57,000 Detections, 74 Countries Affected by Global Ransomware

 

Go here for more information on malware affections.

Further, US-CERT, by DHS has this information.

 

 

Older machines running XP do not appear to be affected. Meanwhile, about a month ago:

Microsoft responds to NSA’s Windows exploits, urges customers to upgrade to supported versions

Remember, this NSA vault toolkit was stolen, leaked and published by WikiLeaks, Julian Assange. In some cases, it could be a deadly threat to life considering the intrusions into hospitals. The other blame goes to the Russian cyber gang, ShadowBrokers.

Russian-linked cyber gang Shadow Brokers blamed for NHS computer hack 

Ransom message found on NHS computersCourtesy: TelegraphUK: Ransom message found on NHS computers

CyberScoop: Large organizations on every continent are being hit by a global campaign of ransomware attacks on Friday, unfortunately, average ransomware demand has increased significantly. Machines are being infected using exploits developed by the U.S. National Security Agency and leaked by the group known as ShadowBrokers, according to authorities.

More than 57,000 detections in 74 countries have been recorded. Russia appears to be the most infected country by far, according to cybersecurity firms Kaspersky and Avast.

The “number [is] still growing fast,” according to Costin Raiu, Kaspersky’s director of research.

Hospitals across England were forced to divert emergency patients, according to the National Health Service. Other hospitals are asking patients to avoid coming in except for emergencies, news reports said.

In Spain, victims including the telecommunications company Telefónica told employees to shut down machines and networks in an effort to stop the spread of the malware. Other victims include Gas Natural and Iberdrola, an electric utility firm.

The ransomware campaign is caused by “exploiting the vulnerability described in bulletin MS17-010 using EternalBlue / DoublePulsar,”Spain’s Computer Emergency Readiness Team explained on Friday. “Infection of a single computer can end up compromising the entire corporate network.”

EternalBlue and DoublePulsar are code names for NSA hacking tools used to infect thousands of machines around the world since the NSA tools leaked in April.

That description from Spanish authorities and the work of several researchers point directly to NSA tools hacked and leaked by ShadowBrokers. The patch that Microsoft published in March assigned the designation MS17-010 to the vulnerability.

A widespread “bloodbath” from criminals has been expected by experts since the leak.

The ransomware “infects the machine by encrypting all its files and, using a remote command execution vulnerability through SMB, is distributed to other Windows machines on the same network. Microsoft published the vulnerability on March 14 in its bulletin and a few days ago a proof of concept was released that seems to have been the trigger of the campaign.” SMB is Microsoft’s Server Message Block protocol for network file sharing.

The attacks in different countries have been linked to the same group, according to the Financial Times.

The U.S. Department of Homeland Security is “coordinating with our international cyber partners” in Europe and Asia, a spokesperson told CyberScoop. “The Department of Homeland Security stands ready to support any international or domestic partner’s request for assistance. We routinely provide cybersecurity assistance upon request, including technical analysis and support.  Information shared with DHS as part of these efforts, including whether a request has been made, is confidential.”

Security researcher Kevin Beaumont advised patching machines immediately:

** Kevin Beaumont?Verified account @GossiTheDog5h5 hours ago 

Confirmed – wcry ransomware spreading across Europe uses EternalBlue/MS17-010/SMB. PATCH NOW EVERYWHERE.

Spanish authorities confirmed the ransomware is a version of WannaCry (also known as WannaCrypt0r), according to the National Cryptology Center. In Spain, the newspaper El Mundo is reporting that “early indications point to an attack originating in China.”

“Given the rapid, prolific distribution of this ransomware, we consider this activity poses high risks that all organizations using potentially vulnerable Windows machines should address,” a spokesperson from the cybersecurity firm FireEye told CyberScoop. “Organizations seeking to take risk management steps related to this campaign can implement patching for the MS17-010 Microsoft Security bulletin and leverage the indicators of compromise identified as associated with this activity.”

FireEye has yet to see a U.S.-based company be affected by the ransomware worm.

An estimated 25 health facilities in London and across England have been hit, according to the NHS. St Bartholomew’s Hospital in London, one of the victims, received warnings earlier this year that computers using Windows XP were vulnerable, reported the technology news site the Inquirer. Increasingly, some infected hospitals are not accepting phone calls or internet communications. The Derbyshire Community Health Services NHS Trust has reportedly shut down all of its IT systems.

“At this stage we do not have any evidence that patient data has been accessed,” an NHS statement said. “We will continue to work with affected organizations to confirm this.”

East and North Hertfordshire NHS trust, a hospital just north of London, publicly acknowledged “a major IT problem” that is “believed to be caused by a cyber attack.”

“The trust is postponing all non-urgent activity for today and is asking people not to come to A&E – please ring NHS111 for urgent medical advice or 999 if it is a life-threatening emergency,” according to a statement. “To ensure that all back-up processes and procedures were put in place quickly, the trust declared a major internal incident to make sure that patients already in the trust’s hospitals continued to receive the care they need.”

News of the English hospitals being hit with ransomware spread quickly among doctors and hospital employees, including in a widely shared message from an English doctor now making the rounds on social media.

**

If.ra? @asystoly6h6 hours ago  Why would you cyber attack a hospital and hold it for ransom? The state of the world ?

“So our hospital is down,” the doctor wrote. “We got a message saying your computers are now under their control and pay a certain amount of money. And now everything is gone.”

No Cyber Policy, Doctrine, Protection, Result of Senate Hearing

President Trump signed another executive order today. This one is on cyber security and protecting infrastructure. Read it here.

Image result for trump signs executive order BusinessInsider

No one wants to participate in the hard debate regarding cyber, where it is noted to be the highest threat for the homeland. At least the Trump White House is taking note, yet this executive order may not be enough or engage the private sector. It is gratifying however that some inside and outside experts are in fact having talks on an international basis with cyber experts. That is always a good thing.

At issue on this topic is the path forward and the estimated costs. Cyber is a battlespace where it should be noted it could cost what conventional military operations costs against adversaries and could take as long if not forever. All government infrastructure is dated, unprotected and there are no measures to correct in a priority ranking.

The other item of note, there is no legal or case law condition where the cyber attackers are prosecuted. Exactly why did Sony not sue North Korea? If there is no consequence, even ceremoniously, then expect more hacks. Of note, to sue and or sanction North Korea, China would have to be included, as the internet connectivity to North Korea is provided by China and further, China trained the hackers in North Korea….sheesh right?

Politico reports: The directive is Trump’s first major action on cyber policy and sets the stage for the administration’s efforts to secure porous federal networks that have been repeatedly infiltrated by digital pranksters, cyber thieves and government-backed hackers from China and Russia.

“The trend is going in the wrong direction in cyberspace, and it’s time to stop that trend and reverse it on behalf of the American people,” White House Homeland Security Adviser Tom Bossert told reporters during a Thursday afternoon briefing.

Cyber specialists say the order breaks little new ground but is vastly improved over early drafts, which omitted input from key government policy specialists. The final version, cyber watchers say, essentially reaffirms the gradually emerging cyber policy path of the past two administrations.

As part of the executive order’s IT upgrade initiative, administration officials will study the feasibility of transitioning to shared IT services and networks across the government. An estimated 80 percent of the $80 billion federal IT budget goes toward taking care of aging systems.

Senior Trump adviser Jared Kushner’s Office of American Innovation will play a significant role in the federal IT modernization effort, multiple people tracking the efforts have told POLITICO. Earlier this month, Trump signed an executive order creating the American Technology Council, with Kushner as director, to help coordinate that effort. More here.

*** Personally, it must be mentioned there is a problem with this operating out of the White House and certainly out of Jared Kushner’s office, he is way too tasked to be effective. Other professionals in the cyber realm agree, the matter of a ‘net’ command and operations that collaborate with the private sector should be it’s own command and separated from NSA.

There was a significant hearing today on The Hill while the FBI hearing was going on. Those on the witness panel included James Clapper, Jim Stavridis and Michael Hayden. The Senate Armed Services Committee hosted this session and it included high rate discussions including why there is no cyber doctrine, why there are no offensive measures and what the highest cyber threats are for the homeland.

Syria: Memorandum signed, De-escalation Zones are NOT Safe Zones

This is terrifying for the Syrian people that remain in country and just as bad as the millions of refugees, noted to be about 11 million that have fled the country. Their hopes of ever returning to their home country fades each day.

It is also notable that the United States and coalition countries do have boots on the ground in Syria and the matter of an offensive operation to liberate Raqqa Syria, the headquarters for Islamic State is not even mentioned in this newly signed document. There is no mention of the United States operations in Syria along with other allied countries. Are the skies to be conflicted again? Any mention of the use of U.S. operations out of Incirlik, Turkey? Nope.

Some will read this and reply that the United States has no interest in Syria. As long as refugees and migrants continue to arrive across the United States each month and as long as there are more than 1000 open terror cases being investigated by the FBI and DHS, we DO have a dog in this hunt.

“The functioning of the checkpoints and observation posts as well as the administration of the security zones shall be ensured by the forces of the Guarantors by consensus”

 

6 May 201712:41

Memorandum on the creation of de-escalation areas in the Syrian Arab Republic Official website of The Ministry of Foreign Affairs of the Russian Federation

http://www.mid.ru/en/foreign_policy/news/-/asset_publisher/cKNonkJE02Bw/content/id/2746041

 

The Islamic Republic of Iran, the Russian Federation and the Republic of Turkey as guarantors of the observance of the ceasefire regime in the Syrian Arab Republic (hereinafter referred to as “Guarantors”):

-guided by the provisions of UNSC resolution 2254 (2015); -reaffirming their strong commitment to the sovereignty, independence, unity and territorial integrity of the Syrian Arab Republic; -expressing their determination to decrease the level of military tensions and to provide for the security of civilians in the Syrian Arab Republic, have agreed on the following.

1.the following de-escalation areas shall be created with the aim to put a prompt end to violence, improve the humanitarian situation and create favorable conditions to advance political settlement of the conflict in the Syrian Arab Republic:

– Idlib province and certain parts of the neighbouring provinces (Latakia, Hama and Aleppo provinces); -certain parts in the north of Homs province; -in eastern Ghouta; -certain parts of southern Syria (Deraa and Al-Quneitra provinces).

The creation of the de-escalation areas and security zones is a temporary measure, the duration of which will initially be 6 months and will be automatically extended on the basis of consensus of the Guarantors.

2.Within the lines of the de-escalation areas:

-hostilities between the conflicting parties (the government of the Syrian Arab Republic and the armed opposition groups that have joined and will join the ceasefire regime) with the use of any kinds of weapons, including aerial assets, shall be ceased; -rapid, safe and unhindered humanitarian access shall be provided; -conditions to deliver medical aid to local population and to meet basic needs of civilians shall be created; -measures to restore basic infrastructure facilities, starting with water supply and electricity distribution networks, shall be taken; -conditions for the safe and voluntary return of refugees and internally displaced persons shall be created.

3.Along the lines of the de-escalation areas, security zones shall be established in order to prevent incidents and military confrontations between the conflicting parties.

4.The security zones shall include:

 

– Checkpoints to ensure unhindered movement of unarmed civilians and delivery of humanitarian assistance as well as to facilitate economic activities;

 

– Observation posts to ensure compliance with the provisions of the ceasefire regime.

The functioning of the checkpoints and observation posts as well as the administration of the security zones shall be ensured by the forces of the Guarantors by consensus. Third parties might be deployed, if necessary, by consensus of the Guarantors.

5.The Guarantors shall:

-take all necessary measures to ensure the fulfillment by the conflicting parties of the ceasefire regime; -take all necessary measures to continue the fight against DAESH/ISIL, Nusra Front and all other individuals, groups, undertakings and entities associated with Al-Qaeda or DAESH/ISIL as designated by the UN Security Council within and outside the de-escalation areas; -continue efforts to include in the ceasefire regime armed opposition groups that have not yet joined the ceasefire regime.

6.The Guarantors shall in 2 weeks after signing the Memorandum form a Joint working group on de-escalation (hereinafter referred to as the “Joint Working Group”) composed of their authorized representatives in order to delineate the lines of the de-escalation areas and security zones as well as to resolve other operational and technical issues related to the implementation of the Memorandum.

The Guarantors shall take steps to complete by 4 June 2017 the preparation of the maps of the de-escalation areas and security zones and to separate the armed opposition groups from the terrorist groups mentioned in para.5 of the Memorandum.

The Joint Working Group shall prepare by the above-mentioned date the maps of the de-escalation areas and security zones to be agreed by consensus of the Guarantors as well as the draft Regulation of the Joint Working Group.

The Joint Working Group shall report on its activities to the high-level international meetings on Syria held in Astana.

The present Memorandum enters into force the next day after its signing.

Done in Astana, 4 May 2017 in three copies in English, having equal legal force.

 

Signatures

Islamic Republic of Iran   Russian Federation   Republic of Turkey

***

Russia is telling the entire Western world they are in control and alleges full cooperation and approval not only from the United Nations but claims the Trump administration has also agreed. Read on as it also shows maps of the ‘de-escalation zones’.

Russian Defense Ministry Held A Briefing Titled “Principles Of Implementation Of The Memorandum On Syria De-Eescalation Zones Signed In Astana”

Russian Defence Ministry held a briefing titled “Principles of implementation of the Memorandum on Syria de-escalation zones signed in Astana”


Speech of the Deputy Defence Minister of Russia

Lieutenant General Alexander Fomin

Good day, ladies and gentlemen!

The Ministry of Defence of the Russian Federation is holding a briefing on the main points and principles of implementation of the Memorandum on Syria de-escalation zones signed in Astana.

The event is participated by the Chief of the Main Operational Directorate – the First Deputy Chief of the General Staff of the Russian Armed Forces Colonel General Sergei Rudskoy and Deputy Chief of the Main Operational Directorate Lieutenant General Stanislav Gadjimagomedov.

As you know, yesterday, after two-day negotiations held in Astana, plenipotentiaries from Russia, Iran and Turkey signed a Memorandum on Syria de-escalation zones.

For reference:

The Russian party was represented by the Special envoy of the President of the Russian Federation on the settlement of the Syrian conflict A. Lavrentiev.

The Turkish party was represented by the Deputy Minister of Foreign Affairs of Turkey S. Onal.

Iran is represented by the Deputy Minister of Foreign Affairs of Iran H. Ansari.

First, we should briefly inform you about the preparation of the agreement, its participants and ideas.

The document had been elaborated by the Russian Defence Ministry upon the direct order of the Supreme Commander-in-Chief of the Russian Armed Forces Vladimir Putin to maintain the ceasefire on the territory of Syria.

The adoption of the Memorandum had been preceded by a thorough work with all the participants of the negotiation process.

The political settlement in Syria had been numerously discussed by the President of the Russian Federation with the leadership of Turkey, the USA and other states.

In particular, de-escalation zones were negotiated in the course of the talks with the Heads of Russia and Turkey on May 3 in Sochi.

The Russian Defence Minister held bilateral talks with Ministers of Defence of Iran, Turkey, Syria and Israel.

Intelligence services and foreign affairs departments cooperated with each other permanently. A large work was done in order to convince the Syrian leadership and leaders of armed opposition formations to take measures aimed to deescalate the conflict.

Constructive attitude of Iran and Turkey, which had supported building up of the ceasefire regime, has played an important role in operative development of the Memorandum.

Position of the United States positively influenced on establishment of the de-escalation zones. The US supported measures aimed to reduce violence in Syria, improvement of humanitarian situation and creation of conditions promoting political settlement of the conflict.

António Guterres, the Secretary-General of the United Nations, supported the signing of the Memorandum. He welcomed decisions on stoppage of use of weapons and increasing of opportunities for providing humanitarian aid to the population.

Efforts of Staffan de Mistura, the United Nations Envoy to Syria, are highly appreciated. Staffan de Mistura jointly with a group of high-qualified experts had arrived in Astana to support the negotiations.

Memorandum is a landmark document, implementation of which will allow to separate the opposition from the ISIS and Jabhat al-Nusra.

Free access in the de-escalation zones for providing medical, product and other assistance to the Syrian population will be granted.

Recovery of infrastructural objects will be organized.

All these issues will create conditions for safe and voluntary return of refugees and internally displaced persons.

Implementation of the Memorandum will allow to stop warfare and civil war in Syria.

That is why the document is important for political settlement of conflict in the Syrian Arab Republic.

Not everybody appreciates it. At the same time, its signing supported by all main interested players: the UN, the US administration, the leadership of Saudi Arabia and other countries. That is a guarantee of its implementation.

The Memorandum comes into effect tomorrow, i.e. from 00.00 May 6, 2017.


Speech of the Chief of the Main Operational Directorate

Colonel General Sergei Rudskoy

Command staff of the Russian force grouping has taken a complex of measures, which had provided favourable conditions for signing the Memorandum.

Starting from May 1, the Russian Aerospace Forces have stopped operating in the de-escalation zones determined by the Memorandum.

On May 2 and 3, The Russian Centre for reconciliation of opposing sides jointly with leadership of the Syrian Arab Republic organized delivery of a humanitarian convoy of the United Nations, International Committee of the Red Cross, and the Syrian Arab Red Crescent in Duma and the Eastern Ghouta region.

Military police units of the Russian Armed Forces escorted the 51-automobile convoy. Four unmanned aerial vehicles covered the moving convoy.

Russian military servicemen detected and neutralized a suicide bomber armed with 10-kilogram explosives and grenades. They handed him over to representatives of the Syrian security service.

The Memorandum provides creation of four de-escalation zones in the Syrian Arab Republic.

First one is most extensive located in the north of Syria. It includes the Idlib province as well as north-eastern areas of the Latakia province, western areas of the Aleppo province, and northern areas of the Hama province. There are more than 1 million people in the zone. 14,500-men strong armed formations are controlling this zone.

The second one is in the north of the Homs province. It includes al-Rastan and Tell Bisa as well as nearest areas controlled by the opposition groups. The groups consist of up to 3,000 insurgents. There are about 180,000 civilians in the zone.

The third one is Eastern Ghouta. About 9,000 insurgents are controlling it.

About 690,000 civilians live in Eastern Ghouta. The Syrian authorities have deployed eight checkpoints for their transfer. In the morning, most civilians leave Eastern Ghouta for Damascus for earning money, and, in the evening, they come back.

This zone does not include the area of Kabun controlled by insurgents of Jabhat al-Nusra. The Damascus city, and the Russian Embassy in particular, are shelled from there. Operation aimed to eliminate terrorists in this area is continued.

The fourth zone is located in the south of Syria and includes areas of the Daraa and Quneitra provinces. This zone is mainly controlled by units of so-called Southern Front (15,000 men strong). Up to 800,000 civilians live there.

The Memorandum provides additional de-escalation zones if necessary.

In the de-escalation zones, warfare between the government troops and armed opposition units joined or are to join the ceasefire regime is being stopped.

This refers to use of all types of weapons, including aviation strikes.

Special attention is paid to control implementation of the ceasefire regime.

In order to prevent incidents and combat actions between the opposing sides along the de-escalation zone borders, security lanes are established. These lanes include posts for observation of reconciliation regime and checkpoints for controlling movement of civilians without weapons, delivery of humanitarian aid, and support of economical activity.

Operation of the checkpoints and observation posts as well as control over security zones will be provided by personnel from Russia, Iran, and Turkey. Forces from other countries can be involved under agreement of state-guarantors.

Command staff of the Russian grouping under the leadership of the General Staff of the Russian Armed Forces is determining the number of necessary checkpoints and observation posts as well as forces supporting their operation.

Within two weeks, representatives of state-guarantors will form a Joint working group. The group will present borders of the de-escalation zones and safety lanes as well as maps for separating formations of armed opposition from terrorist groupings by July 4, 2017.

It is to be stressed that signing of the Memorandum on creation of the de-escalation zones in the Syrian Arab Republic does not stop fighting against terrorists of the ISIS and Jabhat al-Nusra in Syria.

State-guarantors undertake to continue fighting against formations of these and other terrorist organizations in the de-escalation zones as well as provide assistance to the government troops and armed opposition in fighting insurgents in other areas of Syria.

After establishing of the de-escalation zones, the government troops will be sent to continue offensive on the ISIS formations in the central and eastern parts of Syria as well as to liberate areas located along the River Euphrates.

The Russian Aerospace Forces will support these actions.


Speech of the Deputy Chief of the Main Operational Directorate

of the General Staff of the Russian Armed Forces

Lieutenant General Stanislav Gadjimagomedov

Ladies and gentlemen!

Active preliminary work with our partners has contributed to the results of negotiations in Astana. To this purpose, the working group of the Russian Defence Ministry held a meeting with the leadership of Syria on April 25 in Damascus and on April 26 – in Ankara with representatives of Turkey and leaders of armed formations of the opposition.

In the course of the meetings, we have explained in detail to our partners the methods of creation of safety zones, the mechanism of control over the implementation of the agreements, organization of the humanitarian access and restoration of the peaceful life.

Delegations of the Russian Defence Minister conducted the same work simultaneously in Tehran and Amman.

Just in the course of the preliminary work, we managed to enlist support of guarantor states and the opposing sides for our initiatives.

These activities ensured constructive work of the representatives from Turkey, Iran, the UN and the Syrian government at the meeting in Astana.

The lack of trust between the representatives of the Syrian government and the oppositions gave rise to some difficulties in the course of negotiations.

Despite the intention of all the delegations to sign the document, the initial points of view of the parties differed. First, that concerned the issues of security of the civil population in the de-escalation zones and organization of control over the implementation of the ceasefire agreements by the parties.

The peculiarity of negotiations in Astana is the fact that the opposition was represented by field commanders who really control the situation “on the ground”, but not politicians or emigrants.

Despite the conflict with the government troops, these people realize their responsibility for the future of the united Syrian state.

In the course of frank talks, common methods of stabilization of the situation in Syria were elaborated. We managed to agree on Memorandum with the field commanders of 27 detachments active in the de-escalation zones.

The constructive position of representatives from Iran and Turkey played an important role in achieving agreements as both countries as guarantor states had incurred the responsibility for implementation of the ceasefire.

The Special Envoy of the UN Secretary General Staffan de Mistura made an important contribution to the most tough periods of negotiations. He held several meetings with opposition representatives and convinced them of the importance of the Memorandum for stabilization of the situation in Syria.

It is also important that the results of the talks in Astana are considered by Staffan de Mistura as an influential contribution to the political dialogue in Genève.

The UN experts have rendered considerable assistance, their peace-making experience, practical recommendations were took into account during the elaboration of the Memorandum.

The high level of organization of negotiations provided by the leadership of the Republic of Kazakhstan also contributed to the success of the talks. During each stage of the conversations all the delegations were provided with support by our Kazakh colleagues.

In the near future, the main efforts will be concentrated on the establishment of a Joint working group for de-escalation, preparation of maps with coordinates of safe margins and buffer zones and their negotiation with the partners.

The reports on the activities of the Group will be heard during the international meetings on the Syrian conflict settlement within the Astana process.

Moreover, the mechanism of effective control over the implementation of agreements mentioned by Colonel General Sergei Rudskoy will be elaborated jointly with the partners. This work has already been started.

We plan to continue the work with partners on elaboration of additional trust-building measures for the opposing sides. First of all, this concerns the liberation of persons retained forcibly by both sides of the conflict as well as the humanitarian mine clearance.

We expect further interaction with our partners within the Astana process, the observer countries as well as the support of international organizations, first of all the UN.

Thank you for your attention.


Media representatives’ questions

Yekaterina Babayeva, reporter, KSB TV-channel (Republic of Korea) – a question to Colonel General Sergei Rudskoy

– After the adoption of the Memorandum on Syria de-escalation zones, where will the main efforts of the Aerospace Forces be concentrated for elimination of terrorist groupings?

Sergei Rudskoy:

– De-escalation zones will allow the government troops to release many units. The Russian Aerospace Forces will continue supporting the Syrian Armed Forces while eliminating illegal armed groups of the ISIL international terrorist organization.

The main efforts will focused on the development of the offensive in the east from Palmyra and further lifting a siege of the Deir ez-Zor city, which is besieged for over three years as well as on the liberation of the north-eastern territories in the Aleppo province along the Euphrates River.

Yaroslav Kurashov, reporter of NHK TV-channel (Japan), a question to Lieutenant General Stanislav Gadjimagomedov

Which measures are prescribed for the violators of the Memorandum?

Stanislav Gadjimagomedov:

First, a thorough investigation will be held. According to the results, the measures applied to the violators will be defined. Among them – neutralization by fire.

Alexey Konopko, reporter of the Россия-24 TV-channel, a question to Colonel General Sergei Rudskoy

– Is Russia planning to recommence the Memorandum between Russia and the USA on prevention of incidents in the air space over Syria?

Sergei Rudskoy:

– This agreement is an effective means of prevention of incidents in the air. After the US cruise missile strike against the Shayrat Air Base, the Russian party has suspended its participation in this agreement.

The question of returning to the cooperation within the Memorandum on prevention of incidents in the air space over Syria will be discussed in the course of bilateral contacts with the American colleagues in the nearest future.

Antonio Rondon Garcia, reporter of the Prensa Latina (Cuba), a question to Lieutenant General Alexander Fomin

– Is it planned to extend the number of participants in the de-escalation process?

Alexander Fomin:

Yes, it is. Now we are working on this issue with Jordan and a number of other states.

In the conclusion, I would like to thank you for responding to our invitation.

Traditionally, the Russian Defence Ministry pays great attention to the covering of its activities by the media. We will continue informing you about the most important events including the Syrian topic.

Taking the opportunity, I would like to congratulate all of you with the upcoming Victory Day and to wish you peaceful sky.

Thank you for your attention.

China Hacked the FDIC, will Trump Sanction?

Beyond not trusting Russia, the same holds true for Iran. But then there is China. Trump should never allow China to take the lead in handling North Korea. Anyway, back to hacking and covert hegemony in Latin America.

Related reading:

Problems uncovered after employees walk off job with thousands of SSNs on flash drives.

Image result for china hacked fdic

China hacked FDIC, US officials covered it up, report says

China’s spies hacked into computers at the Federal Deposit Insurance Corporation from 2010 until 2013 — and American government officials tried to cover it up, according to a Congressional report.

The House of Representative’s Science, Space and Technology Committee released its investigative report on Wednesday.

It presents the FDIC’s bank regulators as technologically inept — and deceitful.

According to congressional investigators, the Chinese government hacked into 12 computers and 10 backroom servers at the FDIC, including the incredibly sensitive personal computers of the agency’s top officials: the FDIC chairman, his chief of staff, and the general counsel.

When congressional investigators tried to review the FDIC’s cybersecurity policy, the agency hid the hack, according to the report.

Investigators cited several insiders who knew about how the agency responded. For example, one of the FDIC’s top lawyers told employees not to discuss the hacks via email — so the emails wouldn’t become official government records.

FDIC Chairman Martin Gruenberg is being summoned before the Congressional committee on Thursday to explain what happened.

The FDIC refused to comment. However, in a recent internal review, the agency admits that it “did not accurately portray the extent of risk” to Congress and recordkeeping “needs improvement.” The FDIC claims it’s now updating its policies.

Given the FDIC’s role as a national banking regulator, the revelation of this hack poses serious concern.

The FDIC’s role is to monitor any bank that isn’t reviewed by the Federal Reserve system. It has access to extremely sensitive, internal information at 4,500 banks and savings institutions.

The FDIC also insures deposits at banks nationwide, giving it access to huge loads of information on Americans.

“Obviously it’s indicative of the Chinese effort to database as much information as possible about Americans. FDIC information is right in line with the deep personal information they’ve gone for in the past,” said computer security researcher Ryan Duff. He’s a former member of U.S. Cyber Command, the American military’s hacking unit.

“Intentionally avoiding audits sounds unethical if not illegal,” he added.

Congressional investigators discovered the hacks after finding a 2013 memo from the FDIC’s own inspector general to the agency’s chairman, which detailed the hack and criticized the agency for “violating its own policies and for failing to alert appropriate authorities.”

The report also says this culture of secrecy led the FDIC’s chief information officer, Russ Pittman, to mislead auditors. One whistleblower, whose identity is not revealed in the report, claimed that Pittman “instructed employees not to discuss… this foreign government penetration of the FDIC’s network” to avoid ruining Gruenberg’s confirmation by the U.S. Senate in March 2012.

David Kennedy, a computer security expert and former analyst at the NSA spy agency, worries that federal agencies are repeatedly hiding hacks “under the blanket of national security.”

“With such a high profile breach and hitting the top levels of the FDIC, it’s crazy to me to think that this type of information wasn’t publicly released. We need to be deeply concerned around the disclosure process around our federal government,” said Kennedy, who now runs the cybersecurity firm TrustedSec.

This same committee, led by Republican Congressman Lamar Smith of Texas, has previously criticized the FDIC for minimizing data breaches.

Several cybersecurity experts — who have extensive experience guarding government computers — expressed dismay at the alleged cover-up.

“It’s incumbent upon our policymakers to know about these data breaches so we can properly evaluate our defenses. Trying to hide successful intrusions only makes it easier for the next hacker to get in,” said Dan Guido, who runs the cybersecurity firm Trail of Bits.

Image result for china in latin america

***  China’s Great Leap Into Latin America

U.S. President Donald Trump’s opposition to the North American Free Trade Agreement and his withdrawal from the Trans-Pacific Partnership have led some critics to claim that the United States is turning its back to regional trading partners, and that Trump is thus freeing up China to make inroads into Latin America. But China’s presence in the Western Hemisphere is already well-established, having predated Trump’s election by almost 20 years. Beijing’s involvement in the region is subject to the ebb and flow of the region’s economic and political changes, but it stems from the needs both of China and corresponding Latin American capitals.

But if China’s position has long since become a fixture in the hemisphere, it is equally true that U.S. policymakers have been remarkably complacent over the years as the growing Chinese presence has necessarily impacted not only the region, but U.S. political, economic, and security interests. That needs to change.

China’s interest in Latin America is both economic and strategic.  It was the accelerating Chinese economy’s voracious appetite for raw materials that keyed its entry to the region, a land of plenty when it comes to natural resources. Iron, soybeans, copper, and oil make up the bulk of Chinese imports from the region. In turn, securing access to Latin American markets for the export of Chinese manufactured products became a priority as well.

Image result for china in latin america

Economic Push

The numbers are staggering. China joined the World Trade Organization in 2001, and its bilateral trade with Latin America and the Caribbean has since skyrocketed, from $15 billion in 2001 to $288.9 billion in 2013 — an increase of almost 2000 percent. That number now represents 6 percent of China’s total foreign trade, an increase from 2.7 percent in 2000. (Some 13 percent of Latin America’s trade is now done with China, up from negligible levels in 2000.)

In the past decade, China’s two biggest development banks have provided $125 billion to Latin America — more than the combined total lending of the World Bank and the Inter-American Development Bank. China is now Latin America’s largest creditor. In addition, between 2000 and 2015, Chinese leaders visited the region more than 30 times.

Last November, Chinese President Xi Jinping made his third trip to the region since 2013, announcing a plan to double bilateral trade and to increase investment stock value by 150 percent over the next decade.

Not Just Economics

China also has significant geopolitical interests. It wants to project power and influence in an area long considered to be within the U.S. sphere of influence — no doubt a response to what Beijing considers U.S. efforts to contain and encircle China in Asia by cultivating allied and friendly governments.

Critical to China’s aspirations as a growing global power as well is what it calls global governance reform. In translation, that means Beijing uses its growing trade and financial might to challenge the architecture of the U.S.-dominated post-World War II order and alter it along lines more favorable to China. Beijing sees developing its own alliances through trade and loans as an important way to counterbalance U.S. influence and to secure support in multilateral forums on such important issues to Beijing as human rights, climate change, and economic governance.

It bears noting that China considers its principal regional economic and political interlocutor to be the Community of Latin America and Caribbean States, an organization established by the late Venezuelan firebrand Hugo Chavez that purposefully excludes the United States and Canada.

Finally, it is no coincidence that of the 22 countries that diplomatically recognize Taiwan, 12 are in Latin America and the Caribbean. China wants specifically to erode this support for Taipei. As a Chinese white paper on Latin America and the Caribbean in 2008 put it succinctly, “the One China principle is the political basis for the establishment and development of relations between China and Latin America.”

Changing Times

Chinese demand for commodities keyed its entry into the region and helped produce one of Latin America’s fastest periods of growth in decades, but the times are changing. Lackluster global economic growth and the cooling Chinese economy (which has contributed to the end of the global commodity boom) have resulted in a drop in Chinese imports from and exports to Latin America in recent years. Indeed, over the past year regional revenues from commodity exports to China dropped some 40 percent.

Latin America is also changing politically. China’s initial push into the Western Hemisphere was facilitated by the rise to power of a host of leftist populist governments — a phenomenon collectively referred to as the Pink Tide. Many leaders, foremost among them Venezuela’s Hugo Chavez, were determined to distance themselves from the United States and from institutions perceived to be allied with Washington. These leaders were happy to align themselves with China, which adheres to a supposed policy of non-interference in countries’ internal affairs. That equally suited a number of Latin American governments, which proceeded to undermine democratic institutions and the rights of their citizens.

However, with the bust in oil prices and other commodities exposing the economic dysfunction of the populist model, frustrated voters are shifting their support to more pragmatic, market-friendly governments. These governments can be expected to operate in a more sober and transparent manner, and to be more respectful of democratic institutions, eschewing the opaque, behind-the-scenes deals that China previously thrived on. With less opportunity to present itself as the buyer or lender of last resort, China will find itself needing to adapt to a more challenging and competitive environment.

Beijing seems to be adjusting well: China’s evolving economic strategy is now one of diversification, with an emphasis less on traditional industries such as mining and energy extraction and more on sectors such as infrastructure (including energy, airports, seaports, and roads), construction, telecommunications, manufacturing, finance, agriculture, tourism, and even the space sector.

Implications for the United States

China’s authoritarianism, global designs, and disregard for international norms and practices raise serious questions about the impact of its engagement in the Western Hemisphere on the promotion of democracy, human rights, and the rule of law. In recent congressional testimony, U.S. Southern Commander Adm. Kurt Tidd put it like this:

For Russia, China, and Iran, Latin America is not an afterthought. These global actors view the Latin American economic, political, and security arena as an opportunity to achieve their respective long-term objectives and advance interests that may be incompatible with ours and those of our partners. Their vision for an alternative international order poses a challenge to every nation that values non-aggression, rule of law, and respect for human rights — the very same principles that underlie the Inter-American system of peace and cooperation. Some of what they’re doing — while not a direct military threat — does warrant examination. Even seemingly benign activities can be used to build malign influence.

This was certainly evident in recent years, with China providing anti-American governments with an alternative source of trade, investment, and finance outside conventional institutions that ordinarily require some conditionalities on good governance, transparency, anti-corruption efforts, human rights, and the rule of law.  In some cases, it didn’t create major problems. In others, such as Venezuela ($65 billion in Chinese loans) and Ecuador ($11 billion), Beijing bankrolled authoritarianism and human rights abuses, undercutting U.S. efforts to promote its policy agenda in the Americas and setting the stage for the chaos now underway in Venezuela.

Yet it is not as though the United States can block or impede Chinese trade and investment in the hemisphere. It is also important to keep things in perspective: U.S. trade with Latin America is still three times larger than China’s. Nor can China match our proximity, cultural and familial ties, and long shared history. The best response therefore to the Chinese presence in the Western Hemisphere is to do what the United States does best: compete.

The situation is best approached as a strategic competition in which the United States employs its comparative advantages and the above described strengths to secure its role as the preferred partner of choice for our Latin American neighbors. China may have the cash advantage, but it cannot compete with the United States in terms of the aforementioned, nor in the agreements shared throughout the Western Hemisphere on rules-based behavior, transparency, and a belief in economic opportunity, strong institutions, and the rule of law. The United States also boasts a 50-year record of promoting sustainable long-term regional development and humanitarian projects, a commitment to corporate social responsibility,  and — not to put too fine a point on it — laws that prohibit bribery and other corrupt practices that often undermine the public’s faith in their systems.

This is in contrast to the Chinese presence, where cultural differences, radically divergent value systems, and different ways of doing business often impair mutual understanding and trust. China also has a poor record on human rights, anti-corruption practices, and environmental and labor conventions. (In many cases, Chinese construction companies import Chinese workers, spurring local resentments over lost employment opportunities.)

On the economic front, many economists worry that China’s demand for raw materials harkens back to Latin America’s bad old days of too much dependence on commodity exports. Neither do they see purchasing Chinese manufactured goods in return as being conducive to long-term development. Again, in contrast, the United States provides meaningful value-added, job-creating investment in the region while purchasing the sort of manufactured goods that generate more jobs.

Game On

Whatever professions of a win-win economic situation for all, or of China’s benign intent, China’s position in Latin America affects the U.S. agenda and regional stability — and Beijing has the resources and motivation needed to adapt to changing circumstances and to remain such a regional fixture for the foreseeable future. That is why U.S. complacency is not an option. Competition need not be hostile, just determined. In particular, the Trump administration has an excellent opportunity to press the U.S. advantage by drawing closer to regional heavyweights Brazil and Argentina, who are attempting to shake off the legacies of years of statist economics. These are countries where China has been particularly active. Each now has a market-friendly president desperate to produce economic growth and draw foreign investment.

A reinvigorated U.S. engagement with the hemisphere will reap significant benefits for the U.S. economy. It will create new investment opportunities, including in the energy sector, but it will also drive up the cost of doing business for Beijing. That China continues to expand its presence in other regions such as Asia and Africa is one thing, but encroaching in our own neighborhood more directly impacts the U.S. national interest. It’s time for America to pay closer attention.

Less than 1% of Visa Overstays are Captured

Note: Former DHS Secretary Jeh Johnson signed his name to a report dated January 2016 on the matter of ‘visa-overstays’. Nowhere in the report does it state all the systems and databases are not connected or using old technology and software. Click on the link above if you want to see the tables published by country. In the summary this paragraph was included:

Due to continuing departures by individuals in this population, by January 4, 2016, the number of Suspected In-Country Overstays for FY 2015 had dropped to 416,500, rendering the Suspected In-Country Overstay rate as 0.9 percent. In other words, as of January 4, 2016, DHS has been able to confirm the departures of more than 99 percent of nonimmigrant visitors scheduled to depart in FY 2015 via air and sea POEs, and that number continues to grow.

Image result for visa overstay report  NBCBoston

Homeland Security can’t keep up with more than 1 million immigrants who have overstayed visas

Homeland Security has built up a backlog of more than 1.2 million illegal immigrants who it believes have overstayed visas but managed to arrest only about 3,400 of them, according to the most recent data, which works out to a rate of about 1 in every 350 lawbreakers.
That is far worse than the rate for those who crossed the border illegally, and it means criminals, people engaged in narcoterrorism and other national security risks are left to run free in the U.S., the Homeland Security inspector general said in a report Thursday.
Federal agents have trouble tracking down the criminals because the government still doesn’t monitor departures, meaning it can’t be certain whether those who came on tourist, business or student visas leave when they are supposed to.
Officers have to check as many as 27 in-house systems, in addition to state databases, to try to guess whether someone has left. Even then, they can make catastrophic mistakes when it wrongly appears that a visitor has left the country.

“Such false departure information resulted in [deportation] officers closing visa overstay investigations of dangerous individuals, such as suspected criminals, who were actually still in the United States and could pose a threat to national security,” the investigators said in the report. “For example, an ERO officer stated that a suspect under investigation was listed as having left the country, but had given his ticket to a family member and was still residing in the United States.”
Visa overstays, as they are called, have become an increasing focus of the immigration debate. As the flow of illegal border crossings declines, an increasing percentage of those in the country illegally are travelers who came on business, tourist or student visas but didn’t leave when their time was up.
Several of the Sept. 11, 2001, hijackers were overstays.
Homeland Security has struggled to get a handle on the situation, or even to figure out how bad it is.
A report last year looking at just a portion of visas calculated that more than 500,000 visitors overstayed in 2015. The total backlog grew to more than 1.2 million, the inspector general said.
Meanwhile, U.S. Immigration and Customs Enforcement officers arrested only 3,402 potential overstays in 2015.

(Advance this video to the 18:40 minute mark and listen to the statistics on inbound travelers under the Visa Waiver Program) What could go wrong on this program?


In its official response, ICE said it is trying to do a better job of calculating the number of visa overstays.
President Trump has pushed the Homeland Security Department to finish the system that would track departures, and tests are being run at Hartsfield-Jackson International Airport in Atlanta.
The department also plans to release its next overstay report soon. That report will cover almost all visa categories, so the government will have a better sense for how bad the problem is.
But Rep. Bob Goodlatte, chairman of the House Judiciary Committee, said that until the government tracks all departures, it won’t know what’s going on.
“Visa security is a matter of national security, and it is imperative that we know who is coming to our country and when they leave so that we protect American citizens and our interests,” the Virginia Republican said.
Congress demanded a biometric entry-exit system more than 20 years ago, but administrations in both parties have failed to deliver, saying that airports aren’t configured to check departures and that the land ports of entry are an even bigger logistical hurdle.
Mr. Goodlatte said he expects Mr. Trump’s focus on immigration to finally push Homeland Security to finish the job.

Until then, officers will waste time on bogus leads, the inspector general’s report said. The data are so unreliable that officers and agents often end up finding an overstay still in the country who the systems said already had left, or spend time trying to track down someone who did leave the country or obtained legal status.
“An ICE officer estimated that he spent more than 50 hours on a single suspect, only to find the individual had applied for [an immigration] benefit and should not have been categorized as an overstay,” the audit said.