Pro-Kremlin Machine Right in Front of YOU

Vladimir Putin has his propaganda machine working in full speed. We are being sucked into it and not recognizing the clues much less asking harder questions against his agenda.

There is a two part series on the Pro-Kremlin operation. Part 1 video is here. Part 2 video is here.

Now, the movement behind the machine is something called ‘The Agency’ which is a location in St. Petersberg, Russia called the Internet Research Agency.

Graph showing shared use of Google Analytics, server software and social media

From DenisonForum: The Agency’s origins can be traced to the 2011 anti-government protests, organized because of the growing evidence of fraud in the Parliamentary elections that year. The protests had been organized largely via Facebook, Twitter, and LiveJournal and the government wanted to ensure that similar protests were far more difficult to put together in the future.  So the next year, Vyascheslav Volodin was named the new deputy head of Putin’s administration and given the task of gaining better control over the internet. In addition to starting the Agency, laws were passed that required bloggers to register with the state and the government was allowed to censor websites without a court order. Putin justified the new laws “by calling the Internet a ‘C.I.A. project,’ one that Russia needed to be protected from.”

The full background investigation on the Internet Research Agency, or rather the Kremlin troll factory is found here.

For the software and internet geeks out there, below is the proof of the machine where evidence was peeled back by using open source analytic tools.

From Global Voices Online: In April of this year, Radio Free Europe/Radio Liberty and the Guardian reported on the website вштабе.рф, a large photo gallery of pro-Russian memes and “demotivator” graphics. Most of these crude caricatures ridicule US, Western, and Ukrainian leaders, whilst portraying Vladimir Putin as strong and heroic.

The site gives no credit or attribution for its design, and offers no indication as to who might be behind it. Intrigued by this anonymity, I used Maltego open-source intelligence software to gather any publicly-available information that might provide clues.

The Secrets of Google Analytics
My use of Maltego revealed that the site was running Google Analytics, a commonly used online analytics tool that allows a website owner to gather statistics on visitors, such as their country, browser, and operating system. For convenience, multiple sites can be managed under a single Google analytics account. This account has a unique identifying “UA” number, contained in the Analytics script embedded in the website’s code. Google provides a detailed guide to the system’s structure.

Whilst investigating the network of sites tied to account UA-53176102, I discovered that one, news-region.ru, had also been linked to a second Analytics account: UA-53159797 (archive).

This number, in turn, was associated with a further cluster of nineteen pro-Kremlin websites. Subsequent examinations of these webpages revealed three more Analytics accounts, with additional sites connected to them. Below is a network diagram of the relationships I have established to date.

Most notably, Podgorny is listed in the leaked employee list of St. Petersburg’s Internet Research Agency, the pro-Kremlin troll farm featured in numerous news reports and investigations, including RuNet Echo’s own reports.

Podgorny’s date of birth, given on his public VK profile, is an exact match for that shown in the leaked document.

Podgorny's date of birth, as shown on his VK profile, compared with listing in the leaked Internet Reseach Agency document.

Podgorny is also VK friends with Igor Osadchy, who is named as a fellow employee in the same list. Osadchy has denied working for the Internet Reseach Agency, calling the leaks an “unsuccessful provocation.”

*** This internet researcher will continue the investigation and report more. For expanded details on the first cut of the investigation, click here.

Cyberwar, Deeper Truth on China’s Unit 61398

The NSA has been hacking China for years, so it is a cyberwar. What the United States cyber experts have known at least since 2009 spells out that there has been no strategy to combat cyber intrusions much less a declaration that these hacks are an act of war.

The NSA Has A Secret Group Called ‘TAO’ That’s Been Hacking China For 15 Years

China hacking charges: the Chinese army’s Unit 61398
Operating out of a tower block in Shanghai, Unit 61398 allegedly hacks Western companies in support of the Chinese government’s political and economic aims.

From DarkReading:

According to the DOJ indictment, Huang Zhenyu was hired between 2006 and 2009 or later to do programming work for one of the companies (referred to as “SOE-2” in the indictment). Huang was allegedly tasked with constructing a “secret” database to store intelligence about the iron and steel industry, as well as information about US companies.

“Chinese firms hired the same PLA Unit where the defendants worked to provide information technology services,” according to the indictment, which the US Department of Justice unsealed Monday. “For example, one SOE involved in trade litigation against some of the American victims herein hired the Unit, and one of the co-conspirators charged herein, to hold a ‘secret’ database to hold corporate ‘intelligence.'”

The for-hire database project sheds some light on the operations of China’s most prolific hacking unit, Unit 61398 of the Third Department of China’s People’s Liberation Army (also known as APT1), where the alleged hackers work. US Attorney General Eric Holder announced an unprecedented move Monday: The Justice Department had indicted the five men with the military unit for allegedly hacking and stealing trade secrets of major American steel, solar energy, and other manufacturing companies, including Alcoa, Allegheny Technologies Inc., SolarWorld AG, Westinghouse Electric, and US Steel, as well as the United Steel Workers Union.

It has never been a secret, it has only been a topic debated with no resolutions behind closed doors. China has a database on Americans and is filling it with higher details, growing their intelligence on everything America.

China has launched a strategic plan when one examines the order of hacks of American companies, the timing and the data. A full report was published on Unit 61398.

New York Times report

Hacked in the U.S.A.: China’s Not-So-Hidden Infiltration Op

From Bloomberg: The vast cyber-attack in Washington began with, of all things, travel reservations.

More than two years ago, troves of personal data were stolen from U.S. travel companies. Hackers subsequently made off with health records at big insurance companies and infiltrated federal computers where they stole personnel records on 21.5 million people — in what apparently is the largest such theft of U.S. government records in history.

Those individual attacks, once believed to be unconnected, now appear to be part of a coordinated campaign by Chinese hackers to collect sensitive details on key people that went on far longer — and burrowed far deeper — than initially thought.

 

But time and again, U.S. authorities missed clues connecting one incident to the next. Interviews with federal investigators and cybersecurity experts paint a troubling portrait of what many are calling a serious failure of U.S. intelligence agencies to spot the pattern or warn potential victims. Moreover, the problems in Washington add new urgency to calls for vigilance in the private sector.

In revealing the scope of stolen government data on Thursday, Obama administration officials declined to identify a perpetrator. Investigators say the Chinese government was almost certainly behind the effort, an allegation China has vehemently denied.

‘Facebook of Intelligence’

Some investigators suspect the attacks were part of a sweeping campaign to create a database on Americans that could be used to obtain commercial and government secrets.

“China is building the Facebook of human intelligence capabilities,” said Adam Meyers, vice president of intelligence for cybersecurity company CrowdStrike Inc. “This appears to be a real maturity in the way they are using cyber to enable broader intelligence goals.”

The most serious breach of records occurred at the U.S. Office of Personnel Management, where records for every person given a government background check for the past 15 years may have been compromised. The head of the government personnel office, Katherine Archuleta, resigned Friday as lawmakers demanded to know what went wrong.

The campaign began in early 2013 with the travel records, said Laura Galante, manager of threat intelligence for FireEye Inc., a private security company that has been investigating the cyber-attacks.

Stockpiling Records

By mid-2014, it became clear that the hackers were stockpiling health records, Social Security numbers and other personal information on Americans -– a departure from the country’s traditional espionage operations focusing on the theft of military and civilian technology.

“There was a clear and apparent shift,” said Jordan Berry, an analyst at FireEye.

Recognition came too late for many of the victims. Vendors of security devices say health-care companies are spending tens of millions of dollars this year to upgrade their computer systems but much of the data is already gone.

U.S. intelligence agencies were collecting information on the theft of personal data but failed to understand the scope and potential damage from the aggressive Chinese operation, according to one person familiar with the government assessment of what went wrong.

In the last two years, much of the attention of U.S. national security agencies was focused on defending against cyber-attacks aimed at disrupting critical infrastructure like power grids.

 

Iran Deal, Deviled Details and $300 Billion

Both sides are saying the others are throwing sand in the gears to publishing a final document of the Joint Plan of Action with Iran and the P5+1.

In part from FarsNews: “We have reached a stage now that the other side should decide if it is seeking an agreement or pressure; we have said many times that agreement and pressure cannot come together and one of them should be chosen,” Zarif told reporters in Vienna.

He reiterated that if the other side shows political will and inclination for a balanced and good deal it will be achievable.

Zarif, however, said that unfortunately the other side is showing change in stances and raising excessive demands which make the conditions difficult, adding, “We are doing our best as Supreme Leader (of the Islamic Revolution Ayatollah Seyed Ali Khamenei) and other Iranian officials have said many times we are looking for a good deal and we will continue the negotiations; we have never left the negotiations and we will not in future.”

The Geneva interim deal envisaged the removal of all the UN and unilateral US and EU sanctions against Iran under a final comprehensive deal.

Also, in a framework agreement approved by the six powers and Iran in April known as the Lausanne Statement, the seven nations agreed that a final deal would include removal of all sanctions as well as a UN Security Council resolution which would call all the five UNSC sanctions resolutions imposed against Iran’s nuclear activities as “null and void”.

The first two UNSC resolutions boycotted export of military, specially missile, hardware and software to Iran, a sanction that – along with all the other embargoes imposed against Iran under the five UNSC resolutions – would be automatically removed under the new UNSC resolution that, according to the Lausanne framework agreement, should be issued on the same day that the final deal is endorsed.

Hence, the debate over the removal of the UN Security Council arms embargoes against Iran means US defiance of both agreements.

From the WSJ: If no deal is reached by Monday night, the two sides must again agree to extend the terms of their November 2013 interim nuclear deal or risk seeing two years of high-stakes diplomacy unravel. That accord offered modest sanctions relief for Iran in exchange for Tehran freezing parts of its nuclear program.

Among the final issues to be resolved are disagreements about the timing and sequencing of sanctions relief for Iran and the continuation of a ban on sales of arms and ballistic-missile parts to Iran. Officials have also been toiling over the text of a new U.N. Security Council resolution that would keep some restrictions on Iran and outline steps the country would take to detail its past nuclear activities.

One European official said Sunday there was “no way” negotiations could continue beyond Monday.

“Everything can fail still, but we are really near the end,” said a German official late Sunday. “With the willingness of Tehran to take the final steps, it could now go quickly. We are ready to negotiate all night.”

The matter of lifting sanctions, suspending other over 15 years funds future terrorism by infusing Iran with $300 billion.

From Foreign Policy Magazine: Barack Obama’s administration and the other parties to the interim nuclear deal with Iran now seem to be saying they are willing to release to Iran between a third and a half a trillion dollars over the next 15 years in order for Iran not to give up the program, but to freeze it. In other words, we are not restoring Iran’s assets and income sources in exchange for permanently and irreversibly accepting international standards; we are just renting the country’s restraint, offering it access to hundreds of billions of dollars to make any future nuclear program development the problem of the next U.S. president — or the one after that.

The problem is compounded by the fact that Iran’s nuclear program is not viewed by its neighbors as the main threat the country poses. A systematic, 35-year campaign of regional meddling, destabilization, and extension of Iranian influence is seen as a much bigger issue. And restoring cash flows and assets to Iran, as well as giving the country greater international standing, clearly exacerbates that threat. It gives Tehran the wherewithal to continue to underwrite terrorists like Hezbollah and Hamas, prop up dictators like Syria’s Bashar al-Assad, and buy ever greater influence in places like Iraq and Yemen.

The consequences of Iran’s regional strategy were on display this week in Washington when Iraqi Prime Minister Haider al-Abadi essentially read from Iranian talking points when addressing the conflict in Yemen. He took a stance against Saudi intervention to stop Iranian-backed Houthis, suggested Iran’s role in Yemen was overstated, and even went so far as to suggest Obama had told him that he was not supportive of the Saudis. The White House immediately denied the last accusation but can’t have been too happy with the rest of the statement that came from the leader of a country the United States had spent hundreds of billions to “liberate.”

 

Numbers Even Backdoor to Front-door entry into U.S.

There are almost 20 different visa applications forms, each for unique circumstances to enter into the United States. Some are easier and more likely used than others for fast processing and requiring less background investigations.

The State Department outsources the processing of visas and in some visa classifications there are annual quotas that can be finessed by waivers and or exemptions.  There are even legal cottage industry members that handle the complex legal process with enough money, they know how to skirt the process and hasten the approval process.

Now, that these people have front-door entry, who are they and what happens if they overstay the visa time limit? Short answer is not much.

In March of 2012, John Cohen, the Deputy Counter-terrorism Coordinator for DHS provided written testimony to the House Sub-committee on DHS which fully explains the convoluted process and lack of resources.  In the same hearing, Peter T. Edge, Deputy Executive Associate Director of DHS Investigations for ICE offered his written testimony on the scope of fraud of the visa program. This was in response to Amine el-Khalifi, an individual who allegedly attempted to conduct a suicide attack at the U.S. Capitol, is not the first time terrorists have exploited the visa process.  In fact, el-Khalifi follows a long line of terrorists, including several of the 9/11 hijackers, who overstayed their visa and went on to conduct terror attacks.

Of particular note, the Visa Security program of 2002 is the basis of law today and reads in part from 2012 statistics:

The Visa Security Program
The Homeland Security Act of 2002 directs the Department of Homeland Security (DHS) to assist in the identification of visa applicants who seek to enter the United States for illegitimate purposes, including criminal offenses and terrorism-related activities. The visa adjudication process often presents the first opportunity to assess whether a potential nonimmigrant visitor or immigrant poses a threat to the United States. The Visa Security Program (VSP) is one of several ICE programs focused on minimizing global risks.
Through the Visa Security Program (VSP), ICE deploys trained special agents overseas to high-risk visa activity posts in order to identify potential terrorist and criminal threats before they reach the United States. ICE special agents conduct targeted, in-depth reviews of individual visa applications and applicants prior to issuance, and recommend to consular officers refusal or revocation of applications when warranted. DHS actions complement the consular officers’ initial screenings, applicant interviews, and reviews of applications and supporting documentation.
ICE now conducts visa security investigations at 19 high-risk visa adjudication posts in 15 countries. In FY 2012 to date, VSP has screened 452,352 visa applicants and, in collaboration with DOS colleagues, determined that 121,139 required further review. Following the review of these 121,139 applications, ICE identified derogatory information on more than 4,777 applicants.

In 2012: The Obama administration doesn’t consider deporting people whose only offense is overstaying a visa a priority. It has focused immigration enforcement efforts on people who have committed serious crimes or are considered a threat to public or national security.

A House Homeland Security subcommittee is conducting an oversight hearing Tuesday. The panel’s chairwoman, Rep. Candice Miller, R-Mich., said El Khalifi “follows a long line of terrorists, including several of the 9/11 hijackers, who overstayed their visa and went on to conduct terror attacks.” His tourist visa expired the same year he arrived from his native Morocco as a teenager in 1999.

Going back to 2006, it was stated: “Many immigrants who are in the United States illegally never jumped a fence, hiked through the desert or paid anyone to help them sneak into the country. According to a recent study, 45 percent of illegal immigrants came here on a legal visa, and then overstayed that visa.” For the audio interview and Pew Research summary report, click here.

In closing, the LA Times proves the process on visa overstays with a few key cases.

* Laura Lopez first came to the U.S. at 15. She had joined a group of students from Guatemala who were visiting Orange County.

She remembers her first trip to Disneyland, eating at Taco Bell and strolling through the streets of downtown Santa Ana, with its impressive red sandstone courthouse.

“I felt so much energy,” said Lopez, now 30. “I looked around and saw that courthouse, and it was like something that spoke about freedom. I just didn’t want to leave.”

Lopez returned to Santa Ana two years later on a tourist visa. This time, she never left.

*Billy Lee came to California from South Korea with his mother when he was 5. Their trip included exploring Hollywood and spending time with relatives. “They told my mother they had great jobs, great schools — that this was a wonderful, open place to live and that we should take a risk and copy them,” said Lee, now 31.

So they stayed.

“Homeland Security Department officials estimate that up to 40% of the roughly 11 million people in the U.S. illegally arrived this way.  Jorge-Mario Cabrera, spokesman for the Coalition for Humane Immigrant Rights of Los Angeles. “It happens all the time.”

Yet, he said, no system exists “to follow up on what these folks do once they’re in the States. There’s no process by which officials can track if someone stayed the proper amount of time or beyond that.” For more cases covered by the LA Times, click here.

In the Obama administration, nobody knows anything or for that matter really investigates or reports the numbers.

Nobody is sure how many people are in the U.S. on expired visas.

A long-standing problem in immigration enforcement — identifying foreigners who fail to go home when their visas expire — is emerging as a key question as senators and President Barack Obama chart an overhaul of immigration law. The Senate is discussing an overhaul that would require the government to track foreigners who overstay their visas. The problem is the U.S. currently doesn’t have a reliable system for doing this.

The Center for Immigration Studies is the best source for visa overstays, yet few listen.

The General Accountability Offices does offer some insight that is useful.

Lastly, the piece parts are offered here from a 2013 hearing.

Written testimony of ICE Homeland Security Investigations Executive Associate Director James Dinkins, CBP Office of Field Operations Acting Deputy Assistant Commissioner John Wagner, and NPPD Office of Biometric Identity Management Deputy Director Shonnie Lyon for a House Committee on Homeland Security, Subcommittee on Border and Maritime Security hearing titled “Visa Security and Overstays: How Secure is America?”

In closing, the system is broken simply due to lack of will, enforcement and resources. Adjustments do need to be made especially when it comes to ‘visa waiver companies and countries, which should both be terminated.

 

 

 

Sinaloa Leader Escape Prison, 2nd Time Fast and Furious

From testimony, reported by The Blaze: A high-ranking Mexican drug cartel operative currently in U.S. custody is making startling allegations that the failed federal gun-walking operation known as “Fast and Furious” isn’t what you think it is.

It wasn’t about tracking guns, it was about supplying them — all part of an elaborate agreement between the U.S. government and Mexico’s powerful Sinaloa Cartel to take down rival cartels.

The explosive allegations are being made by Jesus Vicente Zambada-Niebla, known as the Sinaloa Cartel’s “logistics coordinator.” He was extradited to the Chicago last year to face federal drug charges.  More here.

The DEA went rogue and made a deal with the Sinaloa cartel to rat out other rival cartels to stem the violence in Mexico. Court testimony is found here.

From the BusinessInsider: Sinaloa, led by Joaquin “El Chapo” Guzman, supplies 80% of the drugs entering the Chicago area and has a presence in cities across the U.S.
Suspected Mexican drug trafficker Vicente Zambada-Niebla

 

Mexico’s president Nieto said Guzman will never escape again, yet today it is reported that El Chapo Guzman did just that through a tunnel in his cell bathroom. Nieto was in route to a visit to France as this escaped occurred.

NBC left out a few details but here is some background on El Chapo

Who Is ‘El Chapo?’: A Look at the Master of the Underground Tunnel

He’s known as “Shorty,” but perhaps “The Mole” would be more accurate.

That’s because Joaquin “El Chapo” Guzman lives by his underground tunnels, frustrating all those who try to catch him.

The secretive and barely literate Mexican drug lord oversaw the explosion of subterranean networks used to smuggle massive amounts of narcotics across the U.S. border. After escaping prison in a laundry cart in 2001, the head of the Sinaloa cartel outfitted many his safe houses with secret doors that opened to tunnels leading to municipal sewer systems. He used one of them, accessed through the bottom of a bathtub, to escape authorities in February 2014.

Guzman was caught a few days later, an arrest that was hailed as a major victory in the international war on drugs. He ended up in a maximum security federal prison in southern Mexico, where he began plotting another underground escape.

 

On Saturday, he disappeared underneath the prison through an elaborate tunnel that must have taken months to build. Equipped with ventilation ducts, stairs and a motorbike on rails, the tunnel was about the same height as Guzman, who stands 5 feet 8 inches tall, and ran for 1,600 yards, emerging in a house under construction in a nearby neighborhood.

Guzman, believed to be about 60, has made a living of dodging death and evading capture while building the multibillion-dollar Sinaloa cartel into the world’s most powerful — and ruthless — drug trafficking organization. Tales of his avoiding bullets and handcuffs burnished a legend that is chronicled in folk song. Young people in his impoverished home state rally in support of him, despite his being responsible for the murders of thousands of Mexicans, including police officers and innocent civilians.

The son of a poor farmer, Guzman was born in Sinaloa and entered the local drug economy in the 1970s, after dropping out of school. He rose gradually within the Sinaloa cartel, and in the early 1990s took control.

In 1993, Guzman was arrested in Guatemala, and extradited to Mexico, where he was put in a maximum security prison. He continued to run the organization behind bars while maintaining a comfortable lifestyle, surrounded by associates and paid-off guards. In January 2001, some of them helped him slip out of the prison while hidden in a laundry cart.

As one of the world’s most sought-after fugitives, Guzman amassed even more power, taking over trade routes in South America and across the globe. He protected himself within a network of loyal workers, paid-off informers and corrupt officials. Despite his secrecy, however, Guzman enjoyed living the high life, including lavish dinners and a coterie of mistresses and prostitutes. He’s reportedly been married multiple times, his current wife being a former teenage beauty queen with American citizenship.

In addition to being wanted for his original 20-year prison sentence, Guzman is under federal indictment for drug trafficking in San Diego, Brooklyn, N.Y., El Paso, Miami and Chicago, which named him the city'[s first “public enemy No. 1” since Al Capone. The DEA announced a $5 million reward for his capture in 2005.

“The U.S. government stands ready to work with our Mexican partners to provide any assistance that may help support his swift recapture,” Attorney General Loretta Lynch said in a statement Sunday after his escape.

As his power grew, Guzman relied on increasingly ingenious tactics to stay ahead of authorities. That included the use of trains, submarines, and tunnels.

By several accounts, including an examination by The New Yorker, Guzman helped invent the drug tunnel, commissioning his personal architect, Felipe de Jesus Corona-Verbera, to design several that burrowed beneath the U.S. border and emerged in warehouses on the other side. Together, they built dozens, some equipped with mini rail cars.

For years, American investigators tracked Guzman through wiretaps, and fed that information to Mexican officials. But Guzman always slipped their grasp at the last minute, including the Feburary 2014 escape from a home in the Sinaloan town of Culiacan. But authorities tracked him to another home, where they arrested him a few days later.

At the time, authorities boasted that the arrest was a milestone in the cross-border drug war. Then-U.S. Attorney General Eric Holder called Guzman’s capture “a landmark achievement, and a victory for the citizens of both Mexico and the United States.”

Federal prosecutors in several cities said they wanted to have Guzman extradited to the United States to stand trial. But Mexican officials said they were confident they could keep him imprisoned at home.

Now, he’s gone. Again.