ISIS Hacking Division Takes on Military and Govt Personnel

Alleged ISIS leak compromises hundreds of U.S. military & intelligence emails — Dept of Defense is ‘looking into it’

The top of the page containing the leak appears to show an unconfirmed link to ISIS

Above: The top of the page containing the leak appears to show an unconfirmed link to ISIS

A Twitter account claiming to be the “IS Hacking Division” has published what appears to be an extensive directory of government emails, passwords, credit cards, phone numbers, and addresses spanning U.S. military departments and divisions, the FBI, U.S. embassies, the Library of Congress, U.S. city officials, the British Embassy, the FTC, and NASA, as well as possible personnel at Wells Fargo.

VentureBeat is able to confirm that the U.S. Department of Defense is “looking into” this alleged hack. We’ve also independently verified that at least several of the items included on that list contained accurate information, but that several of the people were not aware that the leak had occurred.

Other details in the document appear inaccurate or outdated; it lists two Intel Corporation email accounts which apparently do not exist in Intel’s “company email directory,” an Intel spokesperson told VentureBeat.

IS hacking division tweet

The content was published onto a site entitled “zonehmirrors.org,” a domain which was registered under the name Redi Alberto in the city of Lugano, Switzerland.

ISIS Group Claims to Have Hacked Information on U.S. Military Personnel
NBC: A hacker group claiming to be affiliated with the terror organization ISIS on Tuesday posted what it said was the personal information of hundreds of members of the military and government personnel, and urged terrorists to carry out attacks.

Flashpoint Intelligence, a global security firm and NBC News consultant, said it could not authenticate the claim by the so-called “Islamic State Hacking Division” or the accuracy of the information. Islamic State is another name by which ISIS is known.
The Twitter account used has been affiliated with infamous ISIS fighter Abu Hussain Al Britani, Flashpoint said. The account has since been suspended.

The group claimed the information contained names, emails, passwords, and phone numbers of personnel that included individuals from the Air Force, the Marines, NASA and the Port Authority of New York and New Jersey. There is no indication as to how old the information is, or whether the email addresses and passwords are still valid.

“We are aware of the report but cannot confirm credibility at this time,” a spokesperson for the Department of Defense said in an email. “The safety of our service members is always a primary concern.”

The group had previously claimed it hacked American servers and distributed information on military personnel, but analysts believe that claim was overstated, and the information was instead culled from freely available social media accounts, Flashpoint said.
T he information released Tuesday also included the purported credit card information of several U.S. State Department officials as well as screenshots of private Facebook messages between purported U.S. servicememebers.

Flashpoint analysts said the “hack” — if true — could be significant as it would represent a growing effort by pro-ISIS groups to distribute personal information that could be used in lone-wolf attacks.

The list of those hacked with names, locations, government divisions, embassies and P/W’s is here.  I was just notified that the original link has been taken offline, after some searching I located this link. http://tu3ek4yox26tber2.onion.nu/   Consider the risk if you choose to open it.

The Hillary Email Server Scandal Runs Deeper at State Dept.

The Hillary email scandal-palooza began on July 31 with Judge Sullivan’s declaration demanding Hillary and her staff certify certain conditions with regard to all the emails being turned over to the State Department.

On August 8, 2015, Hillary signed a certification document under penalty of perjury that all materials within server communications have been provided to the State Department. Concurrent to this action, the FBI visited the Denver IT company, Platt River that provided email support and redundant systems to the Hillary server established in her home in 2009. Of note, this server was NOT Bill’s server as she previously stated.

The two page certification signed by Hillary is found here.

Most important to readers here is the fact that the communications of the two emails in question that originated from the CIA were transmitted via a controlled pathway to the State Department, from there, someone(s) at State had to find a unclassified printer and computer to create hard copies, re-format them into electronic form and then email them to Hillary meaning that others at State are surely going to be investigated and caught up in the web or dragnet of culpability.

A 7 page email document chain is found here where the classified material is simply chilling.

On August 11, the Intelligence Community Inspector General briefed several members of the Senate as well as James Clapper, the Director of the Office of National Intelligence on the exact classifications of at least 2 newly discovered emails, which at the time of transmission were given the classification rating of TS/SI/TK/NF. This classification is the top confidential rating designation. Of particular note is the ‘TK’ rating which means Talent Keyhole, stemming from signals intelligence/geo-spatial via the CIA. These communications are only done on highly controlled systems and within a SCIF system.

Embedded image permalink

Senator Chuck Grassley took the aggressive and positive step on August 11 to provide voters with the new information noted here.

From Associated Press dates August 11:

Also Tuesday, Kendall gave to the Justice Department three thumb drives containing copies of work-related emails sent to and from her personal email addresses via her private server.

Kendall gave the thumb drives, containing copies of roughly 30,000 emails, to the FBI after the agency determined he could not remain in possession of the classified information contained in some of the emails, according to a U.S. official briefed on the matter who was not authorized to speak publicly.

The State Department previously had said it was comfortable with Kendall keeping the emails at his Washington law office.

Word that Clinton had relented on giving up possession of the server came as Republican Sen. Chuck Grassley of Iowa said two emails that traversed Clinton’s personal system were deemed “Top Secret, Sensitive Compartmented Information” — a rating that is among the government’s highest classifications. Grassley said the inspector general of the nation’s intelligence community had reported the new details about the higher classification to Congress on Tuesday.

“Secretary Clinton’s previous statements that she possessed no classified information were patently untrue,” House Speaker John Boehner said in a statement. “Her mishandling of classified information must be fully investigated.”

Those two emails were among four that had previously been determined by the inspector general of the intelligence community to have been classified at the time they were sent. The State Department disputes that the emails were classified at that time.

Shin Bet’s Latest Hamas Captive Reveals the Plan

Jerusalem Post: A Hamas fighter and tunnel digger has given his interrogators in Israel a bevy of intelligence about the group’s recent tunnel construction, planned attacks on Israel, battlefield strategy, and military cooperation with Iran, the Shin Bet General Security Service said Tuesday, after news of the operative’s arrest was made public.

The fighter, Ibrahim Adal Shahada Sha’ar, a 21-year-old native of Rafah in the southern Gaza Strip, was arrested by the Shin Bet and the Israel Police last month at Erez Crossing on the Israel border, after he arrived at the installation to submit an application to enter Israel. An official with the Shin Bet said that Sha’ar’s application to enter was for “personal or humanitarian reasons” and that officers at the crossing knew who he was and arrested him on the spot.

The Shin Bet on Tuesday said Sha’ar gave up to his interrogators a trove of intelligence relating to Hamas operations in Gaza and in Rafah in particular, including about their plans to use tunnels along the border to carry out attacks on Israel, like they did with brutal effectiveness during last summer’s Operation Protective Edge.

The Shin Bet said Sha’ar also gave details about Hamas battlefield strategy, the make-up and capabilities of their “elite” infantry unit, as well as the anti-aircraft and surveillance capabilities of the Hamas armed wing.

Sha’ar himself took part in a series of battlefield tasks during last summer’s war, the Shin Bet said, including field logistics, and transporting fighters and firearms on the battlefield. He also admitted to laying an anti-tank IED on one occasion.

The Rafah native had allegedly been spending recent months working on tunnel construction, during which he learned of tunnels heading for the Kerem Shalom crossing on the Israel border, potentially for use in an infiltration attack. Under questioning he also gave up the location of digging sites, tunnel openings, and the routes of tunnels currently under construction in the Gaza Strip. He also reportedly told his interrogators that a road recently built by Hamas along the Gaza border with Israel is meant in part to be used for attacks on Israel, during which vehicles will use the road to charge across the border.

He also reportedly gave details on his observations about the military cooperation between Hamas and Iran. The Shin Bet said he described how they transfer money to the organization and supply firearms and electronics, including devices meant for jamming radio frequencies, meant to be used to take down Israeli drones flying over Gaza. He also observed how they attempted to train Hamas fighters in the use of hang gliders for attacks on Israel.

On July 31st, Sha’ar was indicted at the Beersheba District Court on charges of membership in an illegal organization, attempted murder, and contact with a foreign agent, and taking part in illegal military training.

***  Then we need to go back to John Kerry’s testimony before Congress, where his answers turn out to be thin on substance and essentially false and uninformed.

Iran Funding Hamas Preparations for War

 

When asked repeatedly by Republicans about Iran’s repeated threats to destroy Israel during Congressional testimony about the Iran nuclear deal, Secretary of State John Kerry sighed and looked at his questioners the way an exasperated teacher regards dumb students. Yes, he admitted, they say that but he explained patiently, he’s seen no evidence of them planning anything to put that into effect. Kerry repeated that answer, though no doubt without the look of disdain on his face, to The Atlantic’s Jeffrey Goldberg saying “I haven’t seen anything that says to me” that their “ideological confrontation with Israel at this moment” [my emphasis] will “translate into active steps.” For all intents and purposes, President Obama says the same thing when he dismisses threats to Israel from Iran’s Supreme Leader Grand Ayatollah Ali Khamenei even if he just published a book outlining his plans.

But, as Israel’s Shin Bet intelligence agency made public today, Iran is taking active steps toward war with Israel. The Israelis revealed that information obtained from a prisoner as well as from other sources showed that Iran is taking an active role in allowing Hamas to rebuild its military infrastructure as well as terror tunnels aimed at facilitating murder and kidnapping. Though the administration pretends that its negotiations with Iran are proof that the Islamist regime is moderating, evidence on the ground shows that its role as the world’s leading state sponsor of terror is unchanged. So, too, is its role in aiding the ongoing war on Israel’s existence.

As Haaretz reports:

During his interrogation, [Hamas operative Ibrahim] Sha’er also told of the links between Iran and Hamas, under which Iran has transferred military support into the Gaza Strip to strengthen the organization. The Iranians provide funds, advanced weaponry and electronic equipment such as equipment for disrupting radio communications to bring down Israeli unmanned aerial vehicles over Gaza, Sha’er told the Shin Bet. Iran has also trained Gaza fighters in the use of hang gliders for the purpose of penetrating into Israel, he said.

Perhaps to Obama and Kerry, these efforts should be considered minor annoyances to Israel. After all, what possible impact can terror attacks or giving Hamas the ability to wage and sustain a new war against Israel have to do with Israel’s existence? The Israeli military is strong and presumably is capable of dealing with anything that Hamas can come up with. Perhaps, the same is true of Hezbollah, which even Kerry admitted to Goldberg, had 80,000 rockets pointed at Israel.

The point is that Iran using its wealth and military know-how to build up Hezbollah (which operates as an Iranian surrogate, even sending its fighters into Syria to bolster Iran’s ally Bashar Assad) and now Hamas isn’t a mere detail to be swept under the rug. Nor is it tangential to the main thrust of Iranian foreign policy, as Khamenei’s new book makes plain.

Moreover, despite the administration’s blind faith in a shift in Iran’s policies once the nuclear deal is put into effect, there’s no evidence that the flood of cash into Tehran’s coffers will do anything but encourage it to continue its efforts to have its terrorist auxiliaries wage war on Israel.

To the contrary, once the deal sneaks through Congress and Obama begins the process of suspending sanctions by executive order and the Europeans begin a Tehran gold rush, the incentive to regard violations of any of the understandings as too minor to provoke a break will be too great. Kerry may speak of snapping back sanctions, but it’s clear the will to do so on the part of the West will be lacking.

That means that not only will Iran spend the next decade preparing for building its own bomb. It will also spend that time employing its wealth in its struggle for regional hegemony, a key part of which is its surrogate war on Israel. Once the deal expires, Hamas and Hezbollah won’t just be increasingly annoying Israel with deadly terror funded by Iran. They’ll then have a nuclear umbrella. At best, Israel — and moderate Arab states — will live under a terrible threat. The worst-case scenario is too awful to contemplate.

That means that contrary to Kerry’s belief about Iran having no plans in place to eliminate Israel, the entire process that will unfold from the deal is part and parcel of just such a plan. The only difference is that unlike past efforts, what will follow will happen while it has become America’s diplomatic and business partner. That is more than enough reason for anyone who cares about U.S. security, its interests in the Middle East and Israel’s survival, to rethink the deal.

 

Advances and Secret Information on Hacking of Classified Systems

Hacking never has the sizzle when it comes to terror or scandals, yet it is the cheapest and most effective means of destruction.

So, below are some items you cannot overlook.

A few weeks ago, the unclassified email and information system at the Pentagon, mostly used by the Joint Chiefs of Staff was taken offline due to suspicious malware activity. That system is back online as of this week after all clues pointed to the hack by Russians which led to up to 4000 Pentagon employees losing access to email.

***

Then it has been determined the Chinese have accessed top government officials private emails since 2010.

Chinese hackers have been accessing the private mails of some top United States officials since April of 2010, which coincides with Hillary Clinton’s tenure as secretary of state and her decision to use a private email server, Morning Joe’s Willie Geist reported Tuesday.

“The email grab, first code-named Dancing Panda, targeted top national security and trade officials,” Geist said. “It continued as late as 2014. The timing does overlap with Hillary Clinton’s time as secretary of state and her use of a private email server.”

“Many” top officials have been hacked, according to a high-level intelligence source and a top-secret document obtained by NBC News.

***

Now comes a global network of hacking and their successful and criminal activities.

Exposing a new front in cybercrime, U.S. authorities broke up an alleged insider trading ring that relied on computer hackers to pilfer corporate press announcements and then profited by trading on the sensitive information before it became public.

In morning raids in Georgia and Pennsylvania, federal agents arrested five men in the plot, while four others indicted on hacking and securities fraud charges remain at large.

The hackers, who are thought to be in Ukraine and possibly Russia, allegedly infiltrated the computer servers of PRNewswire Association LLC, Marketwired and Business Wire, a unit of Warren Buffett’s Berkshire Hathaway Inc., over a five-year period.

They siphoned more than 100,000 press releases including corporate data on earnings that could be used to anticipate stock market moves and make profitable trades. The hackers passed the information to associates in the U.S., who allegedly used it to buy and sell shares of dozens of companies, including Panera Bread Co., Boeing Co., Hewlett-Packard Co., Caterpillar Inc. and Oracle Corp., through retail brokerage accounts. A must read for the rest of the details is here.

***

Most chilling of all is the forward leaning and creative uses of drones.

LAS VEGAS, Nev. – Forget Facebook drones that broadcast Wifi. The future is drones that hack from above. A company called Aerial Assault has turned a quadcopter into a flying hacker that scans the world below for insecure devices and vulnerable Wifi ports. Its makers say they built the tool for penetration testing — to help “good guys” diagnose their own weaknesses — but they concede that with a bit of modification, it could be used to exploit those vulnerabilities and install malware from the air. This is why it’s paramount to get your I.T. network looked at by a penetration testing company, you may think this is a scary thing for your company to undergo however, it will actually prevent people (hackers) from stealing your companies information as all of the weak spots would of been identified and then rectified.

The unnamed drone, which may be the first unmanned aerial penetration tool for sale to the public, was on display at the DEF CON hacker conference here last week. It uses a small Raspberry Pi computer running the Kali Linux penetration tester software with the broadcast range extended by alpha radio antennas. It will retail for $2,500 when the Web site goes up in a few days, its makers say.

“We’ve set it up so it does some basic [penetration] testing stuff and coordinates all that data with GPS coordinates from the flight controller. From that, you can extend it with every type of capability that you want Kali Linux to do,” said David Jordan, a representative from Aerial Assault who was selling it on the floor at the DEF CON conference in Las Vegas, Nevada on Sunday.

While the drone isn’t specifically designed to distribute malware, Jordan acknowledged it could be modified to do so. “It is up to the user to decide what they do with it. If the user, they have Raspberry Pi with Kali on it, they can reprogram custom scripts. That’s good for doing more extensive [penetration] testing. But, you know, scripts can be whatever they are,” he said. “Our intended use is for pentesters to be able to diagnose vulnerabilities and help people understand what their Wifi accessibility is, even up in the air.”

 

Plea Deal for 7th Indictment in Brian Terry’s Murder

In August of 2014, per the Justice Department, Rosario Rafael Burboa-Alvarez became the 7th man charged in the death of Border Patrol Agent Brian Terry. Burboa was part of the rip-crew and recruited others for continued operations.

The rip crew did not have weapons on them when their backpacks were searched, but the weapons they used were instead in a hidden cached location and retrieved by the rip crew only hours later.

He and others were monitored by several U.S. agencies that included ATF, FBI and DEA. Yet he is a happier man, due to a plea deal. He pled guilty to the death of Brian Terry.

N4T Investigators: Plea deal given to man indicted in murder of Border Patrol agent Brian Terry

One of the men charged in the murder of U.S. Border Patrol agent Brian Terry pleaded guilty to one count of murder, Monday morning. Once a potential candidate for the death penalty after the murder of the agent, the drawn up plea deal now states that the U.S. and the defendant will ask for 360 months imprisonment, with credit for time served since his arrest in October 2012.

The Justice Department indicted Rosario Rafael Burboa Alvarez last summer in connection with the killing. Alvarez was identified as the recruiter for the rip-off crew that ran into Terry’s elite BORTAC unit in the desert in December 2010. Terry was killed in the ensuing gunfight with the rip-off crew and later two AK-47 variants found at the crime scene were identified as part of the notorious Bureau of Alcohol, Tobacco, Firearms and Explosives gunwalking operation, Operation Fast and Furious. The scandalous operation was supposed to link guns bought at a Phoenix-area gunstore to cartel gunmen trafficking the weapons to Mexico. Instead, ATF lost more than 2,000 of those weapons. Resulting congressional investigations found that the men linked to the gun purchases were being monitored by different U.S. federal agencies like DEA, the FBI and ATF, but agents weren’t sharing the information with the other agencies.

Burboa was often identified in federal search warrants and charging papers as the recruiter of the group. Burboa, the U.S. said, recruited rip-off crews to rob drug smugglers of their marijuana loads, then paid them after they performed the robbery and returned to Sinaloa. In early December, the rip-off crew entered the U.S. from Mexico, retrieved a stash of weapons and food and went to work, hunting smugglers. Instead, they encountered Terry’s tactical unit that had taken position at the top of a wash.

As part of the plea agreement, the United States agreed not to execute Burboa and to dismiss all other charges against him, including charges of interfering with federal officers and killing Terry with “malice aforethought” the second charge in the superseding indictment.

The plea deal also notes that Burboa had already been ordered expelled from the U.S., though it is not clear if the expulsion order derives from Terry’s murder or from a previous crime.

Burboa’s 30 year sentence is in line with the sentence handed to Manuel Osorio-Arellanes, the man wounded during the firefight. Osorio-Arellanes faced life but was ultimately sentenced to 30 years in 2012. Jaime Avila, Jr., the Operation Fast and Furious gunbuyer who purchased the two AK-47s found at the murder scene was also sentenced in 2012. He received a 57 month sentence.