An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

Eligible Receiver 97, Red Team Being Applied Today for Cyber Hacks?

An early classified Defense Department cybersecurity exercise named “Eligible Receiver 97” (ER97) featured a previously unpublicized series of mock terror attacks, hostage seizures, and special operations raids that went well beyond pure cyber activities in order to demonstrate the potential scope of threats to U.S. national security posed by attacks in the cyber domain, according to recently declassified documents and a National Security Agency (NSA) video posted today by the nongovernmental National Security Archive at The George Washington University.

“Joint Exercise Eligible Receiver 97”, run during the Clinton presidency, is frequently pointed to as a critical event in the United States’ appreciation of threats in cyber space. The exercise led directly to the formation of what would eventually become United States Cyber Command (USCYBERCOM) and informed key studies such as the formative Marsh Report on critical infrastructure protection. Despite the significance of ER97, however, very little is publicly known about the exercise itself.

ER97 involved an NSA Red Team playing the role of North Korean, Iranian and Cuban hostile forces whose putative aim was to attack critical infrastructure as well as military command-and-control capabilities to pressure the U.S. government into changing its policies toward those states. An interagency Blue Team was required to provide recommendations to personnel enacting defensive responses. Until now, only two phases out of three (infrastructure and command-and-control) had been publicly known.  The video and documents posted today provide new details about the third phase involving kinetic attacks in the physical domain – i.e. more traditional terrorist assaults on civilian targets – which were built upon intelligence gathered through the Red Team’s successes. Read more here on the declassified files.

*** With all the cyber terror going on today in the United States, are we doing more ‘red team’ exercises? Perhaps some of those tactics are paying off many years later.

3 Carbanak (FIN7) Hackers Charged With Stealing 15 Million ...

Three Members of Notorious International Cybercrime Group “Fin7” in Custody for Role in Attacking Over 100 U.S. Companies

Victim Companies in 47 U.S. States; Used Front Company ‘Combi Security’ to Recruit Hackers to Criminal Enterprise

          SEATTLE – Three high-ranking members of a sophisticated international cybercrime group operating out of Eastern Europe have been arrested and are currently in custody facing charges filed in U.S. District Court in Seattle, announced U.S. Attorney Annette L. Hayes, Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division and Special Agent in Charge Jay S. Tabb Jr. of the FBI’s Seattle Field Office.

According to three federal indictments unsealed today, Ukrainian nationals Dmytro Fedorov, 44, Fedir Hladyr, 33, and Andrii Kolpakov, 30, are members of a prolific hacking group widely known as FIN7 (also referred to as the Carbanak Group and the Navigator Group, among other names).  Since at least 2015, FIN7 members engaged in a highly sophisticated malware campaign to attack more than 100 U.S. companies, predominantly in the restaurant, gaming, and hospitality industries.  As set forth in the indictments, FIN7 hacked into thousands of computer systems and stole millions of customer credit and debit card numbers which were used or sold for profit.

In the United States alone, FIN7 successfully breached the computer networks of businesses in 47 states and the District of Columbia, stealing more than 15 million customer card records from over 6,500 individual point-of-sale terminals at more than 3,600 separate business locations.  Additional intrusions occurred abroad, including in the United Kingdom, Australia, and France.  Companies that have publicly disclosed hacks attributable to FIN7 include such familiar chains as Chipotle Mexican Grill, Chili’s, Arby’s, Red Robin and Jason’s Deli.  Additionally here in Western Washington FIN7 targeted the Emerald Queen Casino (EQC) and other local businesses.  The Emerald Queen Casino was able to stop the intrusion and no customer data was stolen.

“Protecting consumers and companies who use the internet to conduct business – both large chains and small ‘mom and pop’ stores — is a top priority for all of us in the Department of Justice,” said U.S. Attorney Annette L. Hayes.  “Cyber criminals who believe that they can hide in faraway countries and operate from behind keyboards without getting caught are just plain wrong.  We will continue our longstanding work with partners around the world to ensure cyber criminals are identified and held to account for the harm that they do – both to our pocketbooks and our ability to rely on the cyber networks we use.”

“The three Ukrainian nationals indicted today allegedly were part of a prolific hacking group that targeted American companies and citizens by stealing valuable consumer data, including personal credit card information, that they then sold on the Darknet,” said Assistant Attorney General Benczkowski.  “Because hackers are committed to finding new ways to harm the American public and our economy, the Department of Justice remains steadfast in its commitment to working with our law enforcement partners to identify, interdict, and prosecute those responsible for these threats.”

“The naming of these FIN7 leaders marks a major step towards dismantling this sophisticated criminal enterprise,” said Special Agent in Charge Jay S. Tabb Jr., of the FBI’s Seattle Field Office.  “As the lead federal agency for cyber-attack investigations, the FBI will continue to work with its law enforcement partners worldwide to pursue the members of this devious group, and hold them accountable for stealing from American businesses and individuals.”

Each of the three FIN7 conspirators is charged with 26 felony counts alleging conspiracy, wire fraud, computer hacking, access device fraud, and aggravated identity theft.

In January 2018, at the request of U.S. officials, foreign authorities separately arrested Ukrainian Fedir Hladyr and a second FIN7 member, Dmytro Fedorov.  Hladyr was arrested in Dresden, Germany, and is currently detained in Seattle pending trial.  Hladyr allegedly served as FIN7’s systems administrator who, among other things, maintained servers and communication channels used by the organization and held a managerial role by delegating tasks and by providing instruction to other members of the scheme.  Hladyr’s trial is currently scheduled for October 22, 2018.

Fedorov, a high-level hacker and manager who allegedly supervised other hackers tasked with breaching the security of victims’ computer systems, was arrested in Bielsko-Biala, Poland.  Fedorov remains detained in Poland pending his extradition to the United States.

In late June 2018, foreign authorities arrested a third FIN7 member, Ukrainian Andrii Kolpakov in Lepe, Spain.  Kolpakov, also is alleged to be a supervisor of a group of hackers, remains detained in Spain pending the United States’ request for extradition.

According to the indictments, FIN7, through its dozens of members, launched numerous waves of malicious cyberattacks on numerous businesses operating in the United States and abroad.  FIN7 carefully crafted email messages that would appear legitimate to a business’ employee, and accompanied emails with telephone calls intended to further legitimize the email. Once an attached file was opened and activated, FIN7 would use an adapted version of the notorious Carbanak malware in addition to an arsenal of other tools to ultimately access and steal payment card data for the business’ customers. Since 2015, many of the stolen payment card numbers have been offered for sale through online underground marketplaces. (Supplemental document “How FIN7 Attacked and Stole Data” explains the scheme in greater detail.)

FIN7 used a front company, Combi Security, purportedly headquartered in Russia and Israel, to provide a guise of legitimacy and to recruit hackers to join the criminal enterprise.  Combi Security’s website indicated that it provided a number of security services such as penetration testing.  Ironically, the sham company’s website listed multiple U.S. victims among its purported clients.

 

The charges in the indictments are merely allegations, and the defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

The indictments are the result of an investigation conducted by the Seattle Cyber Task Force of the FBI and the U.S. Attorney’s Office for the Western District of Washington, with the assistance of the Justice Department’s Computer Crime and Intellectual Property Section and Office of International Affairs, the National Cyber-Forensics and Training Alliance, numerous computer security firms and financial institutions, FBI offices across the nation and globe, as well as numerous international agencies. Arrests overseas were executed in Poland by the “Shadow Hunters” from CBŚP (Polish Central Bureau of Investigation); in Germany by LKA Sachsen – Dezernat 33, (German State Criminal Police Office) and the Polizeidirektion Dresden (Dresden Police); and in Spain by the Grupo de Seguridad Logica within the Unidad de Investigación Technologica of the Cuerpo Nacional de Policía (Spanish National Police).

This case is being prosecuted by Assistant U.S. Attorneys Francis Franze-Nakamura and Steven Masada of the Western District of Washington, and Trial Attorney Anthony Teelucksingh of the Justice Department’s Computer Crime and Intellectual Property Section.

how_fin7_attacked_and_stole_data.pdf

Iran’s Actions in the Middle East, Where’s the Money?

Obama admin secretly used the Federal Reserve Bank to move $8.6 million to Iran for nuclear-related material. Then they circled back and tried to use the Fed to move several billion dollars more for Iran. Note from State Dept meeting with Oman bank:

It is getting more nefarious since the Kerry/Obama team are gone and left lots of unfinished business behind, or just ignored it.

Iran’s Revolutionary Guard Corps are employing German companies to disguise their illicit funding of the war against the pro-US government in Yemen.

Time Magazine reported on Thursday: “For several years, Iran’s elite Islamic Revolutionary Guard Corps (IRGC) had been using German front companies to buy advanced printing machinery, watermarked paper and specialty inks in violation of European export controls.”

According to interviews with US Treasury Department officials, Time added: “The IRGC had then printed counterfeit Yemeni banknotes potentially worth hundreds of millions of dollars and used the bogus rials to fund its proxy war against the beleaguered pro-US government in the capital of Sanaa. German companies were being used as a cover by the Iranians to finance the world’s worst humanitarian conflict.”

The report said that US officials, who uncovered the Iranian counterfeiting operation, met with their German counterparts at the Federal Ministry of Finance in Berlin last April.

The Jerusalem Post reviewed intelligence agency reports from German states covering Iran. The reports document Iran’s strategy of using front companies to engage in illicit procurement of nuclear and missile technology in Germany during 2017.

According to Time: “The evidence, uncovered by US illicit-finance investigators, was meant to sway the Germans, but not just in hopes of countering Iran’s moves on the southern tip of the Arabian Peninsula” but also “to convince Berlin that Tehran cannot be trusted and that the Germans should join the Trump Administration in imposing economy-crippling sanctions on Iran.”

US President Donald Trump issued an executive order in 2017 extending the designation of the IRGC as a terrorist organization. But Germany has declined to outlaw the IRGC as a terrorist entity. The mass circulation Bild reported on Thursday that Germany will permit former IRGC member Hadi Mofateh to run the Iranian regime-controlled Islamic Center of Hamburg.

Time wrote that weeks after the initial meeting in the German finance ministry, “American officials presented their hosts with one last set of documents: detailed blueprints on how the Trump Administration was preparing to unleash financial warfare on the Iranian economy.”

Germany is widely considered the least cooperative of the US’s European allies in confronting Iran’s bellicose activities, according to two sources familiar with US-German talks on the Iran nuclear deal. German exports to the Islamic Republic of Iran climbed to €3.5 billion in 2017, up from €2.6b. in 2016.

A German intelligence report from the city-state of Hamburg in July said Iran’s regime is continuing to seek weapons of mass destruction.

The Post reviewed the 211 page document that says: “some of the crisis countries… are still making an effort to obtain products for the manufacture of atomic, biological and chemical weapons of mass destruction (proliferation) and the corresponding missile carrier technology (rocket technology).”

The Hamburg report added: “The current main focus points of countries in the area of relevant proliferation activities are: Iran, Syria, Pakistan and North Korea.”

***

The Trump administration said in December that it believed 80 percent of the manpower supporting the Syrian regime was made up of “Iranian proxies,” including foreign Shiite fighters. Israel has accused Iran of sending as many as 80,000 fighters to Syria.

It is impossible to know the exact number of Afghan recruits in Syria, because many slip back and forth between Iran and Afghanistan, do not tell their families where they are, and hide their military service for fear of being sent to prison in Afghanistan for fighting on behalf of another country. Yet for some, especially those from the long-persecuted Hazara minority, it seems to be a secret badge of honor.

“Nobody forced us to go fight, but it gives you a kind of pride,” said Hussain, 26, a muscular Hazara man in Herat with scars on his face and hands from old shrapnel wounds. He has served in four deployments in Syria since 2014, earning upward of $600 a month, and returned again two months ago from the front. He said he originally decided to enlist while he was working as a carpenter in Iran and saw a video of Islamic State fighters chopping off victims’ heads. More details here.

Trump/Pompeo Mission Against Iran Regime Working

DUBAI (Reuters) – Iran’s currency hit a new record low on Sunday, dropping past 100,000 rials to the U.S. dollar as Iranians brace for Aug. 7 when Washington is due to reimpose a first lot of economic sanctions.

The rial has lost about half of its value since April because of a weak economy, financial difficulties at local banks and heavy demand for dollars among Iranians who fear the effects of sanctions.

The central bank blamed “enemies” for the fall of the currency and a rapid rise in the prices of gold coins and the judiciary said 29 people had been arrested on charges that carry the death penalty.

On Aug. 7, Washington will reimpose sanctions on Iran’s purchase of U.S. dollars, its trade in gold and precious metals and its dealings with metals, coal and industrial-related software.

Sanctions also will be reapplied to U.S. imports of Iranian carpets and foodstuffs and on certain related financial transactions.

Iran’s oil exports could fall by as much as two-thirds by this year due to sanctions, straining oil markets amid supply outages elsewhere.

***  Diverse, Decentralized, Non-Binary: Iran Popular Uprising ...  photo

As it stands at the moment, it is still possible to characterize the damage done to a Saudi oil tanker in the Red Sea by a Houthi missile as a continuation of the occasional Houthi attacks on Saudi coalition vessels that started in late 2016.  That may be a reason why the latest attack, which occurred on Wednesday 25 July, has gotten little coverage in Western media.

But the sequence of events on Wednesday and Thursday suggests it’s more than that.  The morning of 25 July, Houthi sources reportedly took credit for targeting a Saudi vessel in the Red Sea. Regional reporting suggested their intended target was Saudi frigate Al-Dammam (F-816). Read more in detail here.

Iran Protests: US condemns arrest of 'peaceful' protesters  photo

***Additional reports of regime changes:

The change in the Rouhani administration awaited by both critics and supporters appears to have started on July 25 with the replacement of Iran’s central bank governor and news of the Planning and Budget Organization (PBO) chief’s offer to resign.

This comes as Vice President Eshaq Jahangiri has said economic hardship could prompt the government to resort to food rationing.

Abdolnasser Hemmati was appointed central bank governor,and PBO Chief and Administration spokesman Mohammad Baqer Nobakht told the press he has offered to step down in order to give President Hassan Rouhani a free hand in reshuffling his economic team.

Nobakht added that Rouhani had still not accepted his resignation as of Wednesday afternoon, ISNA reported. Rouhani’s chief of staff also told reporters in Tehran, “Whatthe media quoted Nobakht as saying is not true.”

Iranian media had reported that Rouhani had offered Nobakht’s job to former Economy Minister Ali Tayebnia but that he rejected the offer.

ISNA noted that the fact that the first change in the administration took at the central bank reveals Rouhani’s priorities in tackling the country’s economic crisis.

Reports from Tehran say that changes are also under way at the industry, economy, and housing ministries.

*** A lot of help for the Iranian people coming from the United States. In part:

Pompeo said, “You should know that the United States is not afraid to spread our message on the airwaves and online in Iran, either. For 40 years, the Iranian people have heard from their leaders that America is the Great Satan, we do not believe they’re interested in hearing the fake news any longer.”

***

Mr Pompeo stopped short of calling for regime change, but he announced stepped-up US government broadcasting in Farsi that is likely to foment further unrest against the government.

He said the US Broadcasting Board of Governors is taking steps to circumvent internet censorship in Iran, and creating a round-the-clock Farsi channel across television, radio, digital and social media formats, “so that ordinary Iranians inside Iran and around the globe will know that America stands with them”.

Mr Pompeo said the Trump administration would be willing to hold talks with the Iranian government if it stops repressing dissidents and religious minorities and stops supporting militant groups in conflicts elsewhere in the region. But the one sentence offer in a long speech suggests that Mr Pompeo deems any behaviour change by Iran unlikely.

Many of the Iranian Americans in the audience either fled or are descendants of those who fled the country after the Islamic Revolution toppled the Shah in 1979. Southern California is home to about 250,000 Iranian Americans.

“To our Iranian American and Iranian friends,” Mr Pompeo said, “tonight I tell you that the Trump administration dreams the same dreams for the people of Iran as you do, and through our labours and God’s providence, that day will come true.” More here.

Mass Graves Covered up in Iran

Iran: Road to be built over individual and mass graves

The families of political dissidents who were forcibly disappeared and extrajudicially killed in Ahvaz, southern Iran, in the 1980s are suffering untold mental anguish and distress as the authorities are destroying the individual and mass graves of their loved ones. They are afraid of facing further persecution if they speak out.

***

Amnesty International reports that Iran’s regime is destroying a mass grave of the victims of the 1988 massacre. According to estimates from the opposition, these victims number in the 10s of 1000s (the vast majority from the MEK).

Meanwhile:

The Trump administration must now prepare for near-term Iranian terrorist attacks against the U.S. homeland, because the leader of Iran’s revolutionary guards, or IRGC, external action force gave a very aggressive speech on Thursday.

Addressing followers in the ancient city of Hamedan (a location probably chosen as a metaphor of Iranian durability), Qassem Soleimani warned Americans, “We are closer to you than what you think. You should know that I am your foe. The Quds Force alone and not all the Armed Forces is enough to be your rival. You are aware of Iran’s power in asymmetric war.”

Soleimani means for his words to be taken as references to terrorist attacks. In specific terms, IRGC modus operandi and tactical capability render “closer to you than what you think” and “asymmetric war” as references to Quds force attack cells and cyber-strike teams in the U.S. homeland, South America, and Europe.

But Soleimani wasn’t done there.

Again emphasizing “We are so close to you in places that you might not even think of,” Soleimani declared “You should know that there is not even a single night that we don’t think of destroying you.” Soleimani also drew a sharp reference to his role subjecting U.S. forces in Iraq to explosively formed penetrator attacks, stating “”have you forgotten when you had provided adult-size diapers for your battle tank crews?” EFP attacks killed hundreds of Americans and wounded many more.

Soleimani loved the EFPs for their brutality. In David Finkel’s The Good Soldiers, we hear about U.S. Army Specialist Joshua Reeves, whose vehicle was hit by an EFP in Baghdad. Reeves “wasn’t breathing, his eyes weren’t moving, his left foot was gone, his backside was ripped open, his stomach was filling with blood …” Reeves died the same day that his wife had told him that she had given birth.

And in a reference to Iranian martyrdom ideology, deeply vested in the revolution’s theological appropriation of the Battle of Karbala, Soleimani concluded, “We are thirsty for martyrdom and annihilation of arrogant powers.”

He wants the U.S. to know the IRGC will proudly die for their cause.

The U.S. may now have to help them on that course, because the U.S. must respond deliberately to this speech.

First off, President Trump should recognize that the Iranians aren’t playing around here. Soleimani has the pedigree to render very bloody terrorist attacks into action. He also has no qualms about massacring U.S. civilians (the Quds force nearly blew up a Washington, D.C., restaurant in 2011) and recently tried to blow up a Paris conference attended by U.S. officials. Indeed, Soleimani’s words exemplify why we argued this week that Trump must be more focused in his red-line warnings to Iran.

But what specifically should be done?

Both Trump and Secretary of State Mike Pompeo should take the lead in warning that any terrorist attacks on the U.S. will result in two immediate effects.

First, aggressive U.S. military strikes on IRGC infrastructure belonging to the Quds force and the IRGC at large. Pompeo’s role is important here because the former CIA director took a tough line against the IRGC, and Soleimani knows he means business.

Second, the U.S. should make clear that Soleimani and his senior leadership figures will be personally targeted. While some, like former Obama administration official Tommy Vietor, believe such threats would be outrageous, it is important that the Iranian hardliners know any terrorist attacks will not meet a standard fare response. They must know that the U.S. will metaphorically gut them if they come for our citizens. If Soleimani and his cadre do not understand that U.S. deterrent posture, they will kill innocent Americans. Evidencing their willingness to up the ante, the Quds Force directed Houthi rebel forces in Yemen to target cargo vessels passing through the Red Sea on Wednesday.

But the Trump administration should also be clear about where this is heading. As it attempts to destabilize the Iranian regime with economic pressure, the Iranian regime is showing that it will not go down without a fight.

Ultimately, Qassem Soleimani’s threats should be taken very seriously. He is a skilled commander with significant terrorist capabilities and an ideologically vested hatred for America. He must be dealt with as such.