Trifecta of Intel Chaos, Shadow Brokers, Wikileaks, NSA

photo

WikiLeaks announces “Vault 8”

Those releases were part of a series of leaks WikiLeaks called Vault 7. Now, WikiLeaks says Hive is just the first of a long string of similar releases, a series WikiLeaks calls Vault 8, which will consist of source code for tools previously released in the Vault 7 series.

The WikiLeaks announcement has sent shivers up the spines of infosec experts everywhere, as it reminded them of April this year when a hacking group named The Shadow Brokers published cyber-weapons allegedly stolen from the NSA.

Some of the tools included in that release have been incorporated in many malware families and have been at the center of all three major ransomware outbreaks that have taken place n 2017 — WannaCry, NotPetya, and Bad Rabbit. More here.

Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core

A serial leak of the agency’s cyberweapons has damaged morale, slowed intelligence operations and resulted in hacking attacks on businesses and civilians worldwide

 

WASHINGTON — Jake Williams awoke last April in an Orlando, Fla., hotel where he was leading a training session. Checking Twitter, the cybersecurity expert was dismayed to discover that he had been thrust into the middle of one of the worst security debacles ever to befall American intelligence.

Mr. Williams had written on his company blog about the Shadow Brokers, a mysterious group that had somehow obtained many of the hacking tools the United States used to spy on other countries. Now the group had replied in an angry screed on Twitter. It identified him — correctly — as a former member of the National Security Agency’s hacking group, Tailored Access Operations, or T.A.O., a job he had not publicly disclosed. Then the Shadow Brokers astonished him by dropping technical details that made clear they knew about highly classified hacking operations that he had conducted.

America’s largest and most secretive intelligence agency had been deeply infiltrated.

“They had operational insight that even most of my fellow operators at T.A.O. did not have,” said Mr. Williams, now with Rendition Infosec, a cybersecurity firm he founded. “I felt like I’d been kicked in the gut. Whoever wrote this either was a well-placed insider or had stolen a lot of operational data.”

The jolt to Mr. Williams from the Shadow Brokers’ riposte was part of a much broader earthquake that has shaken the N.S.A. to its core. Current and former agency officials say the Shadow Brokers disclosures, which began in August 2016, have been catastrophic for the N.S.A., calling into question its ability to protect potent cyberweapons and its very value to national security. The agency regarded as the world’s leader in breaking into adversaries’ computer networks failed to protect its own.

“These leaks have been incredibly damaging to our intelligence and cyber capabilities,” said Leon E. Panetta, the former defense secretary and director of the Central Intelligence Agency. “The fundamental purpose of intelligence is to be able to effectively penetrate our adversaries in order to gather vital intelligence. By its very nature, that only works if secrecy is maintained and our codes are protected.”

With a leak of intelligence methods like the N.S.A. tools, Mr. Panetta said, “Every time it happens, you essentially have to start over.”

Fifteen months into a wide-ranging investigation by the agency’s counterintelligence arm, known as Q Group, and the F.B.I., officials still do not know whether the N.S.A. is the victim of a brilliantly executed hack, with Russia as the most likely perpetrator, an insider’s leak, or both. Three employees have been arrested since 2015 for taking classified files, but there is fear that one or more leakers may still be in place. And there is broad agreement that the damage from the Shadow Brokers already far exceeds the harm to American intelligence done by Edward J. Snowden, the former N.S.A. contractor who fled with four laptops of classified material in 2013.

Mr. Snowden’s cascade of disclosures to journalists and his defiant public stance drew far more media coverage than this new breach. But Mr. Snowden released code words, while the Shadow Brokers have released the actual code; if he shared what might be described as battle plans, they have loosed the weapons themselves. Created at huge expense to American taxpayers, those cyberweapons have now been picked up by hackers from North Korea to Russia and shot back at the United States and its allies.

A screenshot taken as ransomware affected systems worldwide last summer. The Ukrainian government posted the picture to its official Facebook page.

Millions of people saw their computers shut down by ransomware, with demands for payments in digital currency to have their access restored. Tens of thousands of employees at Mondelez International, the Oreo cookie maker, had their data completely wiped. FedEx reported that an attack on a European subsidiary had halted deliveries and cost $300 million. Hospitals in Pennsylvania, Britain and Indonesia had to turn away patients. The attacks disrupted production at a car plant in France, an oil company in Brazil and a chocolate factory in Tasmania, among thousands of enterprises affected worldwide.

American officials had to explain to close allies — and to business leaders in the United States — how cyberweapons developed at Fort Meade in Maryland, came to be used against them. Experts believe more attacks using the stolen N.S.A. tools are all but certain.

Inside the agency’s Maryland headquarters and its campuses around the country, N.S.A. employees have been subjected to polygraphs and suspended from their jobs in a hunt for turncoats allied with the Shadow Brokers. Much of the agency’s cyberarsenal is still being replaced, curtailing operations. Morale has plunged, and experienced cyberspecialists are leaving the agency for better-paying jobs — including with firms defending computer networks from intrusions that use the N.S.A.’s leaked tools.

“It’s a disaster on multiple levels,” Mr. Williams said. “It’s embarrassing that the people responsible for this have not been brought to justice.”

In response to detailed questions, an N.S.A. spokesman, Michael T. Halbig, said the agency “cannot comment on Shadow Brokers.” He denied that the episode had hurt morale. “N.S.A. continues to be viewed as a great place to work; we receive more than 140,000 applications each year for our hiring program,” he said.

Compounding the pain for the N.S.A. is the attackers’ regular online public taunts, written in ersatz broken English. Their posts are a peculiar mash-up of immaturity and sophistication, laced with profane jokes but also savvy cultural and political references. They suggest that their author — if not an American — knows the United States well.

“Is NSA chasing shadowses?” the Shadow Brokers asked in a post on Oct. 16, mocking the agency’s inability to understand the leaks and announcing a price cut for subscriptions to its “monthly dump service” of stolen N.S.A. tools. It was a typically wide-ranging screed, touching on George Orwell’s “1984”; the end of the federal government’s fiscal year on Sept. 30; Russia’s creation of bogus accounts on Facebook and Twitter; and the phenomenon of American intelligence officers going to work for contractors who pay higher salaries.

The Shadow Brokers have mocked the N.S.A. in regular online posts and released its stolen hacking tools in a “monthly dump service.”

One passage, possibly hinting at the Shadow Brokers’ identity, underscored the close relationship of Russian intelligence to criminal hackers. “Russian security peoples,” it said, “is becoming Russian hackeres at nights, but only full moons.”

Russia is the prime suspect in a parallel hemorrhage of hacking tools and secret documents from the C.I.A.’s Center for Cyber Intelligence, posted week after week since March to the WikiLeaks website under the names Vault7 and Vault8. That breach, too, is unsolved. Together, the flood of digital secrets from agencies that invest huge resources in preventing such breaches is raising profound questions.

Have hackers and leakers made secrecy obsolete? Has Russian intelligence simply outplayed the United States, penetrating the most closely guarded corners of its government? Can a work force of thousands of young, tech-savvy spies ever be immune to leaks?

Some veteran intelligence officials believe a lopsided focus on offensive cyberweapons and hacking tools has, for years, left American cyberdefense dangerously porous.

“We have had a train wreck coming,” said Mike McConnell, the former N.S.A. director and national intelligence director. “We should have ratcheted up the defense parts significantly.”

America’s Cyber Special Forces

At the heart of the N.S.A. crisis is Tailored Access Operations, the group where Mr. Williams worked, which was absorbed last year into the agency’s new Directorate of Operations.

The N.S.A.’s headquarters at Fort Meade in Maryland. Cybertools the agency developed have been picked up by hackers from North Korea to Russia and shot back at the United States and its allies. Jim Lo Scalzo/European Pressphoto Agency

T.A.O. — the outdated name is still used informally — began years ago as a side project at the agency’s research and engineering building at Fort Meade. It was a cyber Skunk Works, akin to the special units that once built stealth aircraft and drones. As Washington’s need for hacking capabilities grew, T.A.O. expanded into a separate office park in Laurel, Md., with additional teams at facilities in Colorado, Georgia, Hawaii and Texas.

The hacking unit attracts many of the agency’s young stars, who like the thrill of internet break-ins in the name of national security, according to a dozen former government officials who agreed to describe its work on the condition of anonymity. T.A.O. analysts start with a shopping list of desired information and likely sources — say, a Chinese official’s home computer or a Russian oil company’s network. Much of T.A.O.’s work is labeled E.C.I., for “exceptionally controlled information,” material so sensitive it was initially stored only in safes. When the cumulative weight of the safes threatened the integrity of N.S.A.’s engineering building a few years ago, one agency veteran said, the rules were changed to allow locked file cabinets.

The more experienced T.A.O. operators devise ways to break into foreign networks; junior operators take over to extract information. Mr. Williams, 40, a former paramedic who served in military intelligence in the Army before joining the N.S.A., worked in T.A.O. from 2008 to 2013, which he described as an especially long tenure. He called the work “challenging and sometimes exciting.”

T.A.O. operators must constantly renew their arsenal to stay abreast of changing software and hardware, examining every Windows update and new iPhone for vulnerabilities. “The nature of the business is to move with the technology,” a former T.A.O. hacker said.

Long known mainly as an eavesdropping agency, the N.S.A. has embraced hacking as an especially productive way to spy on foreign targets. The intelligence collection is often automated, with malware implants — computer code designed to find material of interest — left sitting on the targeted system for months or even years, sending files back to the N.S.A.

The same implant can be used for many purposes: to steal documents, tap into email, subtly change data or become the launching pad for an attack. T.A.O.’s most public success was an operation against Iran called Olympic Games, in which implants in the network of the Natanz nuclear plant caused centrifuges enriching uranium to self-destruct. The T.A.O. was also critical to attacks on the Islamic State and North Korea.

It was this cyberarsenal that the Shadow Brokers got hold of, and then began to release.

Like cops studying a burglar’s operating style and stash of stolen goods, N.S.A. analysts have tried to figure out what the Shadow Brokers took. None of the leaked files date from later than 2013 — a relief to agency officials assessing the damage. But they include a large share of T.A.O.’s collection, including three so-called “ops disks — T.A.O.’s term for tool kits — containing the software to bypass computer firewalls, penetrate Windows and break into the Linux systems most commonly used on Android phones.

Evidence shows that the Shadow Brokers obtained the entire tool kits intact, suggesting that an insider might have simply pocketed a thumb drive and walked out.

But other files obtained by the Shadow Brokers bore no relation to the ops disks and seem to have been grabbed at different times. Some were designed for a compromise by the N.S.A. of Swift, a global financial messaging system, allowing the agency to track bank transfers. There was a manual for an old system code-named UNITEDRAKE, used to attack Windows. There were PowerPoint presentations and other files not used in hacking, making it unlikely that the Shadow Brokers had simply grabbed tools left on the internet by sloppy N.S.A. hackers.

After 15 months of investigation, officials still do not know what was behind the Shadow Brokers disclosures — a hack, with Russia as the most likely perpetrator, an insider’s leak, or both.

Some officials doubt that the Shadow Brokers got it all by hacking the most secure of American government agencies — hence the search for insiders. But some T.A.O. hackers think that skilled, persistent attackers might have been able to get through the N.S.A.’s defenses — because, as one put it, “I know we’ve done it to other countries.”

The Shadow Brokers have verbally attacked certain cyberexperts, including Mr. Williams. When he concluded from their Twitter hints that they knew about some of his hacks while at the N.S.A., he canceled a business trip to Singapore. The United States had named and criminally charged hackers from the intelligence agencies of China, Iran and Russia. He feared he could be similarly charged by a country he had targeted and arrested on an international warrant.

He has since resumed traveling abroad. But he says no one from the N.S.A. has contacted him about being singled out publicly by the Shadow Brokers.

“That feels like a betrayal,” he said. “I was targeted by the Shadow Brokers because of that work. I do not feel the government has my back.”

The Hunt for an Insider

For decades after its creation in 1952, the N.S.A. — No Such Agency, in the old joke — was seen as all but leakproof. But since Mr. Snowden flew away with hundreds of thousands of documents in 2013, that notion has been shattered.

The Snowden trauma led to the investment of millions of dollars in new technology and tougher rules to counter what the government calls the insider threat. But N.S.A. employees say that with thousands of employees pouring in and out of the gates, and the ability to store a library’s worth of data in a device that can fit on a key ring, it is impossible to prevent people from walking out with secrets.

The agency has active investigations into at least three former N.S.A. employees or contractors. Two had worked for T.A.O.: a still publicly unidentified software developer secretly arrested after taking hacking tools home in 2015, only to have Russian hackers lift them from his home computer; and Harold T. Martin III, a contractor arrested last year when F.B.I. agents found his home, garden shed and car stuffed with sensitive agency documents and storage devices he had taken over many years when a work-at-home habit got out of control, his lawyers say. The third is Reality Winner, a young N.S.A. linguist arrested in June, who is charged with leaking to the news site The Intercept a single classified report on a Russian breach of an American election systems vendor.

Mr. Martin’s gargantuan collection of stolen files included much of what the Shadow Brokers have, and he has been scrutinized by investigators as a possible source for them. Officials say they do not believe he deliberately supplied the material, though they have examined whether he might have been targeted by thieves or hackers.

But according to former N.S.A. employees who are still in touch with active workers, investigators of the Shadow Brokers thefts are clearly worried that one or more leakers may still be inside the agency. Some T.A.O. employees have been asked to turn over their passports, take time off their jobs and submit to questioning. The small number of cyberspecialists who have worked both at T.A.O. and at the C.I.A. have come in for particular attention, out of concern that a single leaker might be responsible for both the Shadow Brokers and the C.I.A.’s Vault7 breaches.

Then there are the Shadow Brokers’ writings, which betray a seeming immersion in American culture. Last April, about the time Mr. Williams was discovering their inside knowledge of T.A.O. operations, the Shadow Brokers posted an appeal to President Trump: “Don’t Forget Your Base.” With the ease of a seasoned pundit, they tossed around details about Stephen K. Bannon, the president’s now departed adviser; the Freedom Caucus in Congress; the “deep state”; the Alien and Sedition Acts; and white privilege.

“TheShadowBrokers is wanting to see you succeed,” the post said, addressing Mr. Trump. “TheShadowBrokers is wanting America to be great again.”

The mole hunt is inevitably creating an atmosphere of suspicion and anxiety, former employees say. While the attraction of the N.S.A. for skilled cyberoperators is unique — nowhere else can they hack without getting into legal trouble — the boom in cybersecurity hiring by private companies gives T.A.O. veterans lucrative exit options.

Got a confidential news tip?

The New York Times would like to hear from readers who want to share messages and materials with our journalists.

Young T.A.O. hackers are lucky to make $80,000 a year, while those who leave routinely find jobs paying well over $100,000, cybersecurity specialists say. For many workers, the appeal of the N.S.A’s mission has been more than enough to make up the difference. But over the past year, former T.A.O. employees say an increasing number of former colleagues have called them looking for private-sector work, including “graybeards” they thought would be N.S.A. lifers.

“Snowden killed morale,” another T.A.O. analyst said. “But at least we knew who he was. Now you have a situation where the agency is questioning people who have been 100 percent mission-oriented, telling them they’re liars.”

Because the N.S.A. hacking unit has grown so rapidly over the past decade, the pool of potential leakers has expanded into the hundreds. Trust has eroded as anyone who had access to the leaked code is regarded as the potential culprit.

Some agency veterans have seen projects they worked on for a decade shut down because implants they relied on were dumped online by the Shadow Brokers. The number of new operations has declined because the malware tools must be rebuilt. And no end is in sight.

“How much longer are the releases going to come?” a former T.A.O. employee asked. “The agency doesn’t know how to stop it — or even what ‘it’ is.”

One N.S.A. official who almost saw his career ended by the Shadow Brokers is at the very top of the organization: Adm. Michael S. Rogers, director of the N.S.A. and commander of its sister military organization, United States Cyber Command. President Barack Obama’s director of national intelligence, James R. Clapper Jr., and defense secretary, Ashton B. Carter, recommended removing Admiral Rogers from his post to create accountability for the breaches.

But Mr. Obama did not act on the advice, in part because Admiral Rogers’ agency was at the center of the investigation into Russia’s interference in the 2016 election. Mr. Trump, who again on Saturday disputed his intelligence agencies’ findings on Russia and the election, extended the admiral’s time in office. Some former intelligence officials say they are flabbergasted that he has been able to hold on to his job.

A Shadow War With Russia?

Lurking in the background of the Shadow Brokers investigation is American officials’ strong belief that it is a Russian operation. The pattern of dribbling out stolen documents over many months, they say, echoes the slow release of Democratic emails purloined by Russian hackers last year.

But there is a more specific back story to the United States-Russia cyber rivalry.

Starting in 2014, American cybersecurity researchers who had been tracking Russia’s state-sponsored hacking groups for years began to expose them in a series of research reports. American firms, including Symantec, CrowdStrike and FireEye, reported that Moscow was behind certain cyberattacks and identified government-sponsored Russian hacking groups.

The Moscow headquarters of Kaspersky Lab, a Russian cybersecurity firm that hunted for N.S.A. malware. Kirill Kudryavtsev/Agence France-Presse — Getty Images

In the meantime, Russia’s most prominent cybersecurity firm, Kaspersky Lab, had started work on a report that would turn the tables on the United States. Kaspersky hunted for the spying malware planted by N.S.A. hackers, guided in part by the keywords and code names in the files taken by Mr. Snowden and published by journalists, officials said.

Kaspersky was, in a sense, simply doing to the N.S.A. what the American companies had just done to Russian intelligence: Expose their operations. And American officials believe Russian intelligence was piggybacking on Kaspersky’s efforts to find and retrieve the N.S.A.’s secrets wherever they could be found. The T.A.O. hackers knew that when Kaspersky updated its popular antivirus software to find and block the N.S.A. malware, it could thwart spying operations around the world.

So T.A.O. personnel rushed to replace implants in many countries with new malware they did not believe the Russian company could detect.

In February 2015, Kaspersky published its report on the Equation Group — the company’s name for T.A.O. hackers — and updated its antivirus software to uproot the N.S.A. malware wherever it had not been replaced. The agency temporarily lost access to a considerable flow of intelligence. By some accounts, however, N.S.A. officials were relieved that the Kaspersky report did not include certain tools they feared the Russian company had found.

As it would turn out, any celebration was premature.

On Aug. 13 last year, a new Twitter account using the Shadow Brokers’ name announced with fanfare an online auction of stolen N.S.A. hacking tools.

“We hack Equation Group,” the Shadow Brokers wrote. “We find many many Equation Group cyber weapons.”

Inside the N.S.A., the declaration was like a bomb exploding. A zip file posted online contained the first free sample of the agency’s hacking tools. It was immediately evident that the Shadow Brokers were not hoaxsters, and that the agency was in trouble.

The leaks have renewed a debate over whether the N.S.A. should be permitted to stockpile vulnerabilities it discovers in commercial software to use for spying — rather than immediately alert software makers so the holes can be plugged. The agency claims it has shared with the industry more than 90 percent of flaws it has found, reserving only the most valuable for its own hackers. But if it can’t keep those from leaking, as the last year has demonstrated, the resulting damage to businesses and ordinary computer users around the world can be colossal. The Trump administration says it will soon announce revisions to the system, making it more transparent.

Mr. Williams said it may be years before the “full fallout” of the Shadow Brokers breach is understood. Even the arrest of whoever is responsible for the leaks may not end them, he said — because the sophisticated perpetrators may have built a “dead man’s switch” to release all remaining files automatically upon their arrest.

“We’re obviously dealing with people who have operational security knowledge,” he said. “They have the whole law enforcement system and intelligence system after them. And they haven’t been caught.”

Surveillance: China’s Big Brother, America’s Also?

photo

Video footage sent back to China, for what? Comprehensive espionage… Are U.S. manufacturers no longer making camera equipment or offering surveillance technology? What that any part of the trade deals President Trump signed with President Xi? Anyone?

Surveillance Cameras Made by China Are Hanging All Over the U.S.

Company 42%-owned by the Chinese government sold devices that monitor U.S. Army base, Memphis streets, sparking concerns about cybersecurity

The Memphis police use the surveillance cameras to scan the streets for crime. The U.S. Army uses them to monitor a base in Missouri. Consumer models hang in homes and businesses across the country. At one point, the cameras kept watch on the U.S. embassy in Kabul.

All the devices were manufactured by a single company, Hangzhou Hikvision Digital Technology. It is 42%-owned by the Chinese government. More here.

***

Its state-of-the-art surveillance cameras monitor the movements of millions of Britons going about their daily lives in airports, government buildings, sports stadiums, high streets and stations.

Hikvision, a company controlled by the Chinese government, was recently revealed to be Britain’s biggest supplier of CCTV equipment, raising fears its internet-linked cameras could be hacked from Beijing at the touch of a button.

Last week, undercover Mail on Sunday reporters posed as businessmen to infiltrate its headquarters in the ‘surveillance city’ of Hangzhou in eastern China, to investigate its activities.

What they found will raise fresh cause for concern about a company whose growing influence in the UK has already been questioned by former MI6 officers and Security Ministers. Far from being the independently run business it claims to be in its customer-friendly marketing, Hikvision is controlled by China’s ruling Communist Party. These capacities enable the Chinese authorities to track dissidents, activists and human-rights campaigners, who are routinely rounded up and detained.

As it rapidly expands its global presence, Hikvision has been generously bankrolled by Chinese state banks, which critics say give it an unfair commercial edge.

It received £2.4 billion from China Development Bank in December and a further £2.3 billion loan from the Export-Import Bank of China in August, both of which are controlled by the Chinese government. More here.

***

According to yearly independent research data from IHS Market, Hikvision accounted for 19.5% of market share in global video surveillance industry in 2015, up from 4.6% in 2010, and has been ranked the No.1 market share leader globally for video surveillance equipment for five consecutive years. In 2015, Hikvision was ranked first in EMEA market with 12.2% market share, and was ranked second in Americas market with 7.3% market share.

Hikvision provides video surveillance products and vertical market solutions in the global market, through more than 2,400 partners in 155 countries and regions. In mainland China, Hikvision now partners with more than 40,000 distributors, system integrators and installers. The Company’s products and solutions have been widely deployed in a number of vertical markets and in notable facilities around the world including the Beijing Olympic Stadium, Shanghai Expo, Philadelphia Safe Communities in the U.S., South Korea Seoul Safe City, Brazil World Cup Stadium, the Italy Linate Airport, and many others.

Hikvision is dedicated to providing global resources and locally-based technical, engineering, sales and service supports to its valued customers around the world. In Hikvision’s oversea sales team, about 90% of the employees are local residents; for example, Hikvision European has about 210 employees, among which, over 190 are locals.

***

Imagine a world where almost everyone can be tracked, and everything can be seen by cameras linked directly to the Chinese government.

The rapid growth of a little known Chinese manufacturer of high-powered surveillance technology has some people concerned that it’s no longer a theory.

American flag waves beside CCTV cameras on top of the U.S. embassy in Berlin, Germany, Oct. 25, 2013.

American flag waves beside CCTV cameras on top of the U.S. embassy in Berlin, Germany, Oct. 25, 2013.

Hangzhou Hikvision Digital Technology, a company controlled by the Chinese government, is now the world’s largest supplier of video surveillance equipment, with internet-enabled cameras installed in more than 100 countries.

Capable of capturing sharp images even in fog, rain or darkness, Hikvision claims its most advanced technologies can recognize license plates and tell if a driver is texting while behind the wheel. They can also track individuals with unrivaled “face-tracking” technology and by identifiers such as body metrics, hair color and clothing.

In the United States alone, the company’s surveillance systems can be found everywhere from prisons to airports to private homes and public schools, and even in places with sensitive national security concerns, such as Fort Leonard Wood military base in Missouri. Abroad, its cameras were installed in the U.S. embassy in Kabul, Afghanistan.

According to a U.S. government procurement document published on IPVM.com, the world’s largest online video surveillance trade magazine, U.S. embassy officials decided in August 2016 to allow only Hikvision suppliers to bid on the installation contract.

Stephen Bryen, a widely published expert on international affairs and cyber security, wrote an article outlining his concerns about the purchase, saying the Hikvision cameras were never proven to be any more secure than comparable models.

“If the procurement officer actually thought these cameras were more secure than others, that would have been claimed as part of the sole-source justification,” he said of the embassy purchase agreement, adding that no claims of any kind were made regarding the Hikvision products.

“The issue is that the U.S. embassy is installing commercial cameras in one if its most sensitive locations,” Bryen wrote. “This is a big mistake, and mistakes like this can cost lives.”

On Monday, a State Department official confirmed the installation via email.

“A Hikvision camera system was initially installed to monitor non-sensitive electrical closets for theft prevention,” the official said of U.S. Embassy Kabul. “The procurement in question was to either expand this or to install a new system. The procurement was cancelled September 2016 and the previously installed cameras were removed.”

It is not known whether other Hikvision products have ever been installed in other U.S. embassies.

Spreading the word

Edward Long, a former employee of a video surveillance equipment company in Florida, recently petitioned the U.S. government with a letter warning that Hikvision cameras are sending information back to China.

“Over the past year, [Hikvision has] … flooded the United States with their equipment,” he wrote. “Every time one of their machines is plugged into the internet, it sends all your data to three servers in China. With that information, the Chinese government can log in to any camera system, anytime they want.”

Frank Fisherman, a general manager for Long’s former employer, IC Realtime Security Solutions, tells VOA that Hikvision devices are engineered for effortless hacking.

“They have their encrypted information set up so they can access even if you change the admin [passwords] and the firewall,” he said, adding that Hikvision may have set aside a “back door” in the production process, such that the manufacturer can monitor devices remotely without the users being aware.

IPVM President John Honovich, however, strikes a less alarmist tone.

“So far, we haven’t found any evidence showing these cameras are sending information back to China, and there is no evidence of such back doors,” he told VOA, cautioning, however, that these facts alone do not rule out a possible security threat.

“The issue that still remains is that maybe [back doors] haven’t been found yet,” he said. “All devices have firmware, [which is] updated all the time, just like you update your computer [or] your PC. At any point during the firmware upgrade, back doors can be added by the manufacturers.”

Among well-known video surveillance equipment manufacturers, Honovich added, Hikvision products may not be worth the risk.

“There are hundreds of security camera manufacturers in the world,” he said. “One can [find a reliable system] without the risk of buying products made by a company largely owned and controlled by the Chinese government.”

A Beijing incubator company

Established in 2001, Hikvision, which originated as a Chinese government research institute, maintains strong ties with that government. More than 42 percent of the company is owned by China’s state-owned enterprises, with the remaining stock owned by a combination of general public stockholders and venture capital investors, including 18 percent from private equity in Hong Kong.

In 2015, when Chinese President Xi Jinping went on an inspection tour of the southern city of Hangzhou, capital of Zhejiang Province, he visited Hikvision’s main office instead of the famous Alibaba headquarters. Xi also met with Pu Shiliang, 38, Hikvision’s head of research and development.

According to the official website of Zhejiang Police Academy, Pu is also the director of a technology laboratory within China’s Ministry of Public Security, the main domestic security agency that has long been criticized for tracking and detaining dissidents and perceived Communist Party opponents of any stripe.

Beginning in 2015, China’s state Development Bank and Export-Import Bank provided Hikvision with 20 billion yuan (nearly $3 billion) in low-interest loans and a 20 billion yuan line of credit. Loans of this size are typically unavailable to Chinese or foreign companies.

Invisible to consumers

Despite the enormous security implications, the United States appears to have made no national security assessment of Hikvision products. As indicated by Long’s online petition, which ultimately closed with only 15 supporters, Hikvision’s links to Beijing are virtually invisible to American consumers.

In April, a New York Times report addressed similar concerns about Chinese drone maker DJI — the world’s largest manufacturer of small drones. The report says the company issued a user agreement that warns customers: “if you conduct your flight in certain countries, your flight data might be monitored and provided to the government authorities according to local regulatory laws.”

In Britain, where many Hikvision cameras have been installed, some government officials have begun voicing concerns.

“If you’ve got cameras that are IP enabled, or potentially could covertly be so enabled … they could potentially be used for malign purposes,” Nigel Inkster, a former British intelligence official, told The Times.

Canadian-based Genetec, one of the world’s leading video surveillance software companies, recently announced that it would no longer offer free technical support for products from either Hikvision or Huawei — a Shenzen-based multinational networking and telecommunications equipment and services company — citing ongoing “security considerations.”

Issuing the announcement, Genetec cited government and corporate clients who called Hikvision and Huawei products “too risky.”

Voice of America received no response to multiple attempts to contact Hikvision’s headquarters in Hangzhou and its branch in California.

Jeffrey He, president of Hikvision’s U.S. and Canadian branch, defended the company during an undated interview with U.S. security monitoring website SourceSecurity.com.

“There have been some misguided accusations targeting Hikvision’s public and industry image, sometimes seeking to create controversy where none exists,” he said. “These questions are geared in general not just to Hikvision, but also to many Chinese manufacturers, and none of these accusations have been proven to be true. These accusations are baseless.

“The Cold War was officially over when the Berlin Wall came down, but I am seeing that, in the minds of some, it never ended,” he added. “We all would be better served if, instead of living in the past, we would look toward the future and the realities of world changes and technology changing along with it.”

 

 

Fracking the Saudi Kingdom, Cash Needed to Survive

When the price of oil at the barrel hovers in the range of $50.00, oil rich nations start to see red on the balance sheets due in part to U.S. fracking.

This too is a reason that Russia and Saudi Arabia are making some desperate decisions. While Russia has no intention of altering internal operations with regard to employment and consumption, the Saudi Kingdom has countless moving parts under consideration for a long term survival strategy especially with a rather new leadership in the order of Princes.

This is not a recent condition for the Saudi royals as it began with real attempts to control the outflow of money and playboy princes spending money globally including in fraudulent and illicit activities.

The kingdom has big plans for the future to compete and must remove all internal obstacles first to gain investment money.

Rhiayad has made a decision to no longer rely on oil for economic sustainability.

The future of Saudi Arabia is described here and is known as ‘Vision 2030‘.

It was once procedure to keep chaos in the Kingdom quiet, but not so much anymore.

King Salman’s sweep may have been foreshadowed two weeks ago, when Maan al-Sanea, a raffish Kuwaiti billionaire, was arrested at his home on the eastern coast of Saudi Arabia.

An exceedingly messy affair ensued. The head of the Gosaibi family accused Sanea of opening the bank—which was called the International Banking Corporation, or T.I.B.C.—without his consent, and of systematically defrauding the family and the bank’s customers. Corporate investigators subsequently uncovered what they believed was evidence of a scheme involving forged signatures and the issuing of fake loans. Lawyers for Sanea claimed in court that the Gosaibis knew what he was doing all along, but they never explained the signatures or loans the investigators had raised questions about.

The financial complexities of the case were daunting—in part because of the opacity of the Saudi legal system. The dispute between the Gosaibis and Sanea played out in separate lawsuits in the Cayman Islands, Switzerland, Bahrain, the U.A.E., and other legal jurisdictions around the world. Yet only one jurisdiction, Sanea’s lawyers claimed, truly mattered. “Our client’s position has always been that the substantive dispute between him and the al-Gosaibi family can be dealt with properly in Saudi Arabia,” they said. More details here.

*** Then there is the case of Prince Abdul Aziz bin Fahd. Is he dead or not? The Kingdom says no he only being detained. Others say hold on….this too appears to be about flaunting money in some cases…dark corners, other places globally. Some real fascinating details are here.

Saudi Arabia has some competitors for economic survival, those being Qatar, the United Arab Emirates and Kuwait. Then there is of course Iran, an even more devilish enemy to Saudi Arabia in many cases than it is to Israel and the United States.

Saudi Arabia has been at war in Yemen due to the Iranian back Houthi rebels for a few years and still has to contend with Bahrain which too has a Shia majority, often inspired by Tehran as was seen in the 2011 Arab Spring protests.

Then there is Lebanon. While Lebanon does have a sizable Christian population, it is essentially controlled by Iran’s Hezbollah and too holds the largest number of refugees from the Syrian civil war. Lebanon’s Prime Minister took a trip to Washington DC and the Trump White House in July, likely to explain conditions in the country taking a tailspin. In early November, Prime Minister Hariri traveled then to Saudi Arabia, probably at the Kingdom’s demand and soon resigned. He is reported to still in in Rhiayad under consultation and protection as he feared for his life in Lebanon as it is reported. Hariri may be hold up at the Ritz Carlton along with the dozen other detained princes under a tight military security condition.

photo

Iran is controlling Lebanon, Syria and Iraq and is working to do the same in Yemen. The Saudi Mission in the United Nations has justified a new blockade on Yemen by accusing Iran  of “direct military aggression”, linking Iranians and Hezbollah to a Burkan H2 missile fired by Houthi rebels towards Riyadh airport and oil facilities, as stakes raised between regional rivals. Iran’s president Rouhani declared Saudi Arabia to stay out of the business in Lebanon.

So is a larger conflict looming? The tea leaves reveal that probability. So, if that is the case, the Kingdom needs all wayward princes out of the way including those in opposition to the modernization of the Kingdom and money will be an issue. $800 billion is on the line so far and rumored to be confiscated.

What is notable is Saudi Arabia issued a declaration directly after Prime Minister Hariri resigned for all Saudi citizens in Lebanon to leave Lebanon immediately as Bahrain has done the same.

So, with regard to funds. a Saudi attorney general said legal probe underway suggests at least $100 billion has been misused in corruption and embezzlement over several decades. 208 were part of the legal probe and have been released, while others are detained and more investigations continue.

So far: The UAE, particularly its most commercially prominent emirate Dubai, is one of the main places where wealthy Saudis park their money abroad. In addition to bank accounts, they buy luxury apartments and villas in Dubai and invest in the emirate’s volatile stock market.

Huge amounts of money may be at stake. Corruption has over the years siphoned off $800 billion from Saudi state revenues, an official at the Riyadh Chamber of Commerce and Industry has estimated; bankers believe much of it is held abroad, in countries including Switzerland and Britain.

ASSETS SOLD

Some wealthy Saudi individuals have been liquidating assets within Saudi Arabia, the UAE and other Gulf countries this week, apparently in an effort to move money out of the region and escape the crackdown, private bankers and fund managers said.

*** Whenever and wherever there is political unrest, Russia is always lurking. That is part in parcel why Russia was mentioned at the top of this article.

There is little doubt that Putin’s foreign policy centers on reviving Russia as a major international power, which seeks to undermine the global American alliance that has underwritten international security since the end of the Cold War.

Stretching across Europe, Asia and the Middle East, this alliance has continually thwarted Russia’s primary foreign policy ambitions. Seeking to break Russia free from America’s preeminence, Putin persistently employs tactics below the threshold of war to fracture the global system and artfully exploits the unintended consequences this inevitably creates.

Putin’s asymmetrical moves have sought to cast doubt on the credibility of American security guarantees in Eastern Europe and in the Baltic. And while alarm bells have sounded, Putin has shied away from direct military confrontation with NATO.

Putin has also now turned to a second front by exploiting the void left by U.S. retrenchment from the Middle East. The projection of Russian military power in Syria in the summer of 2015 ushered in a new era of expansion in the Arab world – particularly through arm sales and limited military involvement. In Moscow’s view, the Middle East is ripe for disruption, with lower risks of a direct confrontation with the United States.

Putin’s show of force unsurprisingly has found him new friends and new buyers. Regional powers are hedging against U.S. unpredictability and seeking out Russian benevolence. Furthering the sense of uncertainty is the lingering crisis between the Gulf Cooperation Council states and Qatar. While the Gulf sees uncertainty, Russia sees an opportunity to prey on their doubts.

The announced sale of the S-400 missile defense system to Riyadh during the October visit of King Salman to Moscow, the first Saudi monarch to visit Russia, is a further sign of the deepening role Moscow is playing in an area of the world where the U.S. has traditionally been predominant.

This is not the first time Putin has ventured into arm sales in the Middle East, a region that is typically dominated by the U.S. weapons industry. Previous sales of the S-300 have been delivered to Iran, while Turkey recently signed a deal with Moscow to acquire the S-400 as well. Furthermore, Bahrain and Qatar, the home to the U.S.’s Fifth Fleet and the Al Udeid military base respectively, have also expressed interest in acquiring the system, according to Russian media. Its acquisition, if completed, raises important implications for the U.S.’s strategic posture in the Gulf. The proliferation of such systems is certainly not in America’s interest.

The acquisition of the S-400 by Riyadh comes after the U.S. recently sold $15 billion worth of THAAD equipment to the Kingdom. This system will be the premier ballistic missile defense system in the Middle East, with the exception of Israel’s. But for its new air defense system, Saudi Arabia felt the need to turn to Russia.

Riyadh’s rapprochement with Moscow is a way to hedge against a more uncertain U.S. engagement and to gain some leverage in its relationship with Washington. While the U.S. has tried to assuage Saudi concerns about its own steadfastness in the region, Moscow has been able to sow enough doubt in Riyadh to undermine American efforts. Riyadh is careful to show that it won’t completely fall in line either with Washington or Moscow but will try to balance one relationship with the other. While the agreement to purchase the S-400 is a signal towards Washington, it is equally telling that the sale of the THAAD missile defense system was approved amidst Salman’s visit to Moscow. More here by Andrew Bowen.

Not even a crystal ball or a higher power can really sort all of this out…but now you have some facts giving rise to some clues and can make a better estimation….right?

Khald Hiftar of Libya Hires DC Lobby Firm

Col. Hiftar hires a DC lobby firm….why? To get money from the U.S. and Russia at the same time perhaps?

Khaled Khalifa Hiftar is restoring Libya to what end and before Russia fully steps in?What about the migrant crisis?

After Hiftar gained political and military legitimacy, Hifter concentrated on fighting Islamists in Benghazi, though with little initial success. His most sworn enemy was Ansar al-Sharia, the dominant terror group in Benghazi at the time, which the United States had already declared a terrorist organization after it was accused of killing the US ambassador in 2012.

Hifter relied heavily on his tribal connections in eastern Libya and capitalized on the bad security situation in Benghazi. By May 2015, he believed he had enough force to declare war on terror throughout Libya, not just Benghazi, where hundreds of former security officials, army officers and civil and political activists had been assassinated. In a way he was defending himself since he knew that he could be next on the death list.

His offensive in Benghazi stalled for a while since the army fragments he managed to reorganize were few in numbers and lacked training and equipment. Above all, many former professional officers did not join him because neither his motives nor his objectives were clear. More here.

For months, the Kremlin has sought to draw Libya’s eastern potentate General Khalifa Hiftar into its orbit. Hiftar is currently the de facto leader of a bloc of eastern Libyan forces that oppose Libya’s internationally recognized government in Tripoli, the so called Government of National Accord. Negotiations between the two sides are going nowhere and rumors of a potential Hiftar offensive against the Tripoli government have been swirling for months.

Hiftar has been to Moscow and paid a visit to the Russian aircraft carrier Kuznetsov in the Mediterranean, during which he held a video call with Russian Defense Minister Defense Minister Sergei Shoigu. Then, last week, Moscow reportedly deployed troops to a base on Egypt’s northern coast just 60 miles from the border crossing with Libya.

There are a few ways to interpret their latest move: It could just be posturing, part of a Russian hybrid warfare strategy aimed at influencing ongoing negotiations over Libya’s future. But there are plenty of reasons to believe it may be the early phase of a Russian intervention.

Russian President Vladimir Putin is eager to underscore the challenges that U.S. pro-democracy interventions in the Middle East have faced and offer up an alternative Russian strategy that relies on authoritarian leaders that look a lot like Putin himself. The 2011 NATO intervention in Libya has long been a target of Kremlin criticism and the chance to portray Russia as Libya’s savior as Russia has attempted to do in Syria must be more than a little tempting for the Russian president.

Closer ties to Libya would also offer Russia the chance to extend its reach further along the Mediterranean’s southern littoral i.e. NATO’s southern flank. Russia could, for example, seek to deploy advanced anti-access, area-denial systems along the Libyan coast, significantly enlarging the anti-access bubble that it has already established in the Eastern Mediterranean with similar deployments in Syria a bubble that was already raising significant concern with top U.S. military commanders a year ago. More here.

Related reading: What Americans Need To Know If Russia Intervenes in Libya’s Civil War

Related reading: The European Migrant Crisis Includes Libya

Further, what was his relationship with Hillary and Ambassador Cretz? We may never know due to those still missing Hillary emails.

Downfall and exile

Gaddafi put Haftar – recently promoted to field marshal – in charge of the Libyan forces involved in the conflict in Chad in the 1980s. This proved to be his downfall, as Libya was defeated by the French-backed Chadian forces, and Haftar and 300 of his men were captured by the Chadians in 1987.

Having previously denied the presence of Libyan troops in the country, Gaddafi disowned him. This led Haftar to devote the next two decades towards toppling the Libyan leader.

He did this from exile in the US state of Virginia. His proximity to the CIA’s headquarters in Langley hinted at a close relationship with US intelligence services, who gave their backing to several attempts to assassinate Gaddafi.

Return from exile

After the start of the uprising against Gaddafi in 2011, Haftar returned to Libya where he became a key commander of the makeshift rebel force in the east.

With Gaddafi’s downfall, Haftar faded into obscurity until February 2014, when he outlined on TV his plan to save the nation and called on Libyans to rise up against the elected parliament, the General National Congress (GNC), whose mandate was still valid at the time.

His dramatic announcement was made at a time when Libya’s second city, Benghazi, and other towns in the east had in effect been taken over by the local al-Qaeda affiliate, Ansar al-Sharia, and other Islamist groups who mounted a campaign of assassinations and bombings targeting the military, police personnel and other public servants.

Although Haftar did not have the wherewithal to put his plan into action, his announcement reflected popular sentiment, especially in Benghazi, which had become disenchanted with the total failure of the GNC and its government to confront the Islamists.

Haftar’s popularity is not necessarily shared elsewhere in the country where he is remembered more for his past association with Gaddafi and his subsequent US connections.

He is also detested by Islamists who resent him for confronting them in Benghazi and elsewhere in the east.

Operation Dignity

In May 2014 Haftar launched Operation Dignity against Islamist militants in Benghazi and the east. In March 2015 Libya’s elected parliament, the House of Representatives (HoR) – which had replaced the GNC – appointed him commander of the Libyan National Army (LNA).

After a year of little progress, in February 2016 the LNA pushed the Islamist militants out of much of Benghazi. By mid-April this had been followed up by further military action that dislodged the Islamists from their strongholds outside Benghazi and as far as Derna, 250km east of Benghazi.

Operation Swift Thunder

In September 2016, the LNA launched operation “Swift Thunder”, seizing from the Petroleum Facilities Guard – an armed group aligned with the UN-brokered Government of National Accord (GNA) – the key oil terminals of Zueitina, Brega, Ras Lanuf and Sidrah, in the oil-rich heartland locally known as the Oil Cresent.

In recognition of this, the Speaker of the HoR and supreme commander of the armed forces, Agilah Saleh, promoted Haftar from lieutenant-general to field marshal. More here from BBC.

Anyone Paying Attention to Wilbur Ross, Commerce Sec?

What is Wilbur Ross worth? The answer is a slippery one when you ask Wilbur to respond. There is a dispute when it comes to his financials in the ranger of a billion or two. Further, where did his wealth come from you ask? Well there were allegedly family trusts, hotels, shipping companies, steel, banking in Cyprus and even those Rothschilds. More here from Forbes.

photo

Wilbur Ross’ company has been moving LPG for a Russian gas giant.

But now, in what might seem almost an echo of the Red Scare that lasted in America for generations, this business relationship is seen as tainted, an ominous connection to a country that unleashed cyberwar against American democracy and the 2016 election that put Trump in the White House.

Are all connections to Russia now suspect? Or are they sometimes merely an inconvenient consequence of doing business in a country where major corporations often are controlled by the Kremlin?

The latest tie between Russia, Trump and his campaign and administration officials came to light Sunday with news that the U.S. commerce secretary is a part owner of Navigator Holdings, a shipping company that transports LPG produced by Sibur, a big Russian company with ties to the Kremlin.

Some shipping business experts who follow the company are shrugging off the news.

“Russia has a lot of commodities that need to go somewhere else,” said Benjamin J. Nolan, a financial analyst who covers Navigator for Stifel, Nicolaus & Co. He added, “Odds are, they are going to have long term contracts with Western shipping companies.”

The Russian government is a powerful factor in almost every part of the country’s economy. Some of Russia’s biggest banks, such as Sberbank and VTB are state-controlled, with their management answering directly or indirectly to the Kremlin.

Then there is Gazprom, a big gas supplier to Europe, and Rosneft, the oil producer. Both are majority state owned.

***

Two people associated with Siber are under U.S. sanctions

***

How about Venezuela? Yup…

Despite U.S. sanctions on Venezuela’s bond transactions in international markets and other restrictions against top officials, the Paradise Papers show that Secretary of Commerce Wilbur Ross has an important stake in multi-million dollar businesses related with state-oil giant Petróleos de Venezuela (PDVSA).

As reported by Newsweek on Sunday, Ross still retains interest in Navigator Holdings, a shipping company incorporated in the Marshall Islands in the South Pacific that maintains a close relationship with Russia’s energy company SIBUR, which is run by President Vladimir Putin’s son-in-law Kirill Shamalov and other individuals who have been sanctioned by the U.S. Navigator Holdings has received millions of dollars every year in earnings due to coastal shipping services provided to PDVSA.

PDVSA is no small client of Navigator Holdings. The state-oil company contributed to 10.7 percent of Navigator’s earnings during fiscal year 2014 and 11.7 percent in fiscal year 2015, according to Venezuelan newspaper El Nacional. The company’s earnings translate into $33.7 million and $36.7 million for each fiscal year thanks to PDVSA’s use of the Navigator’s 29 tankers to carry liquefied petroleum gas during those years.

As he was awaiting confirmation, Ross failed to disclose any business interests with Putin’s family and his stake in the maritime industry. James Rockas, Ross’s spokesman, told the New York Times that the secretary of commerce “recuses himself from any matters focused on transoceanic shipping vessels, but has been generally supportive of the [Trump] administration’s sanctions of Russian and Venezuelan entities.”

But Ross’s businesses pose a potential conflict of interest, ICIJ reported. Ross has “the power to influence U.S. trade, sanctions and other matters that could affect SIBUR’s owners,” the Paradise Papers report added. More here from Newsweek.