4 Members of the Chinese Military Hacked Equifax

(AP) — Four members of the Chinese military have been charged with breaking into the networks of the Equifax credit reporting agency and stealing the personal information of tens of millions of Americans, the Justice Department said Monday, blaming Beijing for one of the largest hacks in history to target consumer data.

The 2017 breach affected more than 145 million people, with the hackers successfully stealing names, addresses, Social Security and driver’s license numbers and other personal information stored in the company’s databases.

4 Chinese military members charged in Equifax case

The four — members of the People’s Liberation Army, an arm of the Chinese military — are also accused of stealing the company’s trade secrets, including database designs, law enforcement officials said.

The accused hackers exploited a software vulnerability to gain access to Equifax’s computers, obtaining log-in credentials that they used to navigate databases and review records. The indictment also details efforts the hackers took to cover their tracks, including wiping log files on a daily basis and routing traffic through dozens of servers in nearly 20 countries.

  Source

“The scale of the theft was staggering,” Attorney General William Barr said Monday. “This theft not only caused significant financial damage to Equifax, but invaded the privacy of many millions of Americans, and imposed substantial costs and burdens on them as they have had to take measures to protect against identity theft.”

Equifax, headquartered in Atlanta, maintains a massive repository of consumer information that it sells to businesses looking to verify identities or assess creditworthiness. All told, the indictment says, the company holds information on hundreds of millions of Americans in the U.S. and abroad.

The case is the latest Justice Department accusation against Chinese hackers suspected of breaching networks of American corporations. It comes as the Trump administration has warned against what it sees as the growing political and economic influence of China, and efforts by Beijing to collect data on Americans and steal scientific research and innovation.

The administration has also been pressing allies not to allow Chinese tech giant Huawei to be part of their 5G wireless networks due to concerns that the equipment could be used to collect data and for surveillance.

The accused hackers are based in China and none is in custody. But U.S. officials nonetheless view criminal charges like the ones brought in this case as a powerful deterrent to foreign hackers and a warning to other countries that American law enforcement has the capability to pinpoint individual culprits behind hacks.

A spokesperson for the Chinese embassy did not immediately return an email seeking comment Monday.

The case resembles a 2014 indictment from the Obama administration Justice Department that accused five members of the PLA of hacking into major American corporations to steal their trade secrets. U.S. authorities also suspect China in the massive 2015 breach of the Office of Personnel Management and of intrusions into the Marriott hotel chain and Anthem health insurance company.

“This kind of attack on American industry is of a piece with other Chinese illegal acquisitions of sensitive personal data,” Barr said of Monday’s announcement, adding that “for years we have witnessed China’s voracious appetite for the personal data of Americans.”

The criminal charges — which include conspiracy to commit computer fraud and conspiracy to commit economic espionage — were filed in federal court in Atlanta.

Equifax last year reached a $700 million settlement over the data breach, with the bulk of the funds intended for consumers affected by it.

Equifax didn’t notice the intruders targeting its databases for more than six weeks. Hackers exploited a known security vulnerability that Equifax hadn’t fixed.

Once inside the network, officials said, the hackers spent weeks conducting reconnaissance. They stole login credentials and ultimately downloaded and extractedate data from Equifax to computers outside the United States.

The indictment says the hackers obtained names, birth dates, and Social Security numbers for about 145 million American victims, along with credit card numbers and other personal information for about 200,000.

According to the Government Accountability Office, the investigative arm of Congress, a server hosting Equifax’s online dispute portal was running software with a known weak spot. The hackers jumped through the opening to reach databases containing consumers’ personal information.

Equifax officials told GAO the company made many mistakes, including having an outdated list of computer systems administrators. When the company circulated a notice to install a patch for the software vulnerability, the employees responsible for installing the patch never got it.

Equifax’s $700 million settlement with the U.S. government gives affected consumers free credit-monitoring and identity-restoration services, plus money for their time or reimbursement for certain services. However, because so many people made claims, officials said some consumers would get far less than the eligible amounts because of caps in the settlement pool.

Another Assassination in France by Russia?

Throat slit and dozens of stab wounds. This happened at a weeek ago…great job media. No suspects yet? No worries, French investigators say this may be politically motivated….really?

Imran Aliev is dead. Caucasian Knot | Imran Aliev's acquaintances report ...

The murder of an unidentified man at the Hôtel Coq Hardi near Lille train station was first reported on 30 January by La Voix du Nord, a local newspaper. According to the paper, the body of the man was found in his room by the cleaning staff after he failed to check out of his room. The body bore multiple stab wounds to the neck and a knife, the suspected murder weapon, was also found in the room.  Faits Divers : Toute l'actualité des faits divers sur Le ...

Chechens living in exile who have fought or spoken out against Kadyrov – the ruthless Chechen leader appointed by Vladimir Putin – have often been targeted for assassination. Last year, a former Chechen rebel commander was shot twice in the head in a targeted killing in Berlin’s Kleiner Tiergarten. The suspected assassin is Russian.

Imran Aliev, who settled in Belgium after leaving Chechnya, was described as an eccentric and divisive figure who often published YouTube videos critical of the Chechen government under the pseudonym Mansur Stariy, or Old Mansur. He had also sparked conflicts by targeting natives of Ingushetia and Dagestan, regions that neighbour Chechnya, in profanity-laced tirades that had earned threats on his life.

Those who knew Aliev expressed surprise that he had been targeted because he was seen as a marginal figure suffering from debilitating health issues.

“He was murdered especially cruelly,” wrote Musa Taipov, a Chechen opposition journalist based in Strasbourg who said he was in regular contact with Aliev. In a Facebook post, Taipov described Aliev as a “difficult but honest” acquaintance who was managing a difficult illness with painkillers and would sometimes issue “not entirely proper declarations”.

“Some people, they offended. For others, they were ‘funny’,” Taipov wrote. He sometimes urged Aliev to delete the YouTube videos, Taipov said, and “most of the time he agreed”.

Police have not publicly identified any suspects in the case. A lawyer who knew Aliev told the Caucasian Knot website that the blogger had received a visitor from Chechnya several days before his death. The man had asked for Aliev’s help with a health condition and the two travelled from Belgium to Lille together, where Aliev was last seen alive. The man then disappeared. Minkail Malizaev, a Chechen blogger who left Grozny under pressure and now lives in Germany, also claimed in an online post that the man visiting Aliev had also sought a meeting with him.

Thousands of refugees and emigres from Chechnya live in Europe. Many fled the two wars that devastated the region from the 1990s, while others escaped the brutal crackdown against dissent under Kadyrov, who has headed the region since 2007 and runs it as a near-fiefdom. Aliev had political asylum in Belgium, the lawyer said.

The trail of assassinations of prominent Chechens in Europe and the Middle East stretches back more than a decade, and includes former rebel commanders and government critics. Increasingly, the attacks have targeted people who posed no real political danger to Kadyrov, but merely took to Instagram or YouTube accounts to voice their dissatisfaction with Chechnya’s leaders in Grozny.

“I have no doubt that [Aliev] was on a list of people who have been sentenced to death,” said Tumso Abdurakhmanov, a video blogger living in Europe who has received threats from allies of Kadyrov for his criticism on YouTube of Chechnya’s government.

Abdurakhmanov claimed that before Aliev’s murder, he had received information that a hitman from Chechnya had been dispatched to western Europe, and shared the details of the man’s itinerary with German police. Abdurakhmanov said he initially believed that the hitman was targeting him. He declined to reveal the source of that information. More here from The Guardian.

Tell Tucker the Russians Really Did Interfere

The Obama Administration found itself in “uncharted territory” as the scope of Russian meddling in the 2016 elections became clear to senior officials, a report issued on Thursday by the Senate Intelligence Committee found.

The panel — led by Sens. Richard Burr (R-NC) and Mark Warner (D-VA) — found that the U.S. government “was not well-postured to counter Russian election interference activity with a full range of readily-available policy options.”

The Obama administration issued “high-level warnings of potential retaliation” to Moscow, “but tempered its response over concerns about appearing to act politically on behalf of one candidate, undermining public confidence in the election, and provoking additional Russian actions.”

The report marks the third volume in the Senate Intelligence Committee’s years-long investigation of Russia’s interference campaign in the 2016 election. Previous reports have focused on the use of social media manipulation by Russia in 2016 and its attacks on local and state election infrastructure.

Some sections of the report remain partially or totally redacted, but nonetheless a picture emerges of the uncertainty and contradictions the administration faced in figuring out how to address Russia’s attack on the U.S. elections.

Even as the U.S. government was well aware of Moscow’s decades-long campaigns against the U.S., the 2016 attack was “unprecedented” in “scale and sophistication,” Thursday’s report said, and Russia’s weaponization of the information it hacked from Democrats was unlike anything government officials had ever seen before.

Some top administration officials first learned that the DNC had been hacked and had emails stolen when it was reported by the Washington Post in June 2016.

“In fact, had the DNC not approached and cooperated with the Washington Post to publish a June 14, 2016, article, senior administration leadership probably would not have been aware of the issue until later, in all likelihood when WikiLeaks, Guccifer 2.0, and DCLeaks began to publish emails taken from the DNC’s network,” the report reads.

The administration faced several constraints as it grappled with how to respond to the attack, according to the report. One was the concern that public warnings would help Russia achieve its very goals, by sowing fear and undermining confidence in the election.

Another, however, was the fear of giving the appearance that the White House was “siding with one candidate,” particularly as then-candidate Donald Trump was amping up his rhetoric about the election being “rigged” against him, officials noted to the committee.

The report cites then-Homeland Security Adviser Lisa Monaco recalling Senate Majority Leader Mitch McConnell (R-KY) raising similar concerns.

“[Y]ou security people should be careful that you’re not getting used,” the report cites Monaco as remembering of McConnell’s reaction to the prospect of a public, bipartisan statement on the interference campaign.

Monaco, the report states, interpreted this as meaning that intelligence on Russia’s interference efforts “was being inflated or used for partisan ends.”

Sen. Burr, at a committee hearing cited in the report, phrased McConnell’s concern as “Would this not contribute to Russia’s efforts at creating concerns about our election process, if the leadership of the Congress put that letter out?”

Separate reporting has indicated that McConnell told Obama in a September 2016 meeting about Russian interference that he would interpret a public warning about the matter as an attempt to interfere in the election, and not sign on to a bipartisan announcement about the threat.

The report recounts several direct warnings Obama officials delivered to Moscow regarding the attack, including an in-person confrontation between President Obama and Vladimir Putin at a September 2016 G20 summit in China.

A paragraph titled “Secretary Kerry and Minister Lavrov” in that section is completely redacted. In Obama’s warning to Putin, which was crafted carefully with a small group of principals, the potential consequences were “purposely left ambiguous by the President in an effort to intimate that a range of diplomatic, economic, [redacted] options were available to use in response to Russia.”

Putin gave Obama an “energetic” and “non-substantive” denial, then-Ambassador Susan Rice told the committee, based on Obama’s account of the conversation to her.

CIA Director John Brennan also brought up the interference on an August call with Russian FSB head Alexander Bortnikov, as did Rice, with a phone call to then-Ambassador Sergey Kislyak and a written message from Obama that was passed through her to Putin.

“The written message was a more specific warning that contained ‘the kind of consequences that he could anticipate would be powerfully impactful to their economy and far exceed anything that he had seen to date,’” the report said, quoting Rice.

The administration also used a cyber hotline to deliver warnings to Russia, where at least eight messages — four on each side — were exchanged, but only three of them carrying substantive information, according to the committee.

At one point, the Russian government denied “technical information” that the Obama administration supplied about the interference campaign. In that message, the report reads, Moscow said that “it too had been victim to some of the same cyber activity.”

The report recounts the administration’s efforts to inform stakeholders about the threat to election infrastructure and the blowback the administration experience when DHS floated designating election systems as critical infrastructure (a designation it ultimately made in Jan. 2017).

Former DHS Secretary Jeh Johnson told the committee that the move in October to release a public statement attributing the attacks to Russia was “a very, very big decision.” The statement was ultimately overshadowed by the revelation of the Trump Access Hollywood tape and the dump of another tranche of emails hacked from Democrats.)

Administration officials told the committee that at the time they believed that their warnings to Moscow — and particularly the Oct. 7 warning from Obama to Putin — had had a deterrent effect. However the report identified three events after that warning that showed Russia’s cyber-activity continued: the scanning Russian actors did of state and local election websites to identify vulnerabilities; spearfishing emails sent to Florida election officials and organizations; and a third episode that was completely redacted in the report.

After the election, the administration felt less constrained in how to punish Russia now that it now longer had to worry about provoking further meddling, according to the report. Among the post-election responses were the expulsion of Russian diplomats, the levy of additional sanctions and the designation by DHS of election infrastructure as critical infrastructure. Much of this section of the report is also redacted.

The White House also considered whether to impose more punitive economic sanctions that would have been severe enough to “incur significant blowback” to the U.S. and Europe.

That path was not taken, in part because of the blowback, and in part because of “uncertainty about the future Russia policy of the incoming administration” and the possibility of wavering European allies.

In an addendum to the report, Sens. Marco Rubio (R-FL), Tom Cotton (R-AR), John Cornyn (R-TX), Ben Sasse (R-NE), and James Risch (R-ID) criticized the Obama administration for being “inept.”

“Hollow threats and slow, hapless responses from the administration translated to perceived weakness on the part of the U.S., and Putin exploited that weakness with impunity,” the addendum reads. “It appears to us that either the Obama administration was woefully unprepared to address a known and ongoing national security threat, or even worse, that the administration did not take the threat seriously.

The committee said it was “appalling” that senior Obama administration officials didn’t recognize Russia’s malign activities until late July, despite intelligence pointing in that direction.

Sen. Wyden also filed an attachment to the report, bemoaning “a political environment in which one candidate was questioning the legitimacy of the election with falsehoods (“large scale voter fraud”)” as “a reason to keep the public in the dark about real threats to America’s democracy.”

He criticized the report for failing to provide detailed information about the September 2016 meeting between top Obama administration officials and Senate leaders as the White House pressed for a bipartisan statement on the interference campaign.

“As the report describes, the Obama Administration believed that any public statements about Russian interference it might make would be seen as partisan, a concern that would be mitigated if members of Congress were to publicly support the available intelligence,” Wyden wrote. “I believe that warning the public about a foreign influence campaign should not depend on the support of both parties, particularly when one of the parties stands to gain politically from that campaign. But that is how the Obama Administration felt.”

Green Light Law v. Trump Administration

Hat tip to DHS….

The New York Department of Motor Vehicles has a rather new law called the Green Light Law where illegals can obtain state issued identification licenses and or driver’s licenses. New York is one of 13 states with such a law with slight iteration differences. It is unclear what undocumented applicants must provide to the clerk as evidence and what safeguards are in place to prevent fraud and higher risks to public safety. Law enforcement across the country use DMV databases hundreds of thousands of times a day for normal traffic stops, identification verification, outstanding warrants and in many cases criminal records across state lines.

New York is the top city as a foreign entry point and there are no real stipulations as to entry or exit factors in the law. Further, the State of New York has terminated DMV database access to Customs and Border Patrol. Remember the 9/11 commission put forth countless recommendations that all lawmakers and all state governors signed onto which mandated information sharing. Governor Cuomo appears to forget that.

Image result for global traveler program

Due to lack of DMV access for all matter regarding travel and public safety, DHS has terminated New York from the ‘Trusted Traveler Program’ and this is yet causing more outrage in the Governor’s office.

DHS: In response to New York State implementing the Driver’s License Access and Privacy Act (Green Light Law), Acting Secretary Chad F. Wolf announced New York residents will no longer be eligible to apply for or renew their enrollment in certain Trusted Traveler Programs like Global Entry. The law prohibits the Department of Motor Vehicles (DMV) from sharing information with U.S. Department of Homeland Security (DHS), preventing DHS from fully vetting New York residents. The Acting Secretary informed State officials by letter of the change. The letter may be read here.

“New York’s ‘Green Light Law’ is ill-conceived and the Department is forced to take this action to ensure the integrity of our Trusted Traveler Programs. It’s very clear: this irresponsible action has consequences,” said Acting Secretary Chad Wolf. “An aspect of the law which I’m most concerned about is that it prohibits the DMV from providing ICE and CBP with important data used in law enforcement, trade, travel, and homeland security. ICE uses the information as they investigate and build cases against terrorists, and criminals who commit child sexual exploitation, human trafficking, and financial crimes. Unfortunately, because of this law, they can no longer do that”

Wolf continued: “CBP also uses that data for national security purposes and to ensure safe and lawful trade and travel. Specifically, CBP is able to offer Trusted Traveler Programs like Global Entry because we are able to use DMV data to make an evidence-based assessment that those individuals who seek this benefit are low risk and meet the eligibility requirements. Without the DMV information we aren’t able to make that assessment. DHS notified New York DMV that New York residents can no longer enroll or re-enroll in these trusted traveler programs because we no longer have access to data to ensure that New York Residents meet those programs requirements. We must do our job.”

Customs and Border Protection (CBP) runs Trusted Traveler Programs like Global Entry, FAST, SENTRI and NEXUS which rely on access to DMV data to determine whether the person is who they say they are and if they have a criminal record. When that data is denied, the security is compromised. CBP expects the move to affect up to 150,000-200,000 New York residents who seek to renew membership in a CBP Trusted Traveler Programs this fiscal year. There are almost 30,000 commercial truck drivers enrolled in the FAST program at four New York-Canada ports of entry.

Additionally, because the law hinders DHS from validating documents used to establish vehicle ownership, the exporting of used vehicles titled and registered in New York State will be significantly delayed and could also be costlier.

AG Barr/Director Wray Warning on China Threat

Question is, who is listening? Corporation America, small business, academia, individuals? 5G needs national attention readers, what do you know? Learn it fast, it is here.

AG Barr Hints at His Dangerous Position Overseeing Deep ...

Attorney General Barr recalled, a fellow student once told him Russia wanted to conquer the world and the United States could deal with that. But China, the student said at the time, wanted to own the world and that was a bit more difficult.

“There was a certain truth in that,” Barr told the audience Thursday.

Barr made his remarks at the Center for Strategic and International Studies in Washington, reminding his audience that the Communist Party remains in control of the Chinese economy and is “authoritarian through and through.”“Their goal is the eventual demise of capitalism,” the attorney general said.

The United States has long accused China of intellectual property theft on a grand scale. “It has been estimated that the annual cost to the U.S. economy could be $600 billion,” Barr said.

U.S. officials are also worried that China is threatening to become the dominant world force in the race to transition to 5G.

Aside from serving as the attorney general once before, Barr also spent several years in the telecom industry and used that experience to sound another dire warning.

The attorney general called the impending jump to 5G “a quantum leap” which will have major economic implications. The Chinese telecom giant Huawei “is the leading supplier of 5G on every continent except North America,” Barr said, adding that the U.S. market needed to “pick a horse” to back in the race for domestic 5G influence.

“The Chinese are using every lever of power to expand their 5G market share around the globe,” he said.

U.S. officials say Chinese leaders are working toward being the geopolitical, economic and military world leader by the year 2049, the 100th anniversary of the Peoples Republic of China.

“China wants the fruits of America’s brainpower to harvest the seeds of its planned economic dominance,” said John Demers, the assistant attorney general for the National Security Division.

***  Christopher Wray vows independence: No 'pulling punches ...

FBI Director Wray described the threat from China as “diverse” and “multi-layered.” He noted that the Chinese government exploits the openness of the American economy and society.

“They’ve pioneered an expansive approach to stealing innovation through a wide range of actors,” Wray said during opening remarks at the half-day Department of Justice China Initiative Conference in Washington, D.C.

Wray told the audience that China is targeting everything from agricultural techniques to medical devices in its efforts to get ahead economically. While this is sometimes done legally, such as through company acquisitions, China often takes illegal approaches, including cyber intrusions and corporate espionage.

“They’ve shown that they’re willing to steal their way up the economic ladder at our expense,” he said.

The FBI is using traditional law enforcement techniques as well as its intelligence capabilities to combat these threats. He said the FBI currently has about 1,000 investigations into Chinese technology theft.

“They’ve shown that they’re willing to steal their way up the economic ladder at our expense.”

Just last month, a Harvard University professor was charged with lying about his contractual arrangement with China.

Wray also called for a whole-of-society response to these threats. He urged U.S. companies to carefully consider their supply lines and whether and how they do business with Chinese companies. While a partnership with a Chinese company may seem profitable today, a U.S. company may find themselves losing their intellectual property in the long run.

Additionally, U.S. universities should work to protect their foreign students from coercion from foreign governments, Wray said. When China violates our criminal laws and well-established international norms, we are not going to tolerate it, much less enable it,” he said. “The Department of Justice and the FBI are going to hold people accountable for that and protect our nation’s innovation and ideas.”