How Terrorists use Encryption

 

How Terrorists Use Encryption

June 16, 2016

CTC: Abstract: As powerful encryption increasingly becomes embedded in electronic devices and online messaging apps, Islamist terrorists are exploiting the technology to communicate securely and store information. Legislative efforts to help law enforcement agencies wrestle with the phenomenon of “going dark” will never lead to a return to the status quo ante, however. With the code underlying end-to-end encryption now widely available, unbreakable encryption is here to stay. However, the picture is not wholly bleak. While end-to-end encryption itself often cannot be broken, intelligence agencies have been able to hack the software on the ends and take advantage of users’ mistakes.

Counterterrorism officials have grown increasingly concerned about terrorist groups using encryption in order to communicate securely. As encryption increasingly becomes a part of electronic devices and online messaging apps, a range of criminal actors including Islamist terrorists are exploiting the technology to communicate and store information, thus avoiding detection and incrimination, a phenomenon law enforcement officials refer to as “going dark.”

Despite a vociferous public debate on both sides of the Atlantic that has pitted government agencies against tech companies, civil liberties advocates, and even senior figures in the national security establishment who have argued that creation of “backdoors”[1] for law enforcement agencies to retrieve communications would do more harm than good, there remains widespread confusion about how encryption actually works.[a]

Technologists have long understood that regulatory measures stand little chance of rolling back the tide. Besides software being written in other countries (and beyond local laws), what has not been fully understood in the public debate is that the “source code” itself behind end-to-end encryption is now widely available online, which means that short of shutting down the internet, there is nothing that can be done to stop individuals, including terrorists, from creating and customizing their own encryption software.

The first part of this article provides a primer on the various forms of encryption, including end-to-end encryption, full device encryption, anonymization, and various secure communication (operational security or opsec) methods that are used on top of or instead of encryption. Part two then looks at some examples of how terrorist actors are using these methods.

Part 1: Encryption 101 

End-to-End Encryption
A cell phone already uses encryption to talk to the nearest cell tower. This is because hackers could otherwise eavesdrop on radio waves to listen in on phone calls. However, after the cell tower, phone calls are not encrypted as they traverse copper wires and fiber optic cables. It is considered too hard for nefarious actors to dig up these cables and tap into them.

In a similar manner, older chat apps only encrypted messages as far as the servers, using what is known as SSL.[b] That was to defeat hackers who would be able to eavesdrop on internet traffic to the servers going over the Wi-Fi at public places. But once the messages reached the servers, they were stored in an unencrypted format because at that point they were considered “safe” from hackers. Law enforcement could still obtain the messages with a court order.

Newer chat apps, instead of encrypting the messages only as far as the server, encrypt the message all the way to the other end, to the recipient’s phone. Only the recipients, with a private key, are able to decrypt the message. Service providers can still provide the “metadata” to police (who sent messages to whom), but they no longer have access to the content of the messages.

The online messaging app Telegram was one of the earliest systems to support end-to-end encryption, and terrorists groups such as the Islamic State took advantage.[2] These days, the feature has been added to most messaging apps, such as Signal, Wickr, and even Apple’s own iMessage. Recently, Facebook’s WhatsApp[3] and Google[4] announced they will be supporting Signal’s end-to-end encryption protocol.

On personal computers, the software known as PGP,[c] first created in the mid-1990s, reigns supreme for end-to-end encryption. It converts a message (or even entire files) into encrypted text that can be copy/pasted anywhere, such as email messages, Facebook posts, or forum posts. There is no difference between “military grade encryption” and the “consumer encryption” that is seen in PGP. That means individuals can post these encrypted messages publicly and even the NSA is unable to access them. There is a misconception that intelligence agencies like the NSA are able to crack any encryption. This is not true. Most encryption that is done correctly cannot be overcome unless the user makes a mistake.

Such end-to-end encryption relies upon something called public-key cryptography. Two mathematically related keys are created, such that a message encrypted by one key can only be decrypted by the other. This allows one key to be made public so that one’s interlocutor can use it to encrypt messages that the intended recipient can decrypt through the private-key.[d] Al-Qa`ida’s Inspire magazine, for example, publishes its public-key[5] so that anyone using PGP can use it to encrypt a message that only the publishers of the magazine can read.

Full Device Encryption
If an individual loses his iPhone, for example, his data should be safe from criminals.[e] Only governments are likely to have the resources to crack the phone by finding some strange vulnerability. The FBI reportedly paid a private contractor close to $1 million to unlock the iPhone of San Bernardino terrorist Syed Rizwan Farook.[6]

The reason an iPhone is secure from criminals is because of full device encryption, also full disk encryption. Not only is all of the data encrypted, it is done in a way that is combined or entangled[7] with the hardware. Thus, the police cannot clone the encrypted data, then crack it offline using supercomputers to “brute-force” guess all possible combinations of the passcode. Instead, they effectively have to ask the phone to decrypt itself, which it will do but slowly, defeating cracking.[f]

Android phones work in much the same manner. However, most manufacturers put less effort into securing their phones than Apple. Exceptions are companies like Blackphone, which explicitly took extra care to secure their devices.

Full disk encryption is also a feature of personal computers. Microsoft Windows comes with BitLocker, Macintosh comes with FileVault, and Linux comes with LUKS. The well-known disk encryption software TrueCrypt works with all three operating systems as does a variation of PGP called PGPdisk. Some computers come with a chip called a TPM[g] that can protect the password from cracking, but most owners do not use a TPM. This means that unless they use long/complex passwords, adversaries will be able to crack their passwords.

Belgium Warnings of Imminent Terror Attacks

      FBL-EURO-2016-SECURITY-FAN-ZONE

By AFP Belgium, France face ‘imminent’ terror attacks — report

A Belgian soldier patrols the shopping centre City2 in central Brussels, Belgium, on Wednesday (Reuters photo)

JordanTimes: BRUSSELS — A fresh wave of Daesh terror group’s militants has left Syria and could commit attacks imminently in France and Belgium, Belgian police have been warned, according to media reports on Wednesday.

“Fighters traveling without passports left Syria about a week and a half  ago in order to reach Europe by boat via Turkey and Greece,” a memo sent to police and security services across Belgium said, according to La Derniere Heure newspaper.

The militants were traveling armed and plan to carry out attacks in groups of two the memo is reported to have said.

Their action is imminent,” the memo added, without giving the total of suspected attackers.

Belgium’s OCAM national crisis centre in a statement did not deny the report, but said the information needed to be looked at further.

The information reported by the media “is non-contextualised and, as such, has not made a direct impact on the current level of threat” in Belgium.

Belgium’s terror alert is currently at the second-highest level of three, which means a threat is possible and likely.

Belgium is still reeling from Daesh suicide bombings at Brussels airport and on the city’s metro on March 22 which killed 32 people and wounded hundreds more.

They came five months after militants, many of them from Brussels, carried out gun and bombing attacks in Paris on November 13, killing 130 people and wounding hundreds more.

France, which is hosting the Euro 2016 football championships, is on maximum alert after an assailant previously convicted for jihadism killed a police officer and his partner on Monday.

The attacker told police negotiators before being gunned down that he had sworn loyalty to Daesh three weeks earlier.

It was not immediately clear how seriously French and Belgian authorities were treating the threat. French authorities told local newspapers that such warnings are relatively common.

“According to the information received, these people could already in be in possession of the necessary weapons and their action could be imminent,” the alert said, according to the Belgian Dernière Heure newspaper.

The attackers were expected to split into two groups, one heading toward France and the other toward Belgium, and to conduct attacks in pairs, the alert said. It offered no details on the basis of the information.

Belgian counterterrorism police declined to comment. Belgium’s security threat coordination center has not raised its threat level, which is currently set at three out of four levels, with the fourth being the expectation of an imminent attack.

The group was planning to travel from Syria into Europe via boat from Turkey to Greece, without passports, according to the alert.

Possible Belgian targets include a Brussels shopping center, an American fast-food chain and a police station, the newspaper reported.

On Monday, an attacker claiming loyalty to the Islamic State killed a police captain and his partner, who worked at a police department outside Paris. The assailant was killed in a police raid.

Amid numerous public memorials for the slain couple, President François Hollande called for international unity to face a “long war” against terrorism.

This battle, he said in an address at the Elysee Palace, is “not just in a few countries but in the world. Everyone can be concerned.”

In an interview on France Inter radio, French Prime Minister Manuel Valls predicted the fight could take decades.

“Other innocent people will die,” Valls said. “It is very hard to say. People can accuse me — and I completely understand — of making the society even more fearful than it already is today with these events. But, unfortunately, this is the reality. It will take a generation.”

Officials added that it was unclear whether there was any link to the murder of a senior policeman and his partner on Monday by a man who pledged allegiance to IS.

For DHS, Terror Attacks are Really Just Violent Extremism

  

Press Release

June 15, 2016 — In December 2015, I announced the revision of the Department of Homeland Security’s National Terrorism Advisory System, or “NTAS,” to include an intermediate level NTAS “Bulletin.” We then issued a new NTAS Bulletin at the same time. The duration of the December Bulletin was six months, and expires tomorrow.

June 15, 2016

National Terrorism Advisory System Bulletin

Date Issued:  Wednesday, June 15, 2016
View as PDF:  National Terrorism Advisory System Bulletin – June 15, 2016 (pdf, 1 page, 876.65KB)

Summary

In December, we described a new phase in the global threat environment, which has implications on the homeland. This basic assessment has not changed. In this environment, we are particularly concerned about homegrown violent extremists who could strike with little or no notice. The tragic events of Orlando several days ago reinforce this. Accordingly, increased public vigilance and awareness continue to be of utmost importance. This bulletin has a five-month duration and will expire just before the holiday season. We will reassess the threats of terrorism at that time.

Duration

Issued:  June 15, 2016
Expires:  November 15, 2016

Details

  • Since issuing the first Bulletin in December, our concerns that violent extremists could be inspired to conduct attacks inside the U.S. have not diminished.
  • Though we know of no intelligence that is both specific and credible at this time of a plot by terrorist organizations to attack the homeland, the reality is terrorist-inspired individuals have conducted, or attempted to conduct, attacks in the United States.
  • DHS is especially concerned that terrorist-inspired individuals and homegrown violent extremists may be encouraged or inspired to target public events or places.
  • As we saw in the attacks in San Bernardino, Paris, Brussels, and, most recently, Orlando, terrorists will consider a diverse and wide selection of targets for attacks.
  • Terrorist use of the Internet to inspire individuals to violence or join their ranks remains a major source of concern.
  • In the current environment, DHS is also concerned about threats and violence directed at particular communities and individuals across the country, based on perceived religion, ethnicity, nationality or sexual orientation.

U.S. Government Counterterrorism Efforts

  • DHS and the FBI continue to provide guidance to state and local partners on increased security measures.  The public may observe an increased law enforcement and security presence across communities, in public places and at events in the months ahead. This may include additional restrictions and searches on bags, more K-9 teams, and the use of screening technologies.
  • The FBI is investigating potential terrorism-related activities associated with this broad threat throughout the United States.  Federal, state, and local authorities are coordinating numerous law enforcement actions and conducting community outreach to address this evolving threat.

Types of Advisories

Bulletin

Describes current developments or general trends regarding threats of terrorism.

Elevated Alert

Warns of a credible terrorism threat against the United States.

Imminent Alert

Warns of a credible, specific and impending terrorism threat against the United States.

How You Can Help

  • Report suspicious activity to local law enforcement or public safety officials who are best positioned to respond and offer specific details on terroristic indicators.
  • Suspicious activity or information about a threat may also be reported to Fusion Centers and the FBI’s Field Offices – part of the Nationwide Suspicious Activity Reporting Initiative.
  • Learn how to recognize signs of pre-operational planning associated with terrorism or other criminal activity.

Be Prepared

  • Be prepared for increased security and plan ahead to anticipate delays and restricted/prohibited items.
  • In populated places, be responsible for your personal safety. Make a mental note of emergency exits and locations of the nearest security personnel. Keep cell phones in your pockets instead of bags or on tables so you don’t lose them during an incident. Carry emergency contact details and any special needs information with you at all times. For more visit Ready.

Stay Informed

  • The U.S. Government will provide additional information about any emerging threat as additional information is identified. The public is encouraged to listen to local law enforcement and public safety officials.
  • We urge Americans to continue to travel, attend public events, and freely associate with others but remain vigilant and aware of surroundings.
  • The Department of State issues international travel alerts and warnings.

If You See Something, Say Something™. Report suspicious activity to local law enforcement or call 911.

Guccifer 2.0, the Hacked Trump Files from the DNC

The intrusions at the DNC are noteworthy for the sophistication of the groups behind it. One of the intrusions, by a well-known cyberespionage group called Cozy Bear, appears to have happened in the summer of 2015, according to Crowdstrike‘s CTO and co-founder Dmitri Alperovitch. The second breach, involving another Russian group, Fancy Bear, happened in April this year.

Cozy Bear has been previously associated with attacks on the White House and the US. State Department. The group has also been tied to numerous attacks on US defense contractors, government agencies, financial services companies, technology firms and think tanks, Alperovich said.  Fancy Bear, or Sofacy, as the group is also known, is similarly believed responsible for targeted attacks on various government and private sector organizations in multiple countries including the US, Canada, China and Japan, he said.

The two groups did not appear to be collaborating with each other or communicating in any fashion on the DNC attacks. But both targeted the same systems and the same data, employing a variety of sophisticated techniques in the process Crowdstrike’s CTO and co-founder Dmitri Alperovitch said in a blog post.

The Cozy Bear team used a Python-based malware tool dubbed SeaDaddy and another backdoor in Powershell to gain persistence on comprised DNC systems and to remain undetected on them for more than a year. According to Alperovitch, the Powershell backdoor was noteworthy for its use of a one-line command to establish an encrypted connection with command and control servers and for downloading additional modules.

The Fancy Bear group meanwhile used a different malware sample to remotely execute malicious commands on compromised DNC systems, to transmit files and to enable keylogging. The group deployed tactics like periodically clearing event logs and resetting the timestamps in files in an attempt to conceal their activities. More details here from DarkReading.

Gawker: A 200+ page document that appears to be a Democratic anti-Trump playbook compiled by the Democratic National Committee has leaked online following this week’s report that the DNC was breached by Russian hackers. In it, Trump is pilloried as a “bad businessman” and “misogynist in chief.”

The document—which according to embedded metadata was created by a Democratic strategist named Warren Flood—was created on December 19th, 2015, and forwarded to us by an individual calling himself “Guccifer 2.0,” a reference to the notorious, now-imprisoned Romanian hacker who hacked various American political figures in 2013.

The package forwarded to us also contained a variety of donor registries and other strategy files, “just a few docs from many thousands I extracted when hacking into DNC’s network,” the purported hacker claimed over email, adding that he’s in possession of “about 100 Gb of data including financial reports, donors’ lists, election programs, action plans against Republicans, personal mails, etc.”

Advertisement

His stated motive is to be “a fighter against all those illuminati that captured our world.”

The enormous opposition document, titled simply “Donald Trump Report,” appears to be a summary of the Democratic Party’s strategy for delegitimizing and undermining Trump’s presidential aspirations—at least as they existed at the end of last year, well before he unseated a field of establishment Republicans and clinched the nomination. A section titled “Top Narratives” describes a seven-pronged attack on Trump’s character and record.

Sponsored

The first is the argument that “Trump has no core”:

One thing is clear about Donald Trump, there is only one person he has ever looked out for and that’s himself. Whether it’s American workers, the Republican Party, or his wives, Trump’s only fidelity has been to himself and with that he has shown that he has no problem lying to the American people. Trump will say anything and do anything to get what he wants without regard for those he harms.

Second, that Trump is running a “divisive and offensive campaign”:

There’s no nice way of saying it – Donald Trump is running a campaign built on fear-mongering, divisiveness, and racism. His major policy announcements have included banning all Muslims from entering the U.S., and calling Mexican immigrants “rapists” and “drug dealers” while proposing a U.S.-Mexico border wall. And Trump’s campaign rallies have become a reflection of the hateful tone of his campaign, with protestors being roughed up and audience members loudly calling for violence.

Third, Trump is a “bad businessman”:

Despite Trump’s continual boasting about his business success, he has repeatedly run into serious financial crises in his career and his record raises serious questions about whether he is qualified to manage the fiscal challenges facing this country. Trump’s business resume includes a long list of troubling issues, including his company’s record of forcing people from their homes to make room for developments and outsourcing the manufacturing of his clothing line to take advantage of lower-wage countries like China and Mexico. His insight about the marketplace has proven wrong many times, including in the run-up to the Great Recession. And Trump’s record of irresponsible and reckless borrowing to build his empire – behavior that sent his companies into bankruptcy four times – is just one indication of how out-of-touch he is with the way regular Americans behave and make a living, and it casts doubt on whether he has the right mindset to tackle the country’s budget problems.

Fourth, Trump espouses “dangerous & irresponsible policies”:

Trump’s policies – if you can call them that – are marked by the same extreme and irresponsible thinking that shape his campaign speeches. There is no question that Donald Trump’s rhetoric is dangerous – but his actual agenda could be a catastrophe.

Fifth, in classically corny Democratic Party style, Donald Trump is the “misogynist in chief”:

Through both his words and actions, Trump has made clear he thinks women’s primary role is to please men. Trump’s derogatory and degrading comments to and about women, as well as his tumultuous marriages, have been well publicized. And as a presidential candidate, Trump has adopted many of the backwards GOP policies that we’ve come to expect from his party.

Sixth, Donald Trump is an “out of touch” member of the elite:

Trump’s policies clearly reflect his life as a 1-percenter. His plans would slash taxes for the rich and corporations while shifting more of the burden to the shoulders of working families. He stands with Republicans in opposing Wall Street reform and opposing the minimum wage. Trump clearly has no conception of the everyday lives of middle class Americans. His description of the “small” $1 million loan that his father gave him to launch his career is proof enough that his worldview is not grounded in reality.

The seventh strategy prong is to focus on Trump’s “personal life,” including that “Trump’s Ex-Wife Accused Him Of Rape,” which is true.

What follows is roughly two hundred pages of dossier-style background information, instances of Trump dramatically changing his stance on a litany of issues, and a round-up of the candidate’s most inflammatory and false statements (as of December ‘15, at least).

It appears that virtually all of the claims are derived from published sources, as opposed to independent investigations or mere rumor. It’s also very light on anything that could be considered “dirt,” although Trump’s colorful marital history is covered extensively:

The DNC hack was first revealed Tuesday, when the cybersecurity firm CrowdStrike announced it had discovered two hacking collectives, linked to Russian intelligence, inside the DNC network after the DNC reported a suspected breach. In a blog post, the company identified the groups as “COZY BEAR” and “FANCY BEAR”—two “sophisticated adversaries” that “engage in extensive political and economic espionage for the benefit of the government of the Russian Federation.”

The hackers were able to access opposition files and may have been able to read email and chat traffic, but did not touch any financial, donor, or personal information, the DNC said Tuesday. However, the user who sent the files to Gawker refuted that claim, writing, “DNC chairwoman Debbie Wasserman Schultz said no financial documents were compromised. Nonsense! Just look through the Democratic Party lists of donors! They say there were no secret docs! Lies again! Also I have some secret documents from Hillary’s PC she worked with as the Secretary of State.”

Among the files sent to Gawker are what appear to be several lists of donors, including email addresses and donation amounts, grouped by wealth and specific fundraising events. Gawker has not yet been able to verify that the Trump file was produced by the DNC, but we have been able to independently verify that the financial documents were produced by people or groups affiliated with the Democratic Party.

Also included are memos marked “confidential” and “secret” that appear to date back to 2008, and pertain to Obama’s transition into the White House, and a file marked “confidential” containing Hillary’s early talking points, at least some of which ended up being repeated verbatim in her April, 2015 candidacy announcement.

Finally, there is a May, 2015 memo outlining a proposed strategy against the field of potential GOP candidates. Donald Trump, who had not yet officially announced his candidacy, does not appear in the document.

The purported hacker writes “it was easy, very easy” to hack and extract thousands of files from the DNC network, “the main part” of which he or she claims are in the custody of Wikileaks. He or she also appears to have sent the documents to The Smoking Gun, which posted about the dossier earlier today.

Warren Flood did not immediately return a request for comment. DNC Press Secretary Mark Paustenbach was not able to immediately confirm the authenticity of the documents, but the party is aware that they’re circulating.

Official List of Bilderberg Meeting/Topics

2016 Bilderberg Meeting

Dresden, Germany 9-12 June
Final list of Participants

 

CHAIRMAN
Castries, Henri de (FRA), Chairman and CEO, AXA Group

Aboutaleb, Ahmed (NLD), Mayor, City of Rotterdam
Achleitner, Paul M. (DEU), Chairman of the Supervisory Board, Deutsche Bank AG
Agius, Marcus (GBR), Chairman, PA Consulting Group
Ahrenkiel, Thomas (DNK), Permanent Secretary, Ministry of Defence
Albuquerque, Maria Luís (PRT), Former Minister of Finance; MP, Social Democratic Party
Alierta, César (ESP), Executive Chairman and CEO, Telefónica
Altman, Roger C. (USA), Executive Chairman, Evercore
Altman, Sam (USA), President, Y Combinator
Andersson, Magdalena (SWE), Minister of Finance
Applebaum, Anne (USA), Columnist Washington Post; Director of the Transitions Forum, Legatum Institute
Apunen, Matti (FIN), Director, Finnish Business and Policy Forum EVA
Aydin-Düzgit, Senem (TUR), Associate Professor and Jean Monnet Chair, Istanbul Bilgi University
Barbizet, Patricia (FRA), CEO, Artemis
Barroso, José M. Durão (PRT), Former President of the European Commission
Baverez, Nicolas (FRA), Partner, Gibson, Dunn & Crutcher
Bengio, Yoshua (CAN), Professor in Computer Science and Operations Research, University of Montreal
Benko, René (AUT), Founder and Chairman of the Advisory Board, SIGNA Holding GmbH
Bernabè, Franco (ITA), Chairman, CartaSi S.p.A.
Beurden, Ben van (NLD), CEO, Royal Dutch Shell plc
Blanchard, Olivier (FRA), Fred Bergsten Senior Fellow, Peterson Institute
Botín, Ana P. (ESP), Executive Chairman, Banco Santander
Brandtzæg, Svein Richard (NOR), President and CEO, Norsk Hydro ASA
Breedlove, Philip M. (INT), Former Supreme Allied Commander Europe
Brende, Børge (NOR), Minister of Foreign Affairs
Burns, William J. (USA), President, Carnegie Endowment for International Peace
Cebrián, Juan Luis (ESP), Executive Chairman, PRISA and El País
Charpentier, Emmanuelle (FRA), Director, Max Planck Institute for Infection Biology
Coeuré, Benoît (INT), Member of the Executive Board, European Central Bank
Costamagna, Claudio (ITA), Chairman, Cassa Depositi e Prestiti S.p.A.
Cote, David M. (USA), Chairman and CEO, Honeywell
Cryan, John (DEU), CEO, Deutsche Bank AG
Dassù, Marta (ITA), Senior Director, European Affairs, Aspen Institute
Dijksma, Sharon A.M. (NLD), Minister for the Environment
Döpfner, Mathias (DEU), CEO, Axel Springer SE
Dyvig, Christian (DNK), Chairman, Kompan
Ebeling, Thomas (DEU), CEO, ProSiebenSat.1
Elkann, John (ITA), Chairman and CEO, EXOR; Chairman, Fiat Chrysler Automobiles
Enders, Thomas (DEU), CEO, Airbus Group
Engel, Richard (USA), Chief Foreign Correspondent, NBC News
Fabius, Laurent (FRA), President, Constitutional Council
Federspiel, Ulrik (DNK), Group Executive, Haldor Topsøe A/S
Ferguson, Jr., Roger W. (USA), President and CEO, TIAA
Ferguson, Niall (USA), Professor of History, Harvard University
Flint, Douglas J. (GBR), Group Chairman, HSBC Holdings plc
Garicano, Luis (ESP), Professor of Economics, LSE; Senior Advisor to Ciudadanos
Georgieva, Kristalina (INT), Vice President, European Commission
Gernelle, Etienne (FRA), Editorial Director, Le Point
Gomes da Silva, Carlos (PRT), Vice Chairman and CEO, Galp Energia
Goodman, Helen (GBR), MP, Labour Party
Goulard, Sylvie (INT), Member of the European Parliament
Graham, Lindsey (USA), Senator
Grillo, Ulrich (DEU), Chairman, Grillo-Werke AG; President, Bundesverband der Deutschen Industrie
Gruber, Lilli (ITA), Editor-in-Chief and Anchor “Otto e mezzo”, La7 TV
Hadfield, Chris (CAN), Colonel, Astronaut
Halberstadt, Victor (NLD), Professor of Economics, Leiden University
Harding, Dido (GBR), CEO, TalkTalk Telecom Group plc
Hassabis, Demis (GBR), Co-Founder and CEO, DeepMind
Hobson, Mellody (USA), President, Ariel Investment, LLC
Hoffman, Reid (USA), Co-Founder and Executive Chairman, LinkedIn
Höttges, Timotheus (DEU), CEO, Deutsche Telekom AG
Jacobs, Kenneth M. (USA), Chairman and CEO, Lazard
Jäkel, Julia (DEU), CEO, Gruner + Jahr
Johnson, James A. (USA), Chairman, Johnson Capital Partners
Jonsson, Conni (SWE), Founder and Chairman, EQT
Jordan, Jr., Vernon E. (USA), Senior Managing Director, Lazard Frères & Co. LLC
Kaeser, Joe (DEU), President and CEO, Siemens AG
Karp, Alex (USA), CEO, Palantir Technologies
Kengeter, Carsten (DEU), CEO, Deutsche Börse AG
Kerr, John (GBR), Deputy Chairman, Scottish Power
Kherbache, Yasmine (BEL), MP, Flemish Parliament
Kissinger, Henry A. (USA), Chairman, Kissinger Associates, Inc.
Kleinfeld, Klaus (USA), Chairman and CEO, Alcoa
Kravis, Henry R. (USA), Co-Chairman and Co-CEO, Kohlberg Kravis Roberts & Co.
Kravis, Marie-Josée (USA), Senior Fellow, Hudson Institute
Kudelski, André (CHE), Chairman and CEO, Kudelski Group
Lagarde, Christine (INT), Managing Director, International Monetary Fund
Levin, Richard (USA), CEO, Coursera
Leyen, Ursula von der (DEU), Minister of Defence
Leysen, Thomas (BEL), Chairman, KBC Group
Logothetis, George (GRC), Chairman and CEO, Libra Group
Maizière, Thomas de (DEU), Minister of the Interior, Federal Ministry of the Interior
Makan, Divesh (USA), CEO, ICONIQ Capital
Malcomson, Scott (USA), Author; President, Monere Ltd.
Markwalder, Christa (CHE), President of the National Council and the Federal Assembly
McArdle, Megan (USA), Columnist, Bloomberg View
Michel, Charles (BEL), Prime Minister
Micklethwait, John (USA), Editor-in-Chief, Bloomberg LP
Minton Beddoes, Zanny (GBR), Editor-in-Chief, The Economist
Mitsotakis, Kyriakos (GRC), President, New Democracy Party
Morneau, Bill (CAN), Minister of Finance
Mundie, Craig J. (USA), Principal, Mundie & Associates
Murray, Charles A. (USA), W.H. Brady Scholar, American Enterprise Institute
Netherlands, H.M. the King of the (NLD)
Noonan, Michael (IRL), Minister for Finance
Noonan, Peggy (USA), Author, Columnist, The Wall Street Journal
O’Leary, Michael (IRL), CEO, Ryanair Plc
Ollongren, Kajsa (NLD), Deputy Mayor of Amsterdam
Özel, Soli (TUR), Professor, Kadir Has University
Papalexopoulos, Dimitri (GRC), CEO, Titan Cement Co.
Petraeus, David H. (USA), Chairman, KKR Global Institute
Philippe, Edouard (FRA), Mayor of Le Havre
Pind, Søren (DNK), Minister of Justice
Ratti, Carlo (ITA), Director, MIT Senseable City Lab
Reisman, Heather M. (CAN), Chair and CEO, Indigo Books & Music Inc.
Rutte, Mark (NLD), Prime Minister
Sawers, John (GBR), Chairman and Partner, Macro Advisory Partners
Schäuble, Wolfgang (DEU), Minister of Finance
Schieder, Andreas (AUT), Chairman, Social Democratic Group
Schmidt, Eric E. (USA), Executive Chairman, Alphabet Inc.
Scholten, Rudolf (AUT), CEO, Oesterreichische Kontrollbank AG
Schwab, Klaus (INT), Executive Chairman, World Economic Forum
Sikorski, Radoslaw (POL), Senior Fellow, Harvard University; Former Minister of Foreign Affairs
Simsek, Mehmet (TUR), Deputy Prime Minister
Sinn, Hans-Werner (DEU), Professor for Economics and Public Finance, Ludwig Maximilian University of Munich
Skogen Lund, Kristin (NOR), Director General, The Confederation of Norwegian Enterprise
Standing, Guy (GBR), Co-President, BIEN; Research Professor, University of London
Svanberg, Carl-Henric (SWE), Chairman, BP plc and AB Volvo
Thiel, Peter A. (USA), President, Thiel Capital
Tillich, Stanislaw (DEU), Minister-President of Saxony
Vetterli, Martin (CHE), President, NSF
Wahlroos, Björn (FIN), Chairman, Sampo Group, Nordea Bank, UPM-Kymmene Corporation
Wallenberg, Jacob (SWE), Chairman, Investor AB
Weder di Mauro, Beatrice (CHE), Professor of Economics, University of Mainz
Wolf, Martin H. (GBR), Chief Economics Commentator, Financial Times

Press Release

The 64th Bilderberg meeting is set to take place from 9 – 12 June 2016 in Dresden, Germany. A total of around 130 participants from 20 countries have confirmed their attendance. As ever, a diverse group of political leaders and experts from industry, finance, academia and the media have been invited. The list of participants is available on www.bilderbergmeetings.org.

The key topics for discussion this year include:

Current events
China
Europe: migration, growth, reform, vision, unity
Middle East
Russia
US political landscape, economy: growth, debt, reform
Cyber security
Geo-politics of energy and commodity prices
Precariat and middle class
Technological innovation

Founded in 1954, the Bilderberg conference is an annual meeting designed to foster dialogue between Europe and North America. Every year, between 120-150 political leaders and experts from industry, finance, academia and the media are invited to take part in the conference. About two thirds of the participants come from Europe and the rest from North America; approximately one third from politics and government and the rest from other fields.

   

The conference is a forum for informal discussions about major issues facing the world. The meetings are held under the Chatham House Rule, which states that participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s) nor any other participant may be revealed.

Thanks to the private nature of the conference, the participants are not bound by the conventions of their office or by pre-agreed positions. As such, they can take time to listen, reflect and gather insights. There is no desired outcome, no minutes are taken and no report is written. Furthermore, no resolutions are proposed, no votes are taken, and no policy statements are issued.