Forget the EMP, It’s the Hack, You’re at Risk

Iranian hackers infiltrated computers of small dam in NY

WASHINGTON (Reuters) – Iranian hackers breached the control system of a dam near New York City in 2013, an infiltration that raised concerns about the security of the country’s infrastructure, the Wall Street Journal reported on Monday, citing former and current U.S. officials.

Two people familiar with the breach told the newspaper it occurred at the Bowman Avenue Dam in Rye, New York. The small structure about 20 miles from New York City is used for flood control.

The hackers gained access to the dam through a cellular modem, the Journal said, citing an unclassified Department of Homeland Security summary of the incident that did not specify the type of infrastructure.

The dam is a 20-foot-tall concrete slab across Blind Brook, about five miles from Long Island Sound.

“It’s very, very small,” Rye City Manager Marcus Serrano told the newspaper. He said FBI agents visited in 2013 to ask the city’s information-technology manager about a hacking incident.

The dam breach was difficult to pin down, and federal investigators at first thought the target was a much larger dam in Oregon, the Journal said.

The breach came as hackers linked to the Iranian government were attacking U.S. bank websites after American spies damaged an Iranian nuclear facility with the Stuxnet computer worm.

It illustrated concerns about many of the old computers controlling industrial systems, and the White House was notified of the infiltration, the Journal said.

The newspaper said the United States had more than 57,000 industrial control systems connected to the Internet, citing Shodan, a search engine that catalogs each machine.

Homeland Security spokesman S.Y. Lee would not confirm the breach to Reuters. He said the department’s 24-hour cybersecurity information-sharing hub and an emergency response team coordinate responses to threats to and vulnerabilities in critical infrastructure.

***

Cant Sleep, You are at Risk

In part from Wired: If you want to keep yourself up at night, spend some time reading about the latest developments in cybersecurity. Airplanes hacked, cars hacked, vulnerabilities in a breathtaking range of sensitive equipment from TSA locks to voting booths to medical devices.

The big picture is even scarier. Former NSA Director Mike McConnell suspects China has hacked “every major corporation” in the US. Edward Snowden’s NSA leaks revealed the US government has its own national and international hacking to account for. And the Ponemon Institute says 110 million Americans saw their identities compromised in 2014. That’s one in two American adults.

The system is broken. It isn’t keeping us, our companies, or our government safe. Worse yet, no one seems to know how to fix it.

How Did We Get Here?

One deceptive truth seems to drive much of the cybersecurity industry down a rabbit hole: If you keep bad actors and bad software out of your system, you have nothing to worry about.

Malicious actors target “endpoints”—any device or sensor connected to a network—to break into that network. Network security seeks to protect those endpoints with firewalls, certificates, passwords, and the like, creating a secure perimeter to keep the whole system safe.

This wasn’t difficult in the early days of the Internet and online threats. But today, most private networks have far too many endpoints to properly secure. In an age of “Bring Your Own Device,” the cloud, remote access, and the Internet of Things, there are too many vulnerabilities hackers can exploit. As Ajay Arora, CEO of file security company Vera, notes, there is no perimeter anymore. It’s a dream of the past.

But the security paradigm remains focused on perimeter defense because, frankly, no one knows what else to do. To address threats, security experts should assume compromise – that hackers and malware already have breached their defenses, or soon will – and instead classify and mitigate threats.

The CIA Triad

The information security community has a model to assess and respond to threats, at least as a starting point. It breaks information security into three essential components: confidentiality, integrity, and availability.

Confidentiality means protecting and keeping your secrets. Espionage and data theft are threats to confidentiality.

Availability means keeping your services running, and giving administrators access to key networks and controls. Denial of service and data deletion attacks threaten availability.

Integrity means assessing whether the software and critical data within your networks and systems are compromised with malicious or unauthorized code or bugs. Viruses and malware compromise the integrity of the systems they infect.

The Biggest Threat

Of these, integrity is the least understood and most nebulous. And what many people don’t realize is it’s the greatest threat to businesses and governments today.

Meanwhile, the cybersecurity industry remains overwhelmingly focused on confidentiality. Its mantra is “encrypt everything.” This is noble, and essential to good security. But without integrity protection, the keys that protect encrypted data are themselves vulnerable to malicious alteration. This is true even of authenticated encryption algorithms like AES-GCM.

In the bigger picture, as cybercrime evolves, it will become clear that loss of integrity is a bigger danger than loss of confidentiality. One merely has to compare different kinds of breaches to see the truth of this:

A confidentiality breach in your car means someone learns your driving habits. An integrity breach means they could take over your brakes. In a power grid, a confidentiality breach exposes system operating information. An integrity breach would compromise critical systems, risking failure or shutdown. And a confidentiality breach in the military would mean hackers could obtain data about sensitive systems. If they made an integrity beach, they could gain control over these weapons systems. Full details and actions you can take to protect yourself, go here.

Juniper Hacked, Several Govt Agencies at Risk

Backdoor Code Found in Firewall

Engadget: One of the reasons corporate users and the privacy-minded rely on VPNs is to control access to their networks and (hopefully) not expose secrets over insecure connections. Today Juniper Networks revealed that some of its products may not have been living up to that standard, after discovering “unauthorized code” in the software that runs on its NetScreen firewalls during a code review. Pointed out by security researcher “The Grugq,” the backdoor has been present since late 2012 and can only be fixed by upgrading to a new version of software just released today.

Telnet / ssh exposes a backdoor added by attackers to ScreenOS source code. This has been there since August 2012. Noted code here.

The pair of issues that created the backdoor would allow anyone who knows about it to remotely log in to the firewall as an administrator, decrypt and spy on supposedly secure traffic, and then remove any trace of their activity. Obviously this is a Very Bad Thing, although Juniper claims it has not heard of any exploitation in the wild (which would be difficult, since no one knew it existed and attackers could hide their traces) so far.

Beyond sending IT people sprinting to patch and test their setups, now we can all speculate about which friendly group of state-sponsored attackers is responsible. US government officials have recently been pushing for mandated backdoor access to secure networks and services, but the Edward Snowden saga made clear that even our own country’s personnel aren’t always going to ask permission before snooping on any information they want to check out. I contacted Juniper Networks regarding the issue, but have not received a response at this time.

Update: A Juniper Networks spokesperson told us:

During a recent internal code review, Juniper discovered unauthorized code in ScreenOS® that could allow a knowledgeable attacker to gain administrative access and if they could monitor VPN traffic to decrypt that traffic. Once we identified these vulnerabilities, we launched an investigation and worked to develop and issue patched releases for the impacted devices. We also reached out to affected customers, strongly recommending that they update their systems and apply the patched releases with the highest priority.

The patched releases also address an SSH bug in ScreenOS that could allow an attacker to conduct DoS attacks against ScreenOS devices. These two issues are independent of each other.

Newly discovered hack has U.S. fearing foreign infiltration

Washington (CNN) A major breach at computer network company Juniper Networks has U.S. officials worried that hackers working for a foreign government were able to spy on the encrypted communications of the U.S. government and private companies for the past three years.

The FBI is investigating the breach, which involved hackers installing a back door on computer equipment, U.S. officials told CNN. Juniper disclosed the issue Thursday along with an emergency security patch that it urged customers to use to update their systems “with the highest priority.”

The concern, U.S. officials said, is that sophisticated hackers who compromised the equipment could use their access to get into any company or government agency that used it.

One U.S. official described it as akin to “stealing a master key to get into any government building.”

The breach is believed to be the work of a foreign government, U.S. officials said, because of the sophistication involved. The U.S. officials said they are certain U.S. spy agencies themselves aren’t behind the back door. China and Russia are among the top suspected governments, though officials cautioned the investigation hasn’t reached conclusions.

It’s not yet clear what if any classified information could be affected, but U.S. officials said the Juniper Networks equipment is so widely used that it may take some time to determine what damage was done.

A senior administration official told CNN, “We are aware of the vulnerabilities recently announced by Juniper. The Department of Homeland Security has been and remains in close touch with the company. The administration remains committed to enhancing our national cybersecurity by raising our cyber defenses, disrupting adversary activity, and effectively responding to incidents when they occur.”

Juniper Networks’ security fix is intended to seal a back door that hackers created in order to remotely log into commonly used VPN networks to spy on communications that were supposed to be among the most secure. A free trial vpn has been helpful for those new to the VPN world to decide if it is right for them.

Juniper said that someone managed to get into its systems and write “unauthorized code” that “could allow a knowledgeable attacker to gain administrative access.”

Such access would allow the hacker to monitor encrypted traffic on the computer network and decrypt communications.

Juniper sells computer network equipment and routers to big companies and to U.S. government clients such as the Defense Department, Justice Department, FBI and Treasury Department. On its website, the company boasts of providing networks that “US intelligence agencies require.”

Its routers and network equipment are widely used by corporations, including for secure communications. Homeland Security officials are now trying to determine how many such systems are in use for U.S. government networks.

Juniper said in its security alert that it wasn’t aware of any “malicious exploitation of these vulnerabilities.” However, the alert also said that attackers would leave behind no trace of their activity by removing security logs that would show a breach.

“Note that a skilled attacker would likely remove these entries from the log file, thus effectively eliminating any reliable signature that the device had been compromised,” the Juniper security alert said. If encrypted communications were being monitored, “There is no way to detect that this vulnerability was exploited,” according to the Juniper security alert.

According to a Juniper Networks spokeswoman’s statement, “Once we identified these vulnerabilities, we launched an investigation and worked to develop and issue patched releases for the impacted devices. We also reached out to affected customers, strongly recommending that they update their systems.”

U.S. officials said it’s not clear how the Juniper source code was altered, whether from an outside attack or someone inside.

The work to alter millions of lines of source code is sophisticated. The system was compromised for three years before Juniper uncovered it in a routine review in recent weeks.

Juniper said it was also issuing a security fix for a separate bug that could allow a hacker to launch denial-of-service attacks on networks.

Saudi Led Coalition vs. Islamic States, Big Questions

Audio interviews of attitudes of the newly announced Saudi coalition against Islamic State and terrorism in the region.

BBC: Saudi Arabia is part of the US-led coalition against IS and is also leading a military intervention in Yemen against Shia Houthi rebels.
The list of 34 members: Saudi Arabia, Bahrain, Bangladesh, Benin, Chad, Comoros, Djibouti, Egypt, Gabon, Guinea, Ivory Coast, Jordan, Kuwait, Lebanon, Libya, Malaysia, Maldives, Mali, Morocco, Mauritania, Niger, Nigeria, Pakistan, the Palestinians, Qatar, Senegal, Sierra Leone, Somalia, Sudan, Togo, Tunisia, Turkey, United Arab Emirates and Yemen.
A joint operations centre is to be established in the Saudi capital, Riyadh, state media reported.
Countries from Asia, Africa and the Arab world are involved in the alliance but Saudi Arabia’s main regional rival Iran is not.
It comes amid international pressure for Gulf Arab states to do more in the fight against so-called Islamic State.
Saudi Defence Minister Mohammed bin Salman said the new alliance would co-ordinate efforts against extremists in Iraq, Syria, Libya, Egypt and Afghanistan.
Neither Iraq nor Syria, whose governments are close to Shia-ruled Iran, are in the coalition, nor is Afghanistan.


Two things stand out immediately about this new Saudi-based Islamic Coalition.
The Shia-majority nations of Iran and Iraq are noticeably absent, as is their ally Syria.
It is far from clear how, in practice, the coalition would conduct counter-terrorism operations in IS-plagued Iraq and Syria without the agreement of those governments.
Secondly, there is the question of the exact definition of terrorism. The Saudi authorities’ interpretation of it extends far beyond the violent actions of armed insurgents.
Recent legislation has branded peaceful opposition activists and reformers, whether online or in the street, as suspected “terrorists” and a security risk to the state.

***

CBC: Saudi Arabia’s defence minister gave a rare press conference on Tuesday to announce a new military coalition of 34 Muslim countries, led by Saudi Arabia, to fight terrorism in the region. The coalition includes a broad range of countries including the United Arab Emirates, Turkey, Egypt and Sudan.

The announcement was welcomed by some, and met with skepticism by others, given that Saudi Arabia has long been accused of turning a blind eye to support for terrorism coming from inside its own borders.

By Wednesday, several of the countries involved, including Pakistan and Malaysia, expressed confusion at having been named as members of a military coalition, and began distancing themselves from the commitment.

Aya Batrawy reports on the Arabian Peninsula for the Associated Press. She was in Riyadh, Saudi Arabia.

David A. Weinberg is skeptical of Saudi Arabia’s new military coalition. He is a senior fellow at the Foundation for Defence of Democracies in Washington.

For a sense of how the American government might be thinking, we were joined by James B. Smith. He was the U.S. ambassador to Saudi Arabia from 2009 to 2013. He’s now the president of the policy consulting firm C and M International in Washington.

We did make multiple requests for comment from the Saudi Arabian embassy in Canada, but we did not receive a response. The Saudi embassy to the United States declined our request for an interview.

Hagel: WH Worked to Destroy Me

Hagel: The White House Tried to ‘Destroy’ Me

21st Century Genocide, Syria

On regime change in Syria, the White House capitulates to Russia

WashingtonPost Editorial Board: RUSSIAN PLANES are still bombing Western-backed forces in Syria every day and targeting hospitals, bakeries and humanitarian corridors. Moscow is still insisting that blood-drenched dictator Bashar al-Assad remain in power indefinitely while trying to exclude opposition groups from proposed peace negotiations by claiming they are terrorists.

Nevertheless, Secretary of State John F. Kerry insisted Tuesday after meeting with Vladi­mir Putin that the Russian ruler and the Obama administration see Syria “in fundamentally the same way.” Unfortunately, that increasingly appears to be the case — and not because Mr. Putin has altered his position.

For four years, President Obama demanded the departure of Mr. Assad, who has killed hundreds of thousands of his own people with chemical weapons, “barrel bombs,” torture and other hideous acts. Yet in its zeal to come to terms with Mr. Putin, the Obama administration has been slowly retreating from that position. On Tuesday in Moscow, Mr. Kerry took another big step backward: “The United States and our partners are not seeking so-called regime change,” he said. He added that a demand by a broad opposition front that Mr. Assad step down immediately was a “non-starting position” — because the United States already agreed that Mr. Assad could stay at least for the first few months of a “transition process.”

Mr. Kerry’s rhetorical capitulation was coupled with the observation that the administration doesn’t “believe that Assad himself has the ability to be able to lead the future Syria.” But he now agrees with Mr. Putin that the country’s future leadership must be left to Syrians to work out. That’s a likely recipe for an impasse — especially as Mr. Assad is still saying he won’t even negotiate with any opponents who are armed or backed by foreign governments. At the same time, the administration’s forswearing of “regime change” sends a message to Mr. Putin and his Iranian allies: The power structure in Damascus that has granted Russia a naval base and served as a conduit for Iranian weapons to the Hezbollah militia in Lebanon can remain. (complete editorial here)

“If the Dead Could Speak” reveals some of the human stories behind the more than 28,000 photos of deaths in government custody that were smuggled out of Syria and first came to public attention in January 2014.

The report lays out new evidence regarding the authenticity of what are known as the Caesar photographs, identifies a number of the victims, and highlights some of the key causes of death. Human Rights Watch located and interviewed 33 relatives and friends of 27 victims whose cases researchers verified; 37 former detainees who saw people die in detention; and four defectors who worked in Syrian government detention centers or the military hospitals where most of the photographs were taken. Using satellite imagery and geolocation techniques, Human Rights Watch confirmed that some of the photographs of the dead were taken in the courtyard of the 601 Military Hospital in Mezze.

If you can stomach more truth, torture and genocide click here.

Why is this an important story? It is a holocaust at the hands of the Syrian leader, Bashir al Assad, a deadly tyrannical leader who is fully supported by Vladimir Putin of Russia and the rogue regime of Iran. Further questions are required, where is the United Nations? Where is the International Criminal Court, why no modern day Nuremberg trial? Why have Western leaders including John Kerry, Barack Obama, David Cameron even the Middle East Gulf States come to accept this?

Many across America say that Syria is not our problem. While there is some truth to that, when the United States is taking in hundreds of thousands refugees without vetting and Europe is being crushed by migrants, it does become a problem for at least America.

The full Human Rights Watch report is here. In full disclosure, multi-billionaire George Soros gave $100 million to HRW in 2010, but it seems there is selective attention, attitudes and investigations by Human Rights Watch as noted with regard to Iran.