Cyber Conflict, Chaos and Calamity

There have been several Congressional hearings on cyber-terrorism, yet with such an emergency and threat, no solution is forthcoming.

From AEI: “America’s intelligence leaders have made clear the biggest threat today is cyber and counterintelligence. Who are the largest perpetrators of these types of attacks? The intelligence report singles out Russia and China as first examples. These nations have “highly sophisticated cyber programs” and are regularly conducting “politically motivated” attacks. What are they up to exactly? Countries such as China are “reconnoitering and developing access to US critical infrastructure systems, which might be quickly exploited for disruption if an adversary’s intent became hostile.” Back in 2013, Verizon released a report detailing Chinese hackers lurking around inside American industrial control systems—the cyber equivalent to casing a robbery target. In 2014 alone, the FBI investigated a likely Russian hacking campaign against American banking backbone JP Morgan, while two cybersecurity firms blamed Iran for a major campaign against US critical infrastructure like major airliners, medical universities, and energy companies. As the year ended, the US government publicly accused North Korea of a devastating cyberattack against Sony.”

When of Office of National Intelligence produced a report, the first chapter is on cyber threats.

“Risk. Despite ever-improving network defenses, the diverse possibilities for remote hacking intrusions, supply chain operations to insert compromised hardware or software, and malevolent activities by human insiders will hold nearly all ICT systems at risk for years to come. In short, the cyber threat cannot be eliminated; rather, cyber risk must be managed. Moreover, the risk calculus employed by some private sector entities does not adequately account for foreign cyber threats or the systemic interdependencies between different critical infrastructure sectors.

Costs. During 2014, we saw an increase in the scale and scope of reporting on malevolent cyber activity that can be measured by the amount of corporate data stolen or deleted, personally identifiable information (PII) compromised, or remediation costs incurred by US victims. “

The stakes are higher than anyone will admit, most of all the White House. The Office of Personnel Management hack of personnel files now appears to exceed 18 million individuals. “FBI Director James Comey gave the 18 million estimate in a closed-door briefing to Senators in recent weeks, using the OPM’s own internal data, according to U.S. officials briefed on the matter. Those affected could include people who applied for government jobs, but never actually ended up working for the government.”

Just announced as a possible additional agency falling victim to hacking is the National Archives and Records Administration (NARA). What is chilling about this probability is all government reports, records and communications are by law to be maintained by NARA., even classified material.

EXCLUSIVE: Signs of OPM Hack Turn Up at Another Federal Agency

The National Archives and Records Administration recently detected unauthorized activity on three desktops indicative of the same hack that extracted sensitive details on millions of current and former federal employees, government officials said Monday. The revelation suggests the breadth of one of the most damaging cyber assaults known is wider than officials have disclosed.

The National Archives’ own intrusion-prevention technology successfully spotted the so-called indicators of compromise during a scan this spring, said a source involved in the investigation, who was not authorized to speak publicly about the incident. The discovery was made soon after the Department of Homeland Security’s U.S. Computer Emergency Readiness Team published signs of the wider attack — which targeted the Office of Personnel Management — to look for at agencies, according to NARA.

It is unclear when NARA computers were breached. Suspected Chinese-sponsored cyberspies reportedly had been inside OPM’s networks for a year before the agency discovered what happened in April. Subsequently, the government uncovered a related attack against OPM that mined biographical information on individuals who have filed background investigation forms to access classified secrets.

The National Archives has found no evidence intruders obtained “administrative access,” or took control, of systems, but files were found in places they did not belong, the investigator said.

NARA “systems” and “applications” were not compromised, National Archives spokeswoman Laura Diachenko emphasized to Nextgov,  “but we detected IOCs,” indicators of compromise, “on three workstations, which were cleaned and re-imaged,” or reinstalled.

“Other files found seemed to be legitimate,” such as those from a Microsoft website, she said. “We have requested further guidance from US-CERT on how to deal with these” and are still awaiting guidance on how to proceed.

It will take additional forensics assessments to determine whether attackers ever “owned” the National Archives computers, the investigator said.

Diachenko said, “Continued analysis with our monitoring and forensic tools has not detected any activity associated with a hack,” including alerts from the latest version of a governmentwide network-monitoring tool called EINSTEIN 3A.

EINSTEIN, like NARA’s own intrusion-prevention tool, is now configured to detect the tell-tale signs of the OPM attack.

“OPM isn’t the only agency getting probed by this group,” said John Prisco, president of security provider Triumphant, the company that developed the National Archives’ tool. “It could be happening in lots of other agencies.”

Prisco said he learned of the incident at a security industry conference June 9, from an agency official the company has worked with for years.

“They told us that they were really happy because we stopped the OPM attack in their agency,” Prisco said.

The malicious operation tries to open up ports to the Internet, so it can excise information, Prisco said.

“It’s doing exploration work laterally throughout the network and then it’s looking for a way to communicate what it finds back to its server,” he added.

Homeland Security officials on Monday would not confirm or deny the situation at the National Archives. DHS spokesman S.Y. Lee referred to the department’s earlier statement about the OPM hack: “DHS has shared information regarding the potential incident with all federal chief information officers to ensure that all agencies have the knowledge they need to defend against this cybersecurity incident.”

The assault on OPM represents the seventh raid on national security-sensitive or federal personnel information over the past year.

Well-funded hackers penetrated systems at the State Department, the White House, U.S. Postal Service and, previously in March 2014, OPM. Intruders also broke into networks twice at KeyPoint Government Solutions, an OPM background check provider, and once at USIS, which conducted most of OPM’s employee investigations until last summer.

On Wednesday, the House Oversight and Government Reform Committee is scheduled to hold a hearing on the OPM incident that, among other things, will examine the possibility that hackers got into the agency’s systems by using details taken from the contractors.

Is Putin Afraid of $50 Billion or Russia’s Future?

Vladimir Putin is obviously corrupt and aggressive and countless world leaders maintain the evidence, include the International Criminal Court at the Hague. In 2014, an international court has awarded the shareholders of the now-defunct Yukos oil company more than $50 billion, ruling that the Russian government wrongly seized the company from one of the country’s most powerful oligarchs.

The award by a tribunal in The Hague — the largest ever in international arbitration — is the latest chapter in a dispute that began in 2003 when Russian authorities arrested Yukos’s chairman, Mikhail B. Khodorkovsky, and sold off his company over the next several years.

There are also negative implications for Russia was the European Court of Human Rights finding that Armenia had occupied Nagorno-Karabakh and was thus liable for the destruction there. Regardless of the merits of each side in that war, there is no reason why Ukraine cannot now appear before that court to find Russia guilty of occupying Ukraine and therefore liable for the destruction and loss of life there. Moreover, upon invading Crimea, Moscow immediately seized all the assets of Ukraine’s energy explorations there and took them over (that may have been a motive for the invasion of Crimea). 

Another matter is the legal and political action against Moscow, not only by international courts but by the European Commission for there is no doubt that Russia’s projected Turk Stream pipeline will contain some of that gas as do Russian oil shipments to Europe, If the Commission could block South Stream on the grounds of its failure to conform to EU guidelines, it can certainly block a pipeline that utilizes the fruits of unmitigated aggression. And courts can easily declare those as stolen assets and impose penalties on Russia and anyone benefiting from them.

Then there is the case of the Malaysian flight 17 that was shot down which continues to be investigated.

The case against the Russian aggression continues to build and it is questionable whether Putin has any concerns on how this will play out for the future of the country or whether he takes it all in stride for a larger mission.

The matter of Crimea has not subsided nor has it been settled. From the Daily Beast in part:

‘Under occupation Crimea has become a cesspool of human rights violations, but a new report offers some hope. An international team of lawyers, working with Razom, the Ukrainian-American human rights nonprofit, compiled investigations by Human Rights Watch, the U.N., and other leading organizations as well as accounts from journalists and Crimean residents, into a single reportHuman Rights on Occupied Territory: Case of Crimea. The 68-page report is conveniently structured to provide a clear legal framework for Crimeans and policymakers to bring Russian aggression to justice. It also provides a section called “Human Rights Protection Guide,” which includes peaceful resistance tactics including some used during the Soviet Union.’

Defense Secretary Ash Carter is on a Eastern Europe tour as positioning of military equipment is occurring in Bulgaria, Estonia, Latvia, Lithuania, Poland and Romania.

From the WSJ:

‘The equipment, which includes a total of 250 tanks, Bradley fighting vehicles and self-propelled howitzers, is headed to temporary sites in Bulgaria, Estonia, Latvia, Lithuania, Poland and Romania, Mr. Carter said here, flanked by his counterparts from three of the most anxious Baltic nations; Estonia, Lithuania and Latvia.

The full complement of equipment, which includes noncombat related cars and trucks and other equipment for an armored brigade combat team for as many as 5,000 troops, includes roughly 1,200 vehicles, according to a senior military official.

“American rotational forces need to more quickly and easily participate in training and exercises in Europe,” Mr. Carter told reporters in Tallinn.

The long-awaited move won’t place American troops in those temporary bases, even though Estonia, Latvia and Lithuania had specifically requested that the North Atlantic Treaty Organization do so. Instead, American rotational forces, which have been used for months for a series of exercises called Operation Atlantic Resolve, would fall in on the equipment housed at the different sites across the six nations. The idea is to save shipping costs for the Pentagon, which has had to move equipment to and fro for each exercise. But basing the equipment at the sites also helps demonstrate American resolve in the region since Russia annexed Crimea last year.’

POTUS Approves U.S. Troops Sharing Base with Iran

Cant make this up…Iran has been an enemy of the United States for decades and now our uniformed personnel in Iraq are forced to share an air base, Taqqadum, in Anbar. This is not sitting well with one senator and frankly, we should be screaming about it. What is worse, is the Joint Chiefs are apparently cool with it unless there are chairs and tables being thrown about in the halls of the Pentagon?

Washington, D.C.— Senator Tom Cotton (R-Arkansas) today released the following statement in response to reports that the United States is sharing a military base with Iranian forces in Iraq:
“When I was a soldier fighting in Iraq, Iran supplied the most advanced, most lethal roadside bombs used against coalition forces. Many American soldiers lost their lives to Iran’s proxies and Iranian-supplied bombs.  Further, Iran is the leading state sponsor of terrorism and has been attacking the United States for decades. It’s deeply troubling that the President now finds it acceptable to share a military base with this enemy, even while we are attempting to negotiate a deal to keep Iran from obtaining nuclear weapons.
“This report is a stark and nearly absurd demonstration of the Obama administration’s tacit accommodation of Iran’s strategic aim of extending its influence in Iraq.  It echoes the president’s tacit accommodation of Iran’s wish to maintain Bashar al-Assad in Syria and his explicit accommodation of Iran’s nuclear ambitions.”
For background in MILCOM in Iraq and this base, see page 33.

Iran’s Forces and U.S. Share a Base in Iraq

 

How Did Valerie Jarrett Pass a Background Check

Now this also begs the question, what did Obama know, did he approve and what is he going to do now?

The 73 page FBI file on Valerie Jarrett’s family is found here. The father is noted here.

From Judicial Watch:

FBI Files Document Communism in Valerie Jarrett’s Family

Federal Bureau of Investigation (FBI) files obtained by Judicial Watch reveal that the dad, maternal grandpa and father-in-law of President Obama’s trusted senior advisor, Valerie Jarrett, were hardcore Communists under investigation by the U.S. government.

Jarrett’s dad, pathologist and geneticist Dr. James Bowman, had extensive ties to Communist associations and individuals, his lengthy FBI file shows. In 1950 Bowman was in communication with a paid Soviet agent named Alfred Stern, who fled to Prague after getting charged with espionage. Bowman was also a member of a Communist-sympathizing group called the Association of Internes and Medical Students. After his discharge from the Army Medical Corps in 1955, Bowman moved to Iran to work, the FBI records show.

According to Bowman’s government file the Association of Internes and Medical Students is an organization that “has long been a faithful follower of the Communist Party line” and engages in un-American activities. Bowman was born in Washington D.C. and had deep ties to Chicago, where he often collaborated with fellow Communists. JW also obtained documents on Bowman from the U.S. Office of Personnel Management (OPM) showing that the FBI was brought into investigate him for his membership in a group that “follows the communist party line.” The Jarrett family Communist ties also include a business partnership between Jarrett’s maternal grandpa, Robert Rochon Taylor, and Stern, the Soviet agent associated with her dad.

Jarrett’s father-in-law, Vernon Jarrett, was also another big-time Chicago Communist, according to separate FBI files obtained by JW as part of a probe into the Jarrett family’s Communist ties. For a period of time Vernon Jarrett appeared on the FBI’s Security Index and was considered a potential Communist saboteur who was to be arrested in the event of a conflict with the Union of Soviet Socialist Republics (USSR). His FBI file reveals that he was assigned to write propaganda for a Communist Party front group in Chicago that would “disseminate the Communist Party line among…the middle class.”

It’s been well documented that Valerie Jarrett, a Chicago lawyer and longtime Obama confidant, is a liberal extremist who wields tremendous power in the White House. Faithful to her roots, she still has connections to many Communist and extremist groups, including the Muslim Brotherhood. Jarrett and her family also had strong ties to Frank Marshal Davis, a big Obama mentor and Communist Party member with an extensive FBI file.

JW has exposed Valerie Jarrett’s many transgressions over the years, including her role in covering up a scandalous gun-running operation carried out by the Department of Justice (DOJ). Last fall JW obtained public records that show Jarrett was a key player in the effort to cover up that Attorney General Eric Holder lied to Congress about the Fast and Furious, a disastrous experiment in which the Bureau of Alcohol, Tobacco Firearms and Explosives (ATF) allowed guns from the U.S. to be smuggled into Mexico so they could eventually be traced to drug cartels. Instead, federal law enforcement officers lost track of hundreds of weapons which have been used in an unknown number of crimes, including the murder of a U.S. Border Patrol agent in Arizona.

In 2008 JW got documents linking Valerie Jarrett, who also served as co-chairman of Obama’s presidential transition team, to a series of real estate scandals, including several housing projects operated by convicted felon and Obama fundraiser/friend Antoin “Tony” Rezko. According to the documents obtained from the Illinois Secretary of State, Valerie Jarrett served as a board member for several organizations that provided funding and support for Chicago slum projects operated by Rezko.

Yemen Cyber Army, Saudi and Wikileaks

Here it comes again, a major hack that took place earlier this month and the documents are in a pipeline to be published. Some are out there now.

From www.securityaffairs.co who I just interviewed for radio last week:

“We have gained access to the Saudi Ministry of Foreign Affairs (MOFA) network and have full control over more than 3000 computers and servers, and thousands of users. We also have access to the emails, personal and secret information of hundreds of thousands of their diplomats in different missions around the world.” states the group.

The following image was left on the PC of the employees at the Saudi foreign ministry on Thursday morning

Yemen Cyber Army vs Saudi Gov

More details here on the Yemen Cyber Army and the Saudi hack. The Yemen Cyber Army left behind these messages for file access as well:

OPERATION Name : “Syed Hussein Badreddin al-Houthi”
OPERATION Key  : b919117da9954bd82e65677cb240bbb3e4ddbd9ac93e10f0a399257ad54d851a

Saudi Arabia Ministry of Foreign Affairs Hacked By Yemen Cyber Army
All MOFA.GOV.SA Subdomains And Servers Hacked and HDD Encrypted
Allah is the enemy of those who oppress people

This is to convey a message to Saudi Dictators, if they’ve got a listening ear!

It’s us again, Yemen Cyber Army!

We are an Islamic Group who fights against you oppressors.

What you and your puppets commit in Yemen, Syria, Bahrain, Iraq and Lebanon, remind us of crimes your forefather Yazid-ibn-Muawiya committed in Karbala. And indeed you are good successors to him. You are ISIS and ISIS is you.

Never assume our calmness is due to weakness. We are oppressed! God will judge between you and us. As we never seek help from other than him.
You are pagan oppressors as you always fawn for US and Israel, that’s what you deserve.
So congratulations to those who achieve martyrdom in fight against pagan oppressors.

“And never think of those who have been killed in the cause of Allah as dead. Rather, they are alive with their Lord, receiving provision ”

Our cyber operation is just started and by the grace of God we are expecting the Saudi regime’s collapse by the “Labbaik Ya-Hossain” slogan.
This second operation is blessed by the name of martyred “Syed Hussein Badreddin al-Houthi” and is going to be a beginning to Saudi’s overthrow, Inshallah.

We have gained access to the Saudi Ministry of Foreign Affairs (MOFA) network and have full control over more than 3000 computers and servers, and thousands of users. We also have access to the emails, personal and secret information of hundreds of thousands of their diplomats in different missions around the world.

We publish only few portions of vital information we have, just to let them know that “truly the flimsiest of houses is the spider´s house”

Some portions of visa secret information, thousands of documents from the MOFA’s automation system and secret emails will be published gradually so as to keep Saudi puppets always in fear of their identity disclosure.

This way they might slightly come to know how it feels when our innocent women and children rush into havens crying and looking for their beloved once in dark.

And that’s not all! All your computers will be automatically wiped on Wednesday – 2015 20 May and at 12:00 to become a lesson for oppressors.

We have the same access to the Interior Ministry (MOI) and Defense Ministry (MOD) of which the details will be published in near future. Wish such shocking news make Saudi dictators to come to their senses and recapture those young wild dogs’ leash to avoid Muslims exploiting hate against Saudi family.
If you did not stop attacks on Muslims in Yemen, do not blame anyone but yourself and expect greater harms.
Files PASSWORD : [email protected]

Your Network Hacked By Yemen Cyber Army
We Are Cutting Sword of Justice
All Your Data is Encrypted and You Can’t Access Them without Key
Find Out the Decryption Key This Way :
Number of Yemeni Children Killed in Saudi Air Attacks   +
Number of Yemeni Homes Destroyed By Saudi-USA Bombs   –
Number of Saudis Killed By Yemenis   –
Number of Israeli Soldiers Killed by Saudi and Arab Union in 1984!!!!

#OPSAUDI
#YEMEN_UNDER_ATTACK
#OPKSA

We Are Anonymous
We Are Everywhere
We Are Legion
We do Not Forgive
We do Not Forget
Stop Attacking To Our Country!

****

Now enter the documents and Wikileaks.

WikiLeaks says it’s leaking over 500,000 Saudi documents

ISTANBUL (AP) — WikiLeaks is in the process of publishing more than 500,000 Saudi diplomatic documents to the Internet, the transparency website said Friday, a move that echoes its famous release of U.S. State Department cables in 2010.

WikiLeaks said in a statement that it has already posted roughly 60,000 files. Most of them appear to be in Arabic.

There was no immediate way to verify the authenticity of the documents, although WikiLeaks has a long track record of hosting large-scale leaks of government material. Many of the documents carried green letterhead marked “Kingdom of Saudi Arabia” or “Ministry of Foreign Affairs.” Some were marked “urgent” or “classified.” At least one appeared to be from the Saudi Embassy in Washington.

If genuine, the documents would offer a rare glimpse into the inner workings of the notoriously opaque kingdom. They might also shed light on Riyadh’s longstanding regional rivalry with Iran, its support for Syrian rebels and Egypt’s military-backed government, and its opposition to an emerging international agreement on Tehran’s nuclear program.

One of the documents, dated to 2012, appears to highlight Saudi Arabia’s well-known skepticism about the Iranian nuclear talks. A message from the Saudi Arabian Embassy in Tehran to the Foreign Ministry in Riyadh describes “flirting American messages” being carried to Iran via an unnamed Turkish mediator.

Another 2012 missive, this time sent from the Saudi Embassy in Abu Dhabi, said the United Arab Emirates was putting “heavy pressure” on the Egyptian government not to try former president Hosni Mubarak, who had been overthrown in a popular uprising the year before.

Some of the concerns appear specific to Saudi Arabia.

In an Aug. 14, 2008 message marked “classified and very urgent,” the Foreign Ministry wrote to the Saudi Embassy in Washington to warn that dozens of students from Saudi Arabia and other Gulf countries had visited the Israeli Embassy in the U.S. capital as part of an international leadership program.

“They listened to diplomats’ briefings from the embassy employees, they asked questions and then they took pictures,” the message said, asking the embassy for a speedy update on the situation.

Another eye-catching item was a document addressed to the interior and justice ministers notifying them that a son of Osama bin Laden had obtained a certificate from the American Embassy in Riyadh “showing (the) death of his father.”

Many more of the dozens of documents examined by The Associated Press appeared to be the product of mundane administrative work, such as emails about setting up a website or operating an office fax machine.

The AP was able to partially verify a handful of documents’ authenticity by calling the telephone numbers included in many of them. WikiLeaks spokesman Kristinn Hrafnsson told AP he was confident that the material was genuine.

It is not clear how WikiLeaks got the documents, although in its statement the website referred to a recent electronic attack on the Saudi Foreign Ministry by a group calling itself the Yemen Cyber Army. Hrafnsson declined to elaborate on the statement or say whether the hackers subsequently passed documents on to WikiLeaks.

“As a matter of policy we’re not going to discuss the source of the material,” he said.

The Saudi Embassy in Washington did not immediately return repeated messages seeking comment.

In its statement, WikiLeaks said the release coincided with the three-year anniversary of its founder, Julian Assange, seeking asylum in the Ecuadorian Embassy in London.

Assange took refuge in the embassy to avoid extradition to Sweden, where he is wanted for questioning about alleged sex crimes. Assange has denied any wrongdoing.  To access: WikiLeaks’ Saudi Cables site: https://wikileaks.org/saudi-cables/