He is Missing, Bank Hack of $90 Billion

HackerNews: Tanvir Hassan Zoha, a 34-year-old security researcher, who spoke to media on the $81 Million Bangladesh Bank cyber theft, has gone missing since Wednesday night, just days after accusing Bangladesh’s central bank officials of negligence.

Zoha was investigating a recent cyber attack on Bangladesh’s central bank that let hackers stole $81 Million from the banks’ Federal Reserve bank account.
Though the hackers tried to steal $1 Billion from the bank, a simple typo prevented the full heist.
During his investigation, Zoha believed the Hackers, who are still unknown, had installed Malware on the bank’s computer systems few weeks before the heist that allowed them to obtain credentials needed for payment transfers.
With the help of those credentials, the unknown hackers transferred large sums from Bangladesh’s United States account to fraudulent accounts based in the Philippines and Sri Lanka.
However, at the same time, Zoha accused senior officials at Bangladesh central bank of gross negligence and weak security procedures that eventually facilitated the largest bank heist in the country.
The Central bank’s governor Atiur Rahman, along with two of his deputy governors, had to quit his job over the scandal, hugely embarrassing the government and raising alarm over the security of Bangladesh’s foreign exchange reserves of over US$27 Billion.
However, when the investigation was still going on, Zoha disappeared Wednesday night, while coming home with one of his friends, according to sources close to Zoha’s family.
While speaking to media in the wake of the massive cyber attack, Zoha identified himself as the ICT (Information and Communication Technology) Division’s cyber security expert who had worked with various government agencies in the past.
Soon after Zoha’s disappearance, the government officials put out a statement but did not provide more details besides the fact that they opened an investigation.

Zoha’s family members suspect that the comments Zoha made about the carelessness of bank’s officials on the Bank heist to the press on March 11 are the cause of his disappearance.
***
(Reuters) – The SWIFT messaging system plans to ask banks to make sure they are following recommended security practices following an unprecedented cyber attack on Bangladesh’s central bank that yielded $81 million, a spokeswoman for the group told Reuters on Sunday.

Brussels-based SWIFT, a cooperative owned by some 3,000 global financial institutions, will issue a written warning on Monday asking banks to review internal security, the spokeswoman said.

SWIFT staff will also begin calling banks to highlight the importance of reviewing security measures after the attack in Bangladesh, she added.

“Our priority at this time is to encourage customers to review and, where necessary, to reinforce their local operating environments,” the spokeswoman added.

Unknown hackers breached the computer systems of Bangladesh Bank and in early February attempted to steal $951 million from its account at the Federal Reserve Bank of New York, which it uses for international settlements. Some attempted transfers were blocked, but $81 million was transferred to accounts in the Philippines in one of the largest cyber heists in history.

SWIFT has so far said little about the attack, except that it was related to “an internal operational issue” at Bangladesh Bank and that there was no compromise in its core messaging system.

SWIFT prepared a summary of previously issued recommendations for implementing security measures to thwart hackers, which advises members to pay close attention to best practices, the spokeswoman added.

A confidential interim report on the investigation, which forensics experts submitted to the bank on Wednesday, said that attackers took control of the bank’s network, stole credentials for sending SWIFT messages and used “sophisticated” malicious software to attack the computers it uses to process and authorize transactions.

Investigators said in the report, which was reviewed by Reuters, that they believe the attackers have targeted other financial institutions.

The report was prepared by FireEye Inc and World Informatix, which were hired by Bangladesh’s central bank to investigate the massive theft.

The investigators did not identify other victims or name the hackers, but said that forensic evidence suggests they were also behind other recent cyber attacks on financial institutions.

“FireEye has observed these same suspected FIN threat actors within other customer networks in the financial industry, where these threat actors appear to be financially motivated, and well organized,” said an interim report sent to the bank last week.

Representatives of Bangladesh Bank and FireEye declined to comment on the confidential report and their probe into the Feb. 4 heist.

World Informatix Chief Executive Rakesh Asthana told Reuters via email that he could not discuss the investigation, but that he expected Bangladesh Bank to issue a news release on Monday.

Details from the confidential report were previously reported by Bloomberg News and a Bangladesh publication, The Daily Star.

Did Hillary Give Sid her Sign-in Credentials?

Just askin…..there is an intelligence war with Hillary behind the curtains…..how did Sidney Blumenthal, the leader of Hillary’s personal global spy team get exact text from the NSA? Further, how come he had to give it to Hillary…she could have signed in herself…or could she?

Hundreds of questions and a brewing intersection with the whole intelligence community….

Hillary Has an NSA Problem

The FBI has been investigating Clinton for months—but an even more secretive Federal agency has its own important beef with her

Schindler: For a year now, Hillary Clinton’s misuse of email during her tenure as secretary of state has hung like a dark cloud over her presidential campaign. As I told you months ago, email-gate isn’t going away, despite the best efforts of Team Clinton to make it disappear. Instead, the scandal has gotten worse, with never-ending revelations of apparent misconduct by Ms. Clinton and her staff. At this point, email-gate may be the only thing standing between Ms. Clinton and the White House this November.

Specifically, the Federal Bureau of Investigation examination of email-gate, pursuant to provisions of the Espionage Act, poses a major threat to Ms. Clinton’s presidential aspirations. However, even if the FBI recommends prosecution of her or members of her inner circle for mishandling of classified information—which is something the politically unconnected routinely do face prosecution for—it’s by no means certain that the Department of Justice will follow the FBI’s lead.

What the DoJ decides to do with email-gate is ultimately a question of politics as much as justice. Ms. Clinton’s recent statement on her potential prosecution, “it’s not going to happen,” then refusing to address the question at all in a recent debate, led to speculation about a backroom deal with the White House to shield Ms. Clinton from prosecution as long as Mr. Obama is in the Oval Office. After mid-January, however, all bets would be off. In that case, winning the White House herself could be an urgent matter of avoiding prosecution for Ms. Clinton.

That said, if the DoJ declines to prosecute after the Bureau recommends doing so, a leak-fest of a kind not seen in Washington, D.C., since Watergate should be anticipated. The FBI would be angry that its exhaustive investigation was thwarted by dirty deals between Democrats. In that case, a great deal of Clintonian dirty laundry could wind up in the hands of the press, habitual mainstream media covering for the Clintons notwithstanding, perhaps having a major impact on the presidential race this year.

The FBI isn’t the only powerful federal agency that Hillary Clinton needs to worry about as she plots her path to the White House between scandals and leaks. For years, she has been on the bad side of the National Security Agency, America’s most important intelligence agency, as revealed by just-released State Department documents obtained by Judicial Watch under the Freedom of Information Act.

‘What did she not want put on a government system, where security people might see it? I sure wish I’d asked about it back in 2009.’

The documents, though redacted, detail a bureaucratic showdown between Ms. Clinton and NSA at the outset of her tenure at Foggy Bottom. The new secretary of state, who had gotten “hooked” on her Blackberry during her failed 2008 presidential bid, according to a top State Department security official, wanted to use that Blackberry anywhere she went.

That, however, was impossible, since Secretary Clinton’s main office space at Foggy Bottom was actually a Secure Compartment Information Facility, called a SCIF (pronounced “skiff”) by insiders. A SCIF is required for handling any Top Secret-plus information. In most Washington, D.C., offices with a SCIF, which has to be certified as fully secure from human or technical penetration, that’s where you check Top-Secret email, read intelligence reports and conduct classified meetings that must be held inside such protected spaces.

But personal electronic devices—your cellphone, your Blackberry—can never be brought into a SCIF. They represent a serious technical threat that is actually employed by many intelligence agencies worldwide. Though few Americans realize it, taking remote control over a handheld device, then using it to record conversations, is surprisingly easy for any competent spy service. Your smartphone is a sophisticated surveillance device—on you, the user—that also happens to provide phone service and Internet access.

As a result, your phone and your Blackberry always need to be locked up before you enter any SCIF. Taking such items into one represents a serious security violation. And Ms. Clinton and her staff really hated that. Not even one month into the new administration in early 2009, Ms. Clinton and her inner circle were chafing under these rules. They were accustomed to having their personal Blackberrys with them at all times, checking and sending emails nonstop, and that was simply impossible in a SCIF like their new office.

This resulted in a February 2009 request by Secretary Clinton to the NSA, whose Information Assurance Directorate (IAD for short: see here for an explanation of Agency organization) secures the sensitive communications of many U.S. government entities, from Top-Secret computer networks, to White House communications, to the classified codes that control our nuclear weapons.

The contents of Sid Blumenthal’s June 8, 2011, email to Hillary Clinton—to her personal, unclassified account—were based on highly sensitive NSA information.

IAD had recently created a special, custom-made secure Blackberry for Barack Obama, another technology addict. Now Ms. Clinton wanted one for herself. However, making the new president’s personal Blackberry had been a time-consuming and expensive exercise. The NSA was not inclined to provide Secretary Clinton with one of her own simply for her convenience: there had to be clearly demonstrated need.

And that seemed dubious to IAD since there was no problem with Ms. Clinton checking her personal email inside her office SCIF. Hers, like most, had open (i.e. unclassified) computer terminals connected to the Internet, and the secretary of state could log into her own email anytime she wanted to right from her desk.

But she did not want to. Ms. Clinton only checked her personal email on her Blackberry: she did not want to sit down at a computer terminal. As a result, the NSA informed Secretary Clinton in early 2009 that they could not help her. When Team Clinton kept pressing the point, “We were politely told to shut up and color” by IAD, explained the state security official.

The State Department has not released the full document trail here, so the complete story remains unknown to the public. However, one senior NSA official, now retired, recalled the kerfuffle with Team Clinton in early 2009 about Blackberrys. “It was the usual Clinton prima donna stuff,” he explained, “the whole ‘rules are for other people’ act that I remembered from the ’90s.” Why Ms. Clinton would not simply check her personal email on an office computer, like every other government employee less senior than the president, seems a germane question, given what a major scandal email-gate turned out to be. “What did she not want put on a government system, where security people might see it?” the former NSA official asked, adding, “I wonder now, and I sure wish I’d asked about it back in 2009.”

He’s not the only NSA affiliate with pointed questions about what Hillary Clinton and her staff at Foggy Bottom were really up to—and why they went to such trouble to circumvent federal laws about the use of IT systems and the handling of classified information. This has come to a head thanks to Team Clinton’s gross mishandling of highly classified NSA intelligence.

As I explained in this column in January, one of the most controversial of Ms. Clinton’s emails released by the State Department under judicial order was one sent on June 8, 2011, to the Secretary of State by Sidney Blumenthal, Ms. Clinton’s unsavory friend and confidant who was running a private intelligence service for Ms. Clinton. This email contains an amazingly detailed assessment of events in Sudan, specifically a coup being plotted by top generals in that war-torn country. Mr. Blumenthal’s information came from a top-ranking source with direct access to Sudan’s top military and intelligence officials, and recounted a high-level meeting that had taken place only 24 hours before.

To anybody familiar with intelligence reporting, this unmistakably signals intelligence, termed SIGINT in the trade. In other words, Mr. Blumenthal, a private citizen who had enjoyed no access to U.S. intelligence for over a decade when he sent that email, somehow got hold of SIGINT about the Sudanese leadership and managed to send it, via open, unclassified email, to his friend Ms. Clinton only one day later.

NSA officials were appalled by the State Department’s release of this email, since it bore all the hallmarks of Agency reporting. Back in early January when I reported this, I was confident that Mr. Blumenthal’s information came from highly classified NSA sources, based on my years of reading and writing such reports myself, and one veteran agency official told me it was NSA information with “at least 90 percent confidence.”

Now, over two months later, I can confirm that the contents of Sid Blumenthal’s June 8, 2011, email to Hillary Clinton, sent to her personal, unclassified account, were indeed based on highly sensitive NSA information. The agency investigated this compromise and determined that Mr. Blumenthal’s highly detailed account of Sudanese goings-on, including the retelling of high-level conversations in that country, was indeed derived from NSA intelligence.

Specifically, this information was illegally lifted from four different NSA reports, all of them classified “Top Secret / Special Intelligence.” Worse, at least one of those reports was issued under the GAMMA compartment, which is an NSA handling caveat that is applied to extraordinarily sensitive information (for instance, decrypted conversations between top foreign leadership, as this was). GAMMA is properly viewed as a SIGINT Special Access Program, or SAP, several of which from the CIA Ms. Clinton compromised in another series of her “unclassified” emails.

Currently serving NSA officials have told me they have no doubt that Mr. Blumenthal’s information came from their reports. “It’s word-for-word, verbatim copying,” one of them explained. “In one case, an entire paragraph was lifted from an NSA report” that was classified Top Secret / Special Intelligence.

How Mr. Blumenthal got his hands on this information is the key question, and there’s no firm answer yet. The fact that he was able to take four separate highly classified NSA reports—none of which he was supposed to have any access to—and pass the details of them to Hillary Clinton via email only hours after NSA released them in Top Secret / Special Intelligence channels indicates something highly unusual, as well as illegal, was going on.

Suspicion naturally falls on Tyler Drumheller, the former CIA senior official who was Mr. Blumenthal’s intelligence fixer, his supplier of juicy spy gossip, who conveniently died last August before email-gate became front-page news. However, he, too, had left federal service years before and should not have had any access to current NSA reports.

There are many questions here about what Hillary Clinton and her staff at Foggy Bottom were up to, including Sidney Blumenthal, an integral member of the Clinton organization, despite his lack of any government position. How Mr. Blumenthal got hold of this Top Secret-plus reporting is only the first question. Why he chose to email it to Ms. Clinton in open channels is another question. So is: How did nobody on Secretary Clinton’s staff notice that this highly detailed reporting looked exactly like SIGINT from the NSA? Last, why did the State Department see fit to release this email, unredacted, to the public?

These are the questions being asked by officials at the NSA and the FBI right now. All of them merit serious examination. Their answers may determine the political fate of Hillary Clinton—and who gets elected our next president in November.

Movement from Below be Neutralized? More than Soros

Primer: Corey Lewandowski, Trump’s campaign manager is a GOP delegate from New Hampshire. Conflict much?

CNN: Donald Trump campaign manager Corey Lewandowski will be among the Republican front-runner’s delegates at the party’s national convention this summer in Cleveland.

A New Hampshire resident, Lewandowski confirmed to CNN Wednesday that he will maintain both roles at the convention. The New York Times first reported that he had listed himself among Trump’s 11 New Hampshire delegates and alternates in a signed letter to the secretary of state.

What will the coming days look like? Will all college campuses go back in history like Kent State?

I am not a supporter of Trump for several reasons as noted by previous articles on this website, however there are larger implications here. For sure conservatives and Republicans alike should never give into clandestine and nefarious people, organizations or objectives, so describe how to neutralize this and bring the whole country together….as much as possible.

Digging deeper and beyond George Soros:

Notorious Washington consultant behind anti-Trump campaign, OpenSecrets:

Donald Trump, the prohibitive favorite for the Republican presidential nomination, just added a fistful of primaries to his string of victories and knocked the GOP establishment’s favorite son, Sen. Marco Rubio (Fla.), out of the race. To beat Trump now, it seems, someone thinks it’s time to get evil.

Dr. Evil, to be exact. Washington consultant Rick Berman, whom CBS News christened with that title in 2007, runs a public relations consulting company in Washington known for deploying surreptitious tactics on behalf of major industry clients. Berman’s firm has now contracted with a group Berman runs, the Enterprise Freedom Action Committee, in connection with a $315,000 (so far) campaign against Trump waged via Google and Facebook ads.

Berman earned the Austin Powers moniker in part by deploying tactics like “shooting the messenger.” As he told CBS: “Shooting the messenger means getting people to understand that this messenger is not as credible as their name would suggest.”

In practice, that means Berman starts his own nonprofit groups with their own credible-sounding names and their donors kept secret to discredit reports about everything from the health dangers of mercury in fish to trans-fats. The strategy has the effect of distorting debates in Washington with nameless corporate money, encouraging hyperbolic misinformation that confuses voters and muddles policy debates.

Enter Donald Trump. A veritable monarch of misinformation, Trump as recently as last weekend claimed that a would-be attacker at one of his rallies had ties to Islamic State and, when pressed on the statement’s inaccuracy, replied: “All I know is what’s on the Internet.”

Berman may have met his messenger match.

A spokeswoman for Berman and Company declined to answer questions sent via email on Thursday, including this centeral one: Who, exactly, has called on the consultant’s expertise this time? Because the organization attacking Trump, Enterprise Freedom Action, is a dark money nonprofit, it never has to publicly identify the sources of its funding.

The group has several past incarnations: Since 2007, it’s been anti-union, anti-Senate Democrats and anti-Barack Obama.

In 2008, the organization hit its spending peak. With nearly $17 million in receipts that year, it laid out close to $16 million, per its tax forms. None of that, the group maintained in a filing with the IRS, was political spending. At that time, Enterprise Freedom Action primarily was buying advertisements advocating for “democratic union elections.”

It’s a hallmark of Berman’s operations for money to go from one of his organizations to another, keeping as much of it as possible in the family. Berman’s firm made $892,931 in 2008 from its work for Enterprise Freedom Action, of which Berman himself served as president and director.

This time, the firm has, so far, received only $4,800 from the nonprofit in connection with the anti-Trump campaign, and it’s unclear whether more money will follow. Political spending against Donald Trump can seem like a fool’s errand: Before Tuesday’s contest, outside groups spent about $8.7 million on TV ads attacking him in Florida, while Trump himself spent only $2.4 million in the state, according to the International Business Times — and Marco Rubio knows what happened there.

 

Declaring Genocide: Does it Mean Anything?

John Kerry and Barack Obama finally declared ‘genocide’ with regard to Islamic State but why stop with ISIS? What about Bashir al Assad but mostly what about Mahmoud Abbas? For the Obama White House, Iran certainly does not matter either.

Obama did finally declare genocide after the lawyers reviewed and advised him. But does it matter?

The Genocide Convention says it does matter.

 

In 2009, Barack Obama in Oslo accepting the Nobel Peace Prize award.

THE PRESIDENT:  Your Majesties, Your Royal Highnesses, distinguished members of the Norwegian Nobel Committee, citizens of America, and citizens of the world:

I receive this honor with deep gratitude and great humility.  It is an award that speaks to our highest aspirations — that for all the cruelty and hardship of our world, we are not mere prisoners of fate.  Our actions matter, and can bend history in the direction of justice.

And yet I would be remiss if I did not acknowledge the considerable controversy that your generous decision has generated.  (Laughter.)  In part, this is because I am at the beginning, and not the end, of my labors on the world stage.  Compared to some of the giants of history who’ve received this prize — Schweitzer and King; Marshall and Mandela — my accomplishments are slight.  And then there are the men and women around the world who have been jailed and beaten in the pursuit of justice; those who toil in humanitarian organizations to relieve suffering; the unrecognized millions whose quiet acts of courage and compassion inspire even the most hardened cynics.  I cannot argue with those who find these men and women — some known, some obscure to all but those they help — to be far more deserving of this honor than I.

But perhaps the most profound issue surrounding my receipt of this prize is the fact that I am the Commander-in-Chief of the military of a nation in the midst of two wars.  One of these wars is winding down.  The other is a conflict that America did not seek; one in which we are joined by 42 other countries — including Norway — in an effort to defend ourselves and all nations from further attacks.

Still, we are at war, and I’m responsible for the deployment of thousands of young Americans to battle in a distant land.  Some will kill, and some will be killed.  And so I come here with an acute sense of the costs of armed conflict — filled with difficult questions about the relationship between war and peace, and our effort to replace one with the other. Full speech here.

What is worse a war, nuclear weapon or genocide? Dead is dead.

May: In the Yemeni port city of Aden earlier this month, Islamists attacked a Catholic home for the indigent elderly. The militants, believed to be soldiers of the Islamic State, shot the security guard, then entered the facility where they gunned down the old people and their care-givers, including four nuns. At least 16 people were murdered. Such atrocities are no longer seen as major news events. Most diplomats regard them – or dismiss them — as “violent extremism,” a phrase that describes without explaining. On America’s campuses, “activists” are deeply concerned about “trigger warnings” and “microaggressions.” Massacres of Christians in Muslim lands, by contrast, seem to trouble them not at all. More here.

Sure they do get it right on Islamic State, when Germany is forecasted as a future target as a matter of sampling.

GateStoneInstitute:

  • Hans-Georg Maaßen, the head of Germany’s domestic intelligence agency (BfV), warned that the Islamic State was deliberately planting jihadists among the refugees flowing into Europe, and reported that the number of Salafists in Germany has now risen to 7,900. This is up from 7,000 in 2014 and 5,500 in 2013.
  • “Salafists want to establish an Islamic state in Germany.” — Hans-Georg Maaßen, director, BfV, German intelligence.
  • More than 800 German residents — 60% of whom are German passport holders — have joined the Islamic State in Syria and Iraq. Of these, roughly one-third have returned to Germany. — Federal Criminal Police Office.
  • Up to 5,000 European jihadists have returned to the continent after obtaining combat experience on the battlefields of the Middle East. — Rob Wainwright, head of Europol.

Going back to 2013: BBC: UN implicates Bashar al-Assad in Syria war crimes, “The UN’s human rights chief has said an inquiry has produced evidence that war crimes were authorised in Syria at the “highest level”, including by President Bashar al-Assad. It is the first time the UN’s human rights office has so directly implicated Mr Assad. Commissioner Navi Pillay said her office held a list of others implicated by the inquiry. The UN estimates more than 100,000 people have died in the conflict.”

 

 

Top Paris Attacker Arrested in Belgium, Alive but Wounded

Fingerprints and DNA led to clues and there is perhaps yet another Paris attacker still at large. Update, it appears all have been captured as of evening time in Belgium.

 Shot in the knee.

For a photo essay go here.

    

(CNN) Belgian police conducted a raid Friday in Brussels that ended with two suspects in custody — one of whom may be wanted Paris terror attack suspect Salah Abdeslam, a senior counter-terrorism official said.

Earlier in the day, the Belgian federal prosecutor’s office revealed the 26-year-old’s fingerprints and DNA were found in a Brussels apartment raided two days earlier. One person was killed and two people escaped that operation, according to authorities.

The man killed by a special forces sniper was Mohamed Belkaid, an Algerian who used the name Samir Bouzid, is believed to have directed the November 13 Paris attackers via calls from Belgium, according to the prosecutor’s office.

Belkaid is believed to have helped Paris suspect Salah Abdeslam travel prior to the attacks and transferred money to a female cousin of Paris ringleader Abdelhamid Abaaoud following the attack, the Belgian senior counter-terrorism official told CNN in January.

Authorities believe the 26-year-old Abdeslam was using the apartment as a hideout following the November 13 Paris attacks that left at least 130 people dead, according to the Belgian counter-terrorism official.

Salah Abdeslam is wanted after allegedly taking part in last fall's Paris terror attacks.

Up until Friday evening, the Belgian federal prosecutor’s office has only said that “the investigation continues day and night.

“It is currently not possible to give any additional information to avoid causing any damage to the investigation,” the agency said.

Belgian authorities are “not happy” that French media leaked evidence showing Abdeslam was in the Brussels apartment raided this week, Belgium Federal Prosecutor Eric Van Der Sijpt said Friday.

Investigators think Abdeslam may have been the driver of a black Renault Clio that dropped off three suicide bombers near the Stade de France, one of the attack sites. They also believe he had worn a suicide belt found on a Paris street after the attacks.

He is believed to have called friends to take him to Belgium after the attacks. They passed through police checkpoints, but Abdeslam had not yet been identified as a suspect and they were allowed to continue on their way.

Surveillance video emerged of him and another man at a gas station near the Belgian border the day after the attacks.

He has eluded authorities ever since.

In January, authorities found traces of explosives and Abdeslam’s fingerprints in another Brussels apartment.

Some theories have suggested he had returned to Syria following the attacks.

Abdeslam, a Belgian-born French citizen, is the brother of another attacker, Ibrahim Abdeslam. He was a French citizen believed to have been the suicide bomber who detonated explosives outside a cafe on Boulevard Voltaire.