Fake URL’s and Shortening During Arab Spring/Iran

In 2014, it was reported but not widely so.

Edward Snowden leaked a top-secret GCHQ document which details the operations and the techniques used by JTRIG unit for propaganda and internet deception.

SecurityAffairs: The JTRIG unit of the British GCHQ intelligence agency has designed a collection of applications that were used to manipulate for internet deception and surveillance, including the modification of the results of the online polls. The hacking tools have the capability to disseminate fake information, for example artificially increasing the counter of visit for specific web sites, and could be also used to censor video content judged to be “extremist.” The set of application remembers me the NSA catalog published in December when the Germany’s Der Spiegel has revealed another disturbing article on the NSAsurveillance, the document leaked by tge media agency was an internal NSA catalog that offers spies backdoors into a wide range of equipment from major vendors.

The existence of the tools was revealed by the last collection of documents leaked by Edward Snowden, the applications were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG) and are considered one of the most advanced system for propaganda and internet deception. JTRIG is the secret unit mentioned for the first time in a collection of documents leaked by Snowden which describe the Rolling Thunder operation, the group ran DoS attack against chatrooms used by hacktivists. More here.

It is being reported again and it may be just good tradecraft by British intelligence.

British Spies Used a URL Shortener to Honeypot Arab Spring Dissidents

Motherboard: A shadowy unit of the British intelligence agency GCHQ tried to influence online activists during the 2009 Iranian presidential election protests and the 2011 democratic uprisings largely known as the Arab Spring, as new evidence gathered from documents leaked by Edward Snowden shows.

The GCHQ’s special unit, known as the Joint Threat Research Intelligence Group or JTRIG, was first revealed in 2014, when leaked top secret documents showed it tried to infiltrate and manipulate—using “dirty trick” tactics such as honeypots—online communities including those of Anonymous hacktivists, among others.

The group’s tactics against hacktivists have been previously reported, but its influence campaign in the Middle East has never been reported before. I was able to uncover it because I was myself targeted in the past, and was aware of a key detail, a URL shortening service, that was actually redacted in Snowden documents published in 2014.

THE HONEYPOT

A now-defunct free URL shortening service—lurl.me—was set up by GCHQ that enabled social media signals intelligence. Lurl.me was used on Twitter and other social media platforms for the dissemination of pro-revolution messages in the Middle East.

These messages were intended to attract people who were protesting against their government in order to manipulate them and collect intelligence that would help the agency further its aims around the world. The URL shortener made it easy to track them.

I was able to uncover it because I was myself targeted in the past

The project is linked to the GCHQ unit called the Joint Threat Research Intelligence Group or JTRIG, whose mission is to use “dirty tricks” to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, according to leaked documents.

The URL shortening service was codenamed DEADPOOL and was one of JTRIG’s “shaping and honeypots” tools, according to a GCHQ document leaked in 2014.

Leaked GCHQ document listing shaping and honeypot tools used by JTRIG.

Earlier in the same year, NBC News released a leaked document showing that JTRIG attacked the hacktivist outfits Anonymous and LulzSec by launching Distributed Denial of Service (DDoS) attacks on chatroom servers know as Internet Relay Chat (IRC) networks.

The group also identified individuals by using social engineering techniques to trick them into clicking links—a technique commonly used by cybercriminals.

One slide showed a covert agent sending a link—redacted by NBC in the slide—to an individual known as P0ke. According to the slide, this enabled the signals intelligence needed to deanonymize P0ke and discover his name, along with his Facebook and email accounts.

In the fall of 2010, I was an early member of the AnonOps IRC network attacked by JTRIG and used by a covert GCHQ agent to contact P0ke, and in 2011 I co-founded LulzSec with three others. The leaked document also shows that JTRIG was monitoring conversations between P0ke and the LulzSec ex-member Jake Davis, who went by the pseudonym Topiary.

Through multiple sources, I was able to confirm that the redacted deanonymizing link sent to P0ke by a covert agent was to the website lurl.me.

Leaked GCHQ slide from document titled “Hacktivism: Online Covert Action.”

COVERT DISRUPTION

Further investigation of the URL shortener using public data on the web exposed a revealing case study of JTRIG’s other operations that used the DEADPOOL tool, including covert operations in the Middle East.

The Internet Archive shows that the website was active as early as June 2009 and was last seen online on November 2013. A snapshot of the website shows it was a ”free URL shortening service” to ”help you get links to your friends and family fast.”

Snapshot of lurl.me.

Public online resources, search engines and social media websites such as Twitter, Blogspot and YouTube show it being used to fulfill GCHQ geopolitical objectives outlined in previously leaked documents. Almost all 69 Twitter pages that Google has indexed referencing lurl.me are anti-government tweets from supposed Iranian or Middle Eastern activists.

The vast majority are from Twitter accounts with an egg avatar only active for a few days and have a few tweets, but there were a couple from legitimate accounts that have been tweeting for years, who have retweeted or quoted the other accounts tweeting from the URL shortener.

According to agency documents published by The Intercept, one of the strategies for measuring the effectiveness of an operation is to check online to see if a message has been “understood accepted, remembered and changed behaviour”. This could for example involve tracking those who shared or clicked on the lurl.me links created by GCHQ.

The group also identified individuals by using social engineering techniques to trick them into clicking links

Another JTRIG document published by The Intercept titled “Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations” can be used to understand the content associated with social media accounts that used the URL shortener.

JTRIG has an operations group for global targets, which then has a subteam for Iran, According to the document. It further states that “the Iran team currently aims to achieve counter-proliferation by: (1) discrediting the Iranian leadership and its nuclear programme; (2) delaying and disrupting access to materials used in the nuclear programme; (3) conducting online HUMINT; and (4) counter-censorship.”

The document goes on to detail the methods that JTRIG employs to achieve these goals, such as creating false personas, uploading YouTube videos, and starting Facebook groups to push specific information or agendas. Many of the techniques outlined are evident in social media accounts that aggressively use the URL shortener.

Page from leaked GCHQ document titled “Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations,” published at The Intercept.

AGENTS OF THE CAMPAIGN

There appear to be a small number of Twitter accounts that were only active during the month of June 2009, have very few followers, and repeatedly tweet the same content and links from lurl.me. One of the earliest and prolific accounts to tweet using the URL shortener is 2009iranfree.   Read more here from Motherboard.

Russia Weaponizing the Arctic

Russian Military Build-Up in Arctic Highlights Kremlin’s Militarized Mindset

Image result for russia arctic  Image result for russia arctic

Jamestown: Despite Russia’s economic crisis, which has already imposed restrictions on military spending (see EDM, May 3), the Kremlin is trying to implement a questionable buildup in the Arctic, aimed at strengthening Russian military might. During a recent board session of the Russian Ministry of Defense, Minister Sergei Shoigu paid special attention to the implementation of the “2020 Activity Plan by the Northern Fleet.” He reminded participants that the Northern Fleet, an “inter-service strategic formation,” was formed over two years ago “in order to protect [the] northern borders of Russia” (Mil.ru, July 27). He mentioned in particular that the construction of “closed-loop” (self-sustaining) military towns will be finished on the Franz Josef Land archipelago and the Novosibirsk Islands in 2016. A joint situational awareness system is being created to support air defense.   The Russian defense ministry intends to build or reconstruct ten airfields in the Arctic. “Russia’s Federal Agency for Special Construction [Spetsstroy] is building military infrastructure facilities on six islands in the Arctic,” Izvestia quotes a ministry official. According to this source, over 100 tons of military equipment for more than 150 facilities are planned to be delivered to these remote military garrisons. In addition to the materiel supply, more than 190 tons of construction materials—including precast concrete, cement, metal, pipes, fittings and equipment—will be delivered to the Arctic for building the facilities (Izvestia, July 11). The construction and renovation of runways and other structures is ongoing at Severomorsk-1 airfield (Murmansk oblast) as well as Nagurskoye air base (Alexandra Land Island, in the Franz Josef Archipelago). The airfields at Rogachevo (Arkhangelsk oblast), Tiksi (Yakutia Republic) and Temp (Kotelny Island in the Arctic Ocean) are also under construction. It was announced that beginning next year, Tiksi is to become the permanent base for a formation of high-altitude MiG-31 interceptors (Rossiiskaya Gazeta, July 19).   Meanwhile, troops deployed in the Arctic are undergoing intensive training. Specifically, units of mobile rapid-reaction forces are being exposed to the conditions of the Far North. During several snap inspection exercises in the past year, the Russian General Staff has concentrated on the ability to reinforce three land-based brigades in Murmansk oblast—the 200th Motorized Rifle Brigade (Pechenga), the 80th Arctic Motorized Rifle Brigade (Alakurtti) and the 61st Marine Brigade (Sputnik)—with airborne units based in Ivanovo and Pskov (western-central Russia) (Mil.ru April 9, 2015).   Over the last decade, the Russian leadership has become obsessed with the notion that climate change will result in the imminent melting of the polar ice cap in the Arctic Ocean. At this point, these politicians argue, Russia will be able to tap a wealth of heretofore inaccessible natural resources, such as oil and natural gas from the seabed. In addition, the role of the Northern Sea Route (which hugs Russia’s Arctic coast) will increase dramatically, providing huge revenues to Moscow from cargo ships allowed to pass through this transit corridor connecting Europe, Asia and North America.   However, climate change is unlikely to bring only benefits for Russia. In addition to polar ice, the Arctic permafrost will also melt. Consequently, a belt of Russia’s northern coast is expected to turn into a swamp many kilometers deep, making it impossible to build the infrastructure necessary to serve the Northern Sea Route or the facilities required to extract the region’s oil and gas. Moreover, the United Nations Convention on the Law of the Sea (UNCLOS) prohibits parties to the agreement from placing restrictions on foreign ships passing along the Northern Sea Route. Thus, Russia (a party to UNCLOS) is obligated to provide passing foreign vessels with communications as well as meteorological, hydrological and rescue services at its own expense. This means that President Vladimir Putin’s dream of cashing in on the route is wishful thinking. Even now, his plans clearly diverge from reality. Transit traffic via the Northern Sea Route has dropped catastrophically: from 1.18 million tons in 2013, to 39,000 tons in 2015 (Regnum, December 8, 2015).   For almost 80 years of this route’s existence, no one had any reason to question its economic viability. Military bases and prison camps were the main destination and departure points along the Northern Sea Route. Now, with transcontinental cargo traffic having collapsed, Moscow’s main hope is that this route will be used for transporting offshore oil. However, all major Western oil companies have so far refused to develop the Arctic shelf: it is too dangerous and expensive. Furthermore, sections of the Northern Sea Route are inaccessible to larger ships. Vessels with a draught of over 12 meters cannot operate in the vicinity of the Novosibirsk Islands, for example (Fni.no, November 8, 1999).   Future prosperity in the Arctic looks highly doubtful, but the Kremlin lives according to a different logic. It believes that the possession of even hypothetical treasures in the Far North will inevitably encourage other countries to forcibly take them from Russia. Therefore, the Kremlin has demanded that the defense ministry “strengthen the battle capability” in the region.   In executing this order, the Russian military is bound to redevelop old Cold War–style scenarios, even though none of the other Arctic-region countries have shown any sign of militarization in recent years. Nearly Russia’s entire military potential in the Far North is currently concentrated on the Kola Peninsula—the extreme west of the Russian Arctic. This was no accident, and it stems from the Arctic region’s role as a zone of military confrontation between the Soviet Union and the United States throughout the Cold War. It was convenient to deliver nuclear strikes against the enemy from the depths of the ice-covered ocean. The main task of all Soviet Armed forces in the Arctic—the naval surface fleet, the air force and ground troops—was to ensure nuclear submarine combat patrols and the protection of their bases on the Kola Peninsula. No one at that time suggested the need to control and defend thousands of miles of ice desert. Surface vessels of the Northern Fleet, in fact, cannot operate east of Novaya Zemlya—beyond this point they lack ground support and air protection. To ensure wide-scale patrols, it is not enough to restore Soviet-era airfields and station there a few dozen jets. Thousands of tons of fuel will also be required. Deploying small garrisons in the Arctic makes no military sense either. Thus, Russia is spending massive resources simply for Shoigu to be able to report to Putin that the country’s unobtainable natural wealth is being protected.

 

–Aleksandr Golts

Russian spies claim they can now collect crypto keys

Filed under Vlad’s Glad…ah ha ha

Russian spies claim they can now collect crypto keys—but don’t say how

Putin gave KGB’s successor agency two weeks to deal with encrypted services.

ArsTechnica: Russia’s intelligence agency the FSB, successor to the KGB, has posted a notice on its website claiming that it now has the ability to collect crypto keys for Internet services that use encryption. This meets a two-week deadline given by Vladimir Putin to the FSB to develop such a capability. However, no details have been provided of how the FSB is able to do this.

The FSB’s announcement follows the passage of Russia’s wide-ranging surveillance law, which calls for metadata and content to be stored for six months, plus access to encrypted services, as Ars reported back in June.

The new capability seems to go even further, since the FSB notice (in Russian) speaks of obtaining the “information necessary for decoding the electronic messaging received, sent, delivered, and (or) processed by users of the ‘Internet’ network.”

Being able to decode Internet communications would seem to imply getting hold of any crypto keys that are used. However, as an article on The Daily Dot points out, it is still not clear what the new laws will require: “No one seems to know what this new law means in the slightest. Or, more accurately, the people who do know are keeping mum.”

Three of the services that are likely to be most affected by the new requirements are Facebook’s WhatsApp, Telegram, and Viber. Ars has asked all three for clarification on what the Russian authorities have asked for, and what information the companies are or will be providing, but has not yet received any reply. This post will be updated with responses when they are received.

Related reading: Is the U.S. Hacking Back? Uh Huh

The Daily Dot quotes Russian technologist Anton Nesterov as saying that it’s not even clear whether the new legislation applies to VPNs or basic SSL keys, nor whether mainstream electronic payment systems must hand over their keys as a matter of routine.

Nesterov also points out the dangers involved in providing this information, not least because leaks of such valuable data are always a risk.

***** 

In part from CSO: Networks at some 20 organizations in Russia — including scientific and military institutions, defense contractors, and public authorities — were found to be infected with the malware, the Russian Federal Security Service (FSB) said Saturday. The range of infected sites suggests that the targets were deliberately selected as part of a cyber-espionage operation, the FSB said.

Analysis of the attack showed that filenames, parameters and infection methods used in the malware are similar to those involved in other high-profile cyber-espionage operations around the world.

The software was adapted to the characteristics of each PC targeted, and delivered in a malicious email attachment, the FSB said.

Once installed, it downloaded additional modules to perform tasks such as monitoring network traffic, capturing and transmitting screenshots and keystroke logs, or recording audio and video using the PC’s microphone and webcam.

The FSB is working with ministries and other government agencies to identify all the victims of the malware, and to limit its effects, it said.

Russia is said to be the source, not the target, of another government-related cyber-attack. Last week, evidence emerged suggesting Russian involvement in an attack on computers at the Democratic National Committee, where recent data leaks have tarnished the campaign of presidential candidate Hillary Clinton.

 

 

Partial List of Documents Hacked from the Clinton Foundation

Guccifer 2.0: In the post he says the following:

Zerohedge: This’s time to keep my word and here’re the docs I promised you.

It’s not a report in one file, it’s a big folder of docs devoted to Hillary Clinton that I found on the DNC server.

The DNC collected all info about the attacks on Hillary Clinton and
prepared the ways of her defense, memos, etc., including the most
sensitive issues like email hacks.

As an example here’re some files:

This’s time to keep my word and here’re the docs I promised you.

It’s not a report in one file, it’s a big folder of docs devoted to Hillary Clinton that I found on the DNC server.

The DNC collected all info about the attacks on Hillary Clinton and
prepared the ways of her defense, memos, etc., including the most
sensitive issues like email hacks.

As an example here’re some files:

2016er Attacks – HRC Defense Master Doc [updated]

04.29.15 CGEP

2016 Democrats Positions Cheat Sheet 7-7-15

20150426 MEMO- Clinton Cash Unravels

Attacks on Clinton Family Members

Clinton Foundation Donors $25K+

Clinton Foundation Vulnerabilities Master Doc FINAL

Clintons PFD 2015

HRC Defense – Emails

HRC Travel – Private Jets FINAL

MEMO — Clinton Cash Claims (2)

Most notable among these files is the file called “Clinton Foundation Vulnerabilities Master Doc FINAL” which, as the title implies, is an extensive 42-page summary of how the Clinton Foundation views its biggest vulnerabilities based on mentions, references and attacks from the press.

Here are some of the section titles:

  • THE CLINTON FOUNDATION RECEIVED DONATIONS FROM INDIVIDUALS TIED TO SAUDI ARABIA WHILE CLINTON SERVED AS SECRETARY OF STATE
  • AN EMBATTLED BUSINESSMAN WITH “TIES TO BAHRAIN’S STATE-OWNED ALUMINUM COMPANY” GAVE BETWEEN $1 MILLION AND $5 MILLION TO THE CLINTON FOUNDATION
  • A VENEZUELAN MEDIA MOGUL WHO WAS ACTIVE IN VENEZUELAN POLITICS DONATED TO THE CLINTON FOUNDATION DURING CLINTON’S TENURE AS SECRETARY OF STATE
  • GERMAN INVESTOR WHO HAS LOBBIED CHANCELLOR MERKEL’S ADMINISTRATION GAVE BETWEEN $1 MILLION AND $5 MILLION TO THE CLINTON FOUNDATION, SOME OF WHICH WAS DURING MRS. CLINTON’S TENURE AT THE STATE DEPARTMENT
  • THE CEO OF AN AMSTERDAM BASED ENERGY COMPANY DONATED AT LEAST $1 MILLION TO THE CLINTON FOUNDATION AND LATER ANNOUNCED AT THE 2009 CGI MEETING A $5 BILLION PROJECT TO DEVELOP ENVIRONMENTALLY FRIENDLY POWER GENERATION IN INDIA AND CHINA
  • INDIAN POLITICIAN AMAR SINGH, WHO HAD DONATED AT LEAST $1 MILLION TO THE CLINTON FOUNDATION, MET WITH HILLARY CLINTON IN SEPTEMBER 2008 TO DISCUSS AN INDIA-U.S. CIVIL NUCLEAR AGREEMENT
  • THE CLINTON FOUNDATION RECEIVED ADDITIONAL DONATIONS FROM INDIAN BUSINESS INTERESTS PRIOR TO HER BECOMING SECRETARY OF STATE
  • BILLIONAIRE STEEL EXECUTIVE AND MEMBER OF THE FOREIGN INVESTMENT COUNCIL IN KAZAKHSTAN LAKSHMI MITTAL GAVE $1 MILLION TO $5 MILLION TO THE CLINTON FOUNDATION BEFORE CLINTON BECAME SECRETARY OF STATE
  • SOON AFTER SECRETARY CLINTON LEFT THE STATE DEPARTMENT, THE CLINTON
    FOUNDATION “RECEIVED A LARGE DONATION FROM A CONGLOMERATE RUN BY A
    MEMBER OF CHINA’S NATIONAL PEOPLE’S CONGRESS”
  • …AND THE CLINTON FOUNDATION DEFENDED ITS PARTNERSHIPS WITH BOTH FOREIGN AND DOMESTIC CORPORATE INTERESTS
  • POWERFUL AND CONTROVERSIAL CORPORATE INTERESTS BASED IN THE U.S. ALSO DONATED TO THE CLINTON FOUNDATION
  • AMONG THE CLINTON FOUNDATION DONORS REVEALED IN 2009 WERE SEVERAL FOREIGN GOVERNMENTS WHO HAD GIVEN MILLIONS OF DOLLARS
  • WHEN HILLARY CLINTON BECAME SECRETARY OF STATE IN 2009, BILL CLINTON AGREED TO STOP ACCEPTING CONTRIBUTIONS TO THE CLINTON FOUNDATION FROM MOST FOREIGN COUNTRIES
  • IN THE PAST, SOME OBSERVERS HAD LINKED FOREIGN GOVERNMENT DONATIONS TO THE CLINTON FOUNDATION AND SECRETARY CLINTON’S WORK AT THE STATE DEPARTMENT
  • THE CLINTON FOUNDATION CAME UNDER INTENSE SCRUTINY IN FEBRUARY 2015 WHEN IT WAS REVEALED THAT THE FOUNDATION HAD ACCEPTED DONATIONS FROM FOREIGN GOVERNMENTS AFTER SECRETARY CLINTON LEFT THE STATE DEPARTMENT
  • THE WALL STREET JOURNAL TIED FOREIGN GOVERNMENT DONORS TO THE CLINTON FOUNDATION’S ENDOWMENT FUNDRAISING UNDER SECRETARY CLINTON
  • CLINTON FOUNDATION ANNOUNCED THAT SHOULD HILLARY CLINTON DECIDE TO RUN FOR PRESIDENT, THE FOUNDATION WOULD FOLLOW APPROPRIATE PROCEDURES FOR ACCEPTING DONATIONS FROM FOREIGN DONATIONS, JUST LIKE IT HAD HAD UNDER SECRETARY CLINTON…
  • REPORTS THAT STATE DEPARTMENT LAWYERS DID NOT EXHAUSTIVELY VET BILL CLINTON’S PAID SPEECHES DURING SECRETARY CLINTON’S TENURE RAISED QUESTIONS ABOUT THE ROLE CLINTON FOUNDATION DONATIONS MAY HAVE PLAYED IN ORGANIZING THOSE SPEECHES
  • SOME CONSERVATIVES USED THE FOREIGN DONATIONS CONTROVERSY TO IMPLY THAT THE CLINTON FOUNDATION IS NOT A CHARITY AND QUESTION THE FOUNDATION’S CHARITABLE WORK
  • THE CLINTON FOUNDATION HAS ACCEPTED DONATIONS FROM INDIVIDUALS, SOME OF WHOM HAD TIES TO FOREIGN GOVERNMENTS, DURING HER TENURE AS SECRETARY OF STATE
  • THE CLINTON FOUNDATION RECEIVED MONEY FROM A FOUNDATION FORMED BY FORMER UKRAINIAN PARLIAMENT MEMBER VICTOR PINCHUK
  • WALL STREET JOURNAL COLUMNIST MARY O’GRADY CITED A CONTRACT BETWEEN TWO CLINTON DONORS FOR HAITI AID AS EVIDENCE OF A CONFLICT OF INTEREST FOR THE CLINTONS

There is much more in the full document presented below (link).

* * *

One important thing to note: according to an interview that Motherboard conducted with Guccifer2 on Tuesday, the hacker makes it clear he is not Russian. He is, in fact, from Romania, just like the Original Guccifer. 

“I’m a hacker, manager, philosopher, women lover,” Guccifer 2.0 told Motherboard on Tuesday in a Twitter chat. “I also like Gucci! I bring the light to people. I’m a freedom fighter! So u can choose what u like!”

The hacker, who claimed to have chosen the name in reference to the notorious hacker who leaked the George W. Bush paintings and claims to have hacked Hillary Clinton’s email server, denied working for the Russian government, as several experts believe.

“I don’t like Russians and their foreign policy. I hate being attributed to Russia,” he said, adding that he was from Romania, just like the first Guccifer.

When asked to explain how he hacked into the DNC in Romanian, “he seemed to stall us, and said he didn’t want to “waste” his time doing that. The few short sentences he sent in Romanian were filled with mistakes, according to several Romanian native speakers.”

The hacker said he left Russian metadata in the leaked documents as his personal ”watermark.” He also said he got kicked out of the network on June 12, when the DNC “rebooted their system.”

A senior DNC official said in an emailed statement that “our experts are confident in their assessment that the Russian government hackers were the actors responsible for the breach detected in April, and we believe that the subsequent release and the claims around it may be a part of a disinformation campaign by the Russians.”

Guccifer 2.0 also said the DNC isn’t the only victim of his hacks, but declined to name any others because “my safety depends on it.”

It appears the Clinton Foundation was one of the other hacks.

Finally, when asked why he targeted the DNC, “Guccifer 2.0 said he simply did it to follow the lead of Marcel Lazar, the original Guccifer, and that he doesn’t “care at all” about Donald Trump. The hacker declined to say whether he knew him personally, “cause I care for Marcel.” “I think we must fight for freedom of minds,” he wrote. “Fight for the world without Illuminati.”

Good luck.

* * *

So while we are going through the full data dump (found here), here is the leaked document revealing the “Clinton Foundation’s Vulnerabilities.”

 

Clinton Foundation Vulnerabilities Master Doc Final by zerohedge on Scribd

 

The U.S. has had a Russian Problem of Espionage for Decades

What is terrifying and pathetic is the Obama White House and both Secretaries of State Hillary Clinton and John Kerry have been stooges of Putin….groveling for normalcy just as they have with the regime of Iran. This is an administration that is normalizing relations with all terror regimes across the globe that include North Korea, Cuba and Venezuela. Hillary said that Bashir al Assad of Syria was a reformer when 400,000 Syrians are dead and 4-5 million have left their homes. Then, we all remember that the Obama White House negotiated with Qatar to released 5 Taliban commanders in exchange for one Army deserter. Talks have been ongoing with the Taliban for years until just recently.

But back to Russia….before the hacking, to sway and or interfere with U.S. elections.

Related reading: Hey FBI, the Investigation into the DNC Hacking is Over Here

No one is admitting that Russian in cadence with WikiLeaks has hacked Hillary’s campaign systems, DCC and the DNC as well as other government systems. Why? Perhaps diplomacy due to talks continued talks with Iran and ending the civil war in Syria. Remember that ‘red-line’ on chemical weapons use.

So, let’s go back a way, like over a decade and up to just a couple of years ago when it came to Russian spies in the United States, shall we? This is for perspective and how the Obama administration including his National Security Council and the State Department continue to ‘omit’ history…

Espionage continues and tactics have not changed for Russia where cyber intrusions have replaced in country operatives, however a look at those operatives’ skills and missions must not be overlooked or dismissed.

Image result for russian spies caught

Let’s begin with Anna Chapman, the Russian spy.

DailyNews: Sultry former Russian secret agent Anna Chapman ended an exchange with NBC News almost before it began when she was pressed about her playful Twitter marriage proposal to NSA leaker Edward Snowden.

Here is the official criminal complaint and summary of how the FBI tracked her actions filed in 2010. The file also includes an additional spy Mikhail Sememko. This actually began in 1990….yes 1990.

But actually there were 8 more Russian spies and this is the criminal complaint for that case. What is fascinating here is the many stopovers in Latin America…..

The spying spree finally came to its end in the summer of 2014, when the trio were propositioned by a self-described investor who wanted to develop casinos in Russia. The scheme immediately drew red flags among the group, with Sporyshev offering that the proposal felt “like some sort of set-up.”
But despite his misgivings, Sporyshev didn’t stop Buryakov from meeting with the supposed investor, who was, in fact, an FBI informant.
For six hours on Aug. 28, Buryakov and the informant met in the anemic gambling metropolis Atlantic City. The informant, who claimed he had a well-placed source in the U.S. government, handed Buryakov documents that were labeled “Internal Treasury Use Only” and contained a list of Russians who were essentially blacklisted from doing business with the United States.
The valuable document earned the informant another meeting that day, when he offered Buryakov another official document that contained “a list of Russian banks… on which to impose sanctions,” according to the criminal complaint. More from DailyBeast.

Then there was a dead Russian, Mikhail Lesin. found in a hotel in Dupont Circle, Washington DC. A story that came and went real fast.

Image result for russian Mikhail Lesin

Mr. Lesin was a major figure in Russian media after the fall of the Soviet Union, first as an advertising executive and later as a top government official and media executive.  

He had deep connections to the Russian state at the time Mr. Putin was reasserting his authority over the country’s rambunctious and freewheeling media. He was a crucial figure in that process, which began with the takeover of Russia’s first independent television channel, NTV, in the early 2000s, and was viewed with bitterness by many Russian journalists at that time.