgins.

The Search and Destroy History of Hillary Clinton

While America and actually the world is witnessing this National Enquirer headline presidential campaign for both Donald and Hillary, the one item that seems to be omitted completely is the Bill Clinton/Sandy Berger theft of documents from the National Archives. In case you need a reminder and a refresher including documents, a sampling is below, that is a compilation of FOIA requests.

nara-foia-sandy-berger

How about this? WikiLeaks Podesta email selection: It seems there could be some classified material in this communication.

Re: Here’s what I mentioned

Date: 2014-08-19 11:21
Subject: Re: Here’s what I mentioned
Agree but there may be opportunities as the Iraqi piece improves. Also, any idea whose fighters attacked Islamist positions in Tripoli, Libya? Worth analyzing for future purposes.
From: John Podesta [mailto:[email protected]]
Sent: Tuesday, August 19, 2014 09:19 AM
To: H Subject: Re: Here’s what I mentioned Hit send too soon.
Meant to say Syria elements are vexing.
On Aug 19, 2014 9:17 AM, “John Podesta” <[email protected]<mailto:[email protected]>> wrote:
I think we are headed down this path in Iraq, but the Syria elements are
On Aug 17, 2014 3:50 PM, “H” <[email protected]<mailto:[email protected]>> wrote:
Note: Sources include Western intelligence, US intelligence and sources in the region. 1. With all of its tragic aspects, the advance of ISIL through Iraq gives the U.S. Government an opportunity to change the way it deals with the chaotic security situation in North Africa and the Middle East. The most important factor in this matter is to make use of intelligence resources and Special Operations troops in an aggressive manner, while avoiding the old school solution, which calls for more traditional military operations. In Iraq it is important that we engage ISIL using the resources of the Peshmerga fighters of the Kurdish Regional Government (KRG), and what, if any, reliable units exist in the Iraqi Army. The Peshmerga commanders are aggressive hard fighting troops, who have long standing relationships with CIA officers and Special Forces operators. However, they will need the continued commitment of U.S. personnel to work with them as advisors and strategic planners, the new generation of Peshmerga commanders being largely untested in traditional combat. That said, with this U.S. aid the Kurdish troops can inflict a real defeat on ISIL. 2. It is important that once we engage ISIL, as we have now done in a limited manner, we and our allies should carry on until they are driven back suffering a tangible defeat. Anything short of this will be seen by other fighters in the region, Libya, Lebanon, and even Jordan, as an American defeat. However, if we provide advisors and planners, as well as increased close air support for the Peshmerga, these soldiers can defeat ISIL. They will give the new Iraqi Government a chance to organize itself, and restructure the Sunni resistance in Syria, moving the center of power toward moderate forces like the Free Syrian Army (FSA). In addition to air support, the Peshmerga also need artillery and armored vehicles to deal with the tanks and other heavy equipment captured from the Iraqi army by ISIL. 3. In the past the USG, in an agreement with the Turkish General Staff, did not provide such heavy weapons to the Peshmerga, out of a concern that they would end up in the hands of Kurdish rebels inside of Turkey. The current situation in Iraq, not to mention the political environment in Turkey, makes this policy obsolete. Also this equipment can now be airlifted directly into the KRG zone. 4. Armed with proper equipment, and working with U.S. advisors, the Peshmerga can attack the ISIL with a coordinated assault supported from the air. This effort will come as a surprise to the ISIL, whose leaders believe we will always stop with targeted bombing, and weaken them both in Iraq and inside of Syria. At the same time we should return to plans to provide the FSA, or some group of moderate forces, with equipment that will allow them to deal with a weakened ISIL, and stepped up operations against the Syrian regime. This entire effort should be done with a low profile, avoiding the massive traditional military operations that are at best temporary solutions. While this military/para-military operation is moving forward, we need to use our diplomatic and more traditional intelligence assets to bring pressure on the governments of Qatar and Saudi Arabia, which are providing clandestine financial and logistic support to ISIL and other radical Sunni groups in the region. This effort will be enhanced by the stepped up commitment in the KRG. The Qataris and Saudis will be put in a position of balancing policy between their ongoing competition to dominate the Sunni world and the consequences of serious U.S. pressure. By the same token, the threat of similar, realistic U.S. operations will serve to assist moderate forces in Libya, Lebanon, and even Jordan, where insurgents are increasingly fascinated by the ISIL success in Iraq. 6. In the end the situation in Iraq is merely the latest and most dangerous example of the regional restructuring that is taking place across North Africa, all the way to the Turkish border. These developments are important to the U.S. for reasons that often differ from country to country: energy and moral commitment to Iraq, energy issues in Libya, and strategic commitments in Jordan. At the same time, as Turkey moves toward a new, more serious Islamic reality, it will be important for them to realize that we are willing to take serious actions, which can be sustained to protect our national interests. This course of action offers the potential for success, as opposed to large scale, traditional military campaigns, that are too expensive and awkward to maintain over time. 7. (Note: A source in Tripoli stated in confidence that when the U.S. Embassy was evacuated, the presence of two U.S. Navy jet fighters over the city brought all fighting to a halt for several hours, as Islamist forces were not certain that these aircraft would not also provide close ground support for moderate government forces.) 8. If we do not take the changes needed to make our security policy in the region more realistic, there is a real danger of ISIL veterans moving on to other countries to facilitate operations by Islamist forces. This is already happening in Libya and Egypt, where fighters are returning from Syria to work with local forces. ISIL is only the latest and most violent example of this process. If we don’t act to defeat them in Iraq something even more violent and dangerous will develop. Successful military operations against these very irregular but determined forces can only be accomplished by making proper use of clandestine/special operations resources, in coordination with airpower, and established local allies. There is, unfortunately, a narrow window of opportunity on this issue, as we need to act before an ISIL state becomes better organized and reaches into Lebanon and Jordan. 9. (Note: It is important to keep in mind that as a result of this policy there probably will be concern in the Sunni regions of Iraq and the Central Government regarding the possible expansion of KRG controlled territory. With advisors in the Peshmerga command we can reassure the concerned parties that, in return for increase autonomy, the KRG will not exclude the Iraqi Government from participation in the management of the oil fields around Kirkuk, and the Mosel Dam hydroelectric facility. At the same time we will be able to work with the Peshmerga as they pursue ISIL into disputed areas of Eastern Syria, coordinating with FSA troops who can move against ISIL from the North. This will make certain Basher al Assad does not gain an advantage from these operations. Finally, as it now appears the U.S. is considering a plan to offer contractors as advisors to the Iraqi Ministry of Defense, we will be in a position to coordinate more effectively between the Peshmerga and the Iraqi Army.)     

Boston: The Details of the Firefight that Wounded Two Police Officers

Ft. Knox confirms Kirk Figueroa spent time in service with US Army Reserve. Kirk Figueroa, killed in firefight, had Florida gun license that expired in Feb. But no records of him having a license in Mass. Florida denied him a private investigator’s license. More here.

BOSTON —5 Investigates uncovered several aliases used by Kirk Figueroa, the man killed by Boston Police after he shot two officers on Wednesday night in East Boston. He took on one of them as he experienced what he called an Islamic “rebirth” in Africa.

It’s a picture of contradictions uncovered by Five Investigates, where Figueroa, 33, who started at least three companies in Florida and other states focused on security and protection is now the man who nearly killed two officers responding to a domestic violence call.

5 Investigates uncovered a job posting for “Police Protection” for one of those companies named Bailrunners. In it, Figueroa identifies himself as Muhummed Isa Al Mahdi. The ad said Al Mahdi was looking for people interested in helping him “hunt down fugitives and bring them to justice.”

5 Investigates also discovered a posting from Muhummed Isa on a website guide for Mosques from October 2012. Isa wrote about his “rebirth as a baby into the Nation of Islam” following a trip to an area of Ethiopia and a Mosque in South Africa.

Isa went on, writing that his unique and blessed journey was prepared and guided by Allah.

Most recently, Figueroa was using the name Kocoa Xango on social media, identifying himself as a police constable. His last post under that name came just a few hours before the fatal shooting.

Documents obtained by 5 Investigates also found criminal trouble for Figueroa dating back to at least 2005 when he was arrested in Georgia for impersonating a police officer.

That case was dismissed, but trouble came again in 2010, when he pleaded guilty to arson after setting a car on fire.

5 Investigates found that the arson case later kept him from obtaining a private investigators license in Florida.

Figueroa’s work history scattered in the years that followed, including a stint for about a week as a correction officer in West Virginia in 2014.

Feeney explained that the police department is responsible for the application and background checks of prospective constables before they are submitted to the City Council for approval.

In order to become a constable, you must have at least three years of documented experience as a licensed constable or provide a certificate that shows that he or she received constable training.

In the state of Massachusetts, a constable can take custody of prisoners or property, if a warrant for a person’s arrest is directed to him. The constable then has permission to apprehend the suspect in any place across the Commonwealth.

Evans compared the work of a constable to a mailman and said that the job did not come with a license to carry a firearm.

How Much has Russia Penetrated America and Policy?

A couple of items, then one wonders if either presidential candidate will mention any part of these items before the election……nah

Beginning with the Department of Justice:

Brooklyn Resident And Two Russian Nationals Arrested In Connection With Scheme To Illegally Export Controlled Technology To Russia

Defendants Used Brooklyn-Based Front Companies to Procure Sophisticated Military and Satellite Technology on Behalf of Russian End-Users

Earlier today, Alexey Barysheff of Brooklyn, New York, a naturalized citizen of the United States, was arrested on federal charges of illegally exporting controlled technology from the United States to end-users in Russia.  Simultaneously, two Russian nationals, Dmitrii Aleksandrovich Karpenko and Alexey Krutilin, were arrested in Denver, Colorado, on charges of conspiring with Barysheff and others in the scheme.[1]  Federal agents also executed search warrants at two Brooklyn locations that were allegedly used as front companies in Barysheff’s illegal scheme.

Barysheff is scheduled to make his initial appearance today at 2:00 p.m. at the United States Courthouse, 225 Cadman Plaza East, Brooklyn, New York, before Chief United States Magistrate Judge Roanne L. Mann.  Karpenko and Krutilin are scheduled to make their initial appearances today at the United States Courthouse in Denver, Colorado, where the government will seek their removal in custody to the Eastern District of New York.

The arrests and charges were announced by U.S. Attorney Robert L. Capers of the Eastern District of New York; Assistant Attorney General for National Security John P. Carlin; Special Agent in Charge Angel M. Melendez, U.S. Immigration and Customs Enforcement (ICE), Homeland Security Investigations (HSI) for New York; FBI Assistant Director in Charge William F. Sweeney, Jr., New York Field Office; Special Agent in Charge Jonathan Carson, U.S. Department of Commerce, Bureau of Industry and Security, Office of Export Enforcement, New York Field Office; and Craig Rupert, Special Agent in Charge of the Department of Defense, Defense Criminal Investigative Service, North East Field Office.

The complaints allege that Barysheff, Karpenko, Krutilin, and others were involved in a conspiracy to obtain technologically cutting-edge microelectronics from manufacturers and suppliers located within the United States and to export those high-tech products to Russia, while evading the government licensing system set up to control such exports.  The Department of Commerce, pursuant to authority granted by the President of the United States, has placed restrictions on the export and re-export of items that it has determined could make a significant contribution to the military potential and weapons proliferation of other nations and that could be detrimental to the foreign policy and national security of the United States.  The microelectronics shipped to Russia included, among other products, digital-to-analog converters and integrated circuits, which are frequently used in a wide range of military systems, including radar and surveillance systems, missile guidance systems, and satellites.  These electronic devices required a license from the Department of Commerce to be exported to Russia and have been restricted for anti-terrorism and national security reasons.

As further detailed in the complaints, in 2015 Barysheff registered the Brooklyn, New York-based companies BKLN Spectra, Inc. (Spectra) and UIP Techno Corp. (UIP Techno).  Since that time, the defendants, and others have used those entities as U.S.-based front companies to purchase, attempt to purchase, and illegally export controlled technology.  To induce U.S.-based manufacturers and suppliers to sell them high-tech, export-controlled microelectronics and to evade applicable controls, the defendants and their co-conspirators purported to be employees and representatives of Spectra and UIP Techno and provided false end-user information in connection with the purchase of the items, concealed the fact that they were exporters, and falsely classified the goods they exported on records submitted to the Department of Commerce.  To conceal the true destination of the controlled microelectronics from the U.S. suppliers, the defendants and their co-conspirators shipped the items first to Finland and subsequently to Russia.

“U.S. export laws exist to prevent potentially dangerous technology from falling into the wrong hands,” said U.S. Attorney Capers.  “Those who seek to evade the scrutiny of U.S. regulatory and law enforcement agencies by operating in the shadows present a danger to our national security and our allies abroad.  We will continue to use all of our available national security options to hold such individuals and corporations accountable.”

“According to the complaints, Barysheff, Karpenko, and Krutilin conspired among themselves and with others to send sensitive U.S. technology surreptitiously to Russia in violation of U.S. export law,” said Assistant Attorney General Carlin.  “These laws are in place to protect the national security, and we will spare no effort in pursuing and holding accountable those who seek to harm the national security by illegally procuring strategic commodities for foreign entities.”

“Had law enforcement not interceded, the alleged perpetrators would have exported materials that are known to be used in a wide range of military devices,” said Melendez, Special Agent in Charge for HSI New York.  “HSI will continue to partner with other law enforcement agencies while focusing its efforts on national security and stopping the illegal flow of sensitive technology.”

“Export controls were established to prevent certain individuals, organizations, or nations from obtaining protected technology and information.  When the laws are evaded, we become vulnerable to the many threats posed by our adversaries.  The FBI will continue to protect our national security assets as we work with our partners to prevent the exportation of restricted materials,” said Sweeney, FBI Assistant Director in Charge, New York Field Office.

“Today’s arrest is a collaborative effort among law enforcement agencies.  I commend our colleagues for their efforts,” said Special Agent in Charge Carson, U.S. Department of Commerce Bureau of Industry and Security, Office of Export Enforcement, New York Field Office. “The Office of Export Enforcement will continue to use our unique authorities as the regulator and enforcer of our nation’s export control laws to keep the most dangerous goods out of the most dangerous hands.”

“The attempted theft of restricted U.S. technology by foreign actors severely threatens the United States’ defensive posture,” said Special Agent in Charge Craig Rupert, DCIS Northeast Field Office.  “DCIS will continue to pursue these investigations with our Federal partners to shield America’s investment in national defense.”

If convicted of the charges, the defendants face up to 25 years in prison and a $1 million fine.

The case is being handled by the Office’s National Security and Cybercrime Section.  Assistant U.S. Attorneys Craig R. Heeren and Peter W. Baldwin are in charge of the prosecution, with assistance from Trial Attorney Matthew Walczewski of the National Security Division’s Counterintelligence and Export Control Section.

The Defendants:

ALEXEY BARYSHEFF
Age: 36
Brooklyn, New York

DMITRII ALEKSANDROVICH KARPENKO
Age: 33
Russia

ALEXEY KRUTILIN
Age: 27
Russia

E.D.N.Y. Docket Nos. 16-893-M, 16-894-M

Then:

Again, Syria, again. U.S. Secretary of State John Kerry and Russian Foreign Minister Sergei Lavrov will meet yet again in Switzerland on Saturday, despite the ceasefire deal in Syria having fallen apart and Kerry suggesting that Russia was carrying out war crimes by bombing civilians in Aleppo. Putin brushes it all off. But Russian President Vladimir Putin said in an interview with French television TF1 on Wednesday that accusations of Russian war crimes are simply “political rhetoric that doesn’t make a lot of sense and doesn’t take account of the reality in Syria.” He added, “I am deeply convinced that it’s our Western partners, and especially the United States, that are responsible for the situation in the region in general and Syria in particular.” At an event in Moscow on Wednesday, Putin also insisted Russia won’t give in to “blackmail and pressure” over its military offensive in Syria and accused the U.S. and its allies of whipping up “anti-Russian hysteria.” Cyber front. The FBI believes that the hacking and leaking of Hillary Clinton campaign chairman John Podesta’s emails was carried out by Russian intelligence, anonymous officials tell the Wall Street Journal. The emails have been leaked to outlets such as the Intercept and WikiLeaks and show political deliberations of the Clinton campaign as well as transcripts of Clinton’s private speeches. The Department of Homeland Security is also helping states look for evidence of breaches and harden their networks following break-ins at a number of state electoral databases, similarly attributed to Russia. “The whole hysteria is aimed at making the American forget about the manipulation of public opinion,” Putin added Wednesday. “No one is talking about that, everyone wants to know who did that, what is important is what is inside and what that information is about.”

The New Drone Terror War Dynamic

Terror Groups Are Strapping Bombs to Cheap Consumer Drones

Motherboard: Most discussions involving the use of remotely piloted aircraft in combat likely conjure up images of America’s giant Predator and Reaper drones, tailor-made military aircraft designed for surveillance and killing. But videos posted recently to YouTube coupled with US military reports suggest that combatants and civilians alike in war-torn regions might also need to worry about weaponized versions of small, inexpensive consumer drones.

In Syria, a country ravaged by civil war, militant groups have started jury rigging quadcopter-style drones with makeshift bombs to drop on targets, military officials told the Associated Press. These small-fry drones would have once been dismissed as unnerving, but harmless. However, a video posted last month showing a drone purportedly belonging to Jund al-Aqsa (a fragment of al-Qaeda) dropping bombs on Syrian armed forces in the Hama province of Syria indicates this may not be the case for much longer.

Another video, this one of alleged footage filmed from a Hezbollah-flown drone, shows bombs being dropped on targets near Aleppo, in Syria.

The Islamic State is also reportedly directly involved in the rudimentary weaponization of consumer drones. A US military official told The New York Times this week that a drone “the size of a model airplane” exploded after being shot down in Iraq recently. The explosion killed two Kurdish fighters, and the official described how the drone contained an explosive device “disguised as a battery.” The small drone, which was thought to be just like many others Islamic State forces use for reconnaissance, exploded after the fighters took it back to their outpost for inspection.

The incident is believed to be the first time Islamic State has successfully killed with a drone deployed with explosives, and the Times reports that American commanders in Iraq are warning allied forces to be wary of any small flying aircraft moving forward.

Jack Serle, a journalist with the Bureau of Investigative Journalism’s Covert Drone War project, told Motherboard that while these drones do not pose the same threat as conventional weapons launched from military aircraft or so-called hunter-killer drones like Reapers and Predators, their capacity to induce panic in civilian areas is a problem.

“What’s really been making people nervous about shop-bought drones in the hands of non-state groups is use in civilian areas, especially in crowded places like shopping centers or sports stadiums,” Serle wrote in an email. “They may not inflict mass casualties, but the terror and panic they could cause is really worrying. This potential for this kind of thing has been on many people’s minds for some years now, and the technology is starting to become a reality.”

A video posted to YouTube showing what is claimed to be a Hezbollah armed drone in Syria. It is worth noting that the authenticity of these videos is still unclear.

American troops stationed in Iraq and Syria have also commented on the rise of small consumeTrr drones being spotted in the air, according to the Times. Such sightings go hand-in-hand with new tactics from the Islamic State.

“In August, the Islamic State called on its followers to jury-rig small store-bought drones with grenades or other explosives and use them to launch attacks at the Olympics,” the Times reported. While no such attacks ever took place in Brazil, the message from Islamic State highlights the terrorist organization’s apparent willingness to expand its toolkit.

Serle told Motherboard that the problem may also be growing as a result of the falling cost of consumer drones that are simultaneously becoming more sophisticated. While traditional anti-air and newly-designed anti-drone weapons exist, Serle said that as consumer drones get more advanced, and the pilots operating them become more adept, “you can imagine a big swarm of them being very hard to stop.”

****

BreakingDefense: The US Navy needs to get better at hunting sea mines. The Royal Navy needs to get better at robots. So the two fleets are joining forces off Scotland in what the Brits are calling “the largest demonstration of its type, ever,” Unmanned Warrior 2016, with “more than 50 unmanned vehicles from over 40 organizations.” The US Office of Naval Research is a major partner in Unmanned Warrior, contributing ten different technologies for testing, from mini-subs to laser drones.

A major (albeit not exclusive) focus for the exercise is mine warfare. As Breaking D readers know, the US Navy has long neglected the unglamorous and grueling work of minesweeping, relying heavily on allies like the UK. Today the U.S. has just 13 operational minesweepers (the Avenger class), for example, while relatively tiny Britain has 15 (seven Sanddowns and eight Hunts). But the US got a loud wakeup call in 2012, when Iran started threatening to mine the Strait of Hormuz. The US Navy responded by hurriedly mobilizing experimental minesweeping systems, many of them robotic (and many originally slated for the troubled Littoral Combat Ship). While robots remain too inflexible for fast-paced combat, they’re ideal for missions that are “dull, dirty, and dangerous,” and mine clearing can be all three.

The 10 systems the Office of Naval Research sent to Unmanned Warrior include seven directly related to mine warfare:

  • Mine warfare platoons, the current gold standard in Navy mine warfare, operate Mark 18 unmanned mini-subs off rigid-hulled inflatable boats.
  • Rapid Environmental Assessment sends unmanned underwater vehicles to survey the sea floor and underwater environment, creating the kind of detailed picture particularly useful to mine hunters.
  • Slocum Gliders are long-range underwater drones that can spend months mapping the underwater world.
  • Seahunter is a small unmanned aircraft carrying a lightweight laser sensor (LIDAR) to map shallow waters where traditional sonar struggles.
  • MCM C2 (Mine Counter-Measures Command & Control) combines multiple robotic systems: Unmanned mini-subs transmit data back to an unmanned mini-helicopter, which in turn relays reports to and orders from a manned ship at a safe distance. An unmanned boat acts as the mini-copter’s floating base.
  • The ongoing Hell Bay trials continue in Unmanned Warrior, this time focusing on coordinated operations among allied drones — including a kind of underwater traffic control —  and by multiple unmanned vehicles acting as an autonomous unit.

There’s also a network of fixed and drone-mounted cameras for port security, ship-recognition software for unmanned reconnaissance systems, and a lightweight recon drone.

Unmanned Warrior, which is happening for the first time this year, is part of the much larger and long-established Joint Warrior exercise involving all three UK services and their NATO allies. As Russia becomes more bellicose, such large-scale wargames are increasingly important, both as practical preparation for the worst case and deterrent signaling to prevent it.