Page 5 of 53 FirstFirst ... 3456715 ... LastLast
Results 81 to 100 of 1043

Thread: Russian Info, Cyber and Disinformation (Jan-June 2017).

  1. #81
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Quote Originally Posted by OUTLAW 09 View Post
    Over SIX MILLION of Trump's followers are fake. Paid-for Russian bots, perhaps?
    https://www.twitteraudit.com/Realdonaldtrump

    So again no Russian connections...
    I keep going back to the idea tha national security has two elements....

    1. internal and
    2. external

    Right now on the interna side we have seen a strong tendency of the Trump WH to draw in adviors from the White nationalist side with Miller and Bannon...Bannon sits in the NSC....and white nationalism is the vehicle used to project white supremacy......

    This is a long read but well worth reading as it is well researched and goes to a serious question I have....

    Just how is it possible that these large amounts of Russian controlled bots on the social media side WERE absolutely not detected by US tech giants??

    WHY did it take European social media open source analysts and IT researchers to find what Twitter or FB or Instrgram should have seen first??

    AND why has Twitter been so resistent in understanding the significance of these developments and downplays it at every opportunity....

    http://www.motherjones.com/politics/...-tech-alt-righ...

    Meet Silicon Valley's Secretive Alt-Right Followers
    I investigated the role of "alt-techies" in the extremist movement emboldened by Trump.

    Josh HarkinsonMar. 10, 2017 7:00 AM

    Mother Jones Illustration; Marco Rullkoetter/Getty

    Readers of The Right Stuff long knew that founder "Mike Enoch" had two main interests: technology and white supremacy. Posts on the neo-Nazi site have included discussion of "a new blogging platform built on node.js," while other less techie content has alluded to the "chimpout" in Ferguson, putting Jews in ovens, and Trump's "top-tier troll" of Jews on Holocaust Remembrance Day.

    In January, Enoch was outed as Mike Peinovich, a Manhattan-based software engineer. His unmasking highlighted a lingering question about the racist far-right movement that rose to prominence with Donald Trump's election: What support might the so-called alt-right have among techies?

    Ever since I began investigating the extremist groups lining up behind Trump last spring, several of their leaders have made big claims to me about an alt-right following in Silicon Valley and across the broader tech industry. "The average alt-right-ist is probably a 28-year-old tech-savvy guy working in IT," white nationalist Richard Spencer insisted when I interviewed him a few weeks before the election. "I have seen so many people like that." Andrew Anglin, the publisher of the neo-Nazi Daily Stormer, told me he gets donations from Silicon Valley, and that Santa Clara County, home to Apple and Intel, is his site's largest traffic source.

    Chuck Johnson, the publisher of the conspiracy-mongering site Got News, said he gets lots of page views from the San Francisco Bay Area.
    "If you even try to posit that racism and sexism aren't why women and minorities aren't making it, that it's some combination of talent and values, people's heads just explode."

    After Peinovich was outed, he also insisted to me that many techies secretly identify with the alt-right, which he attributed to a backlash against the "corporate feminist and diversity agenda" of tech companies. "The fact that speaking up about this virtually guarantees career and social suicide, as in my case, shows why so many white males in tech would be attracted to the alt-right."

    None of these alt-right figures would provide any data to support their claims. As I've reported, some alt-right sites have wildly overstated their reach. Moreover, the tech industry is renowned for its globalist outlook: Public-opinion surveys conducted by a Stanford political economist have found that rank-and-file workers in Silicon Valley exhibit less racial resentment and more favorable views toward most forms of immigration than average Americans.

    Nonetheless, "alt-techies," as Spencer and others call them, do appear to play a role in a movement that first incubated in the backwaters of the internet and eventually spread online with the rise of Trump. Some heroes of the far right are associated with tech: They include former Breitbart News "tech editor" Milo Yiannopoulos; the infamous neo-Nazi hacker Andrew Auernheimer (a.k.a. Weev); and the video gaming vlogger Felix Arvid Ulf Kjellberg, whose "Pewdiepie" YouTube channel featuring Nazi-themed jokes has 54 million subscribers. (Last month Kjellberg apologized for the jokes and said he is not a Nazi.)

    There are also successful figures in the tech industry who appeal to and have commingled with the alt-right: The DeploraBall, a gathering of far-right activists and conspiracy theorists during Trump's inauguration, was co-organized by software investor Jeff Giesea and attended by tech billionaire and Trump backer Peter Thiel.

    San Francisco-based tech entrepreneur Curtis Yarvin is known for launching the pro-authoritarian "neoreactionary" movement and reportedly has been in contact with Trump's chief strategist, Steve Bannon. (Yarvin denies this.) Giesea and Yarvin, both of whom I interviewed, reject the "alt-right" label for its associations with white nationalism, yet they share the movement's disdain for the race and gender politics of the left. (Thiel's media representative did not respond to a request for comment from him.)

    Continued...a long read.....

  2. #82
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Ukraine’s fight against fake news goes global

    Countering Kremlin disinformation is one area where Kiev has the upper hand.


    By Vijai Maheshwari
    3/12/17, 10:30 PM CET

    http://www.politico.eu/article/on-th...9d93-189575777

  3. #83
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Reference the Trump statement that the CIA and "others" have been spying on him via microwaves......
    Attached Images Attached Images

  4. #84
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Reference Russian info warfare...

    Russia Today, InfoWars, Sputnik, and Fox are now virtually identical.

  5. #85
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    While everyone was in a panic over the CIA hacking tools AND the Trump surrogate claims of spying microwave ovens....I have been constantly ringing the alarm bells over the "Internet of Things IoT" that are far more dangerous than anything the CIA can come up with...

    NOW if Trump and his merry band of surrogates wanted to be truly helpful on internet security then they need to point to the IoT problem and not some microwave oven thingy....

    NOTICE a bulk of the affected devices come from China and why is that????

    https://krebsonsecurity.com/2017/03/...ge/#more-38363

    Dahua, Hikvision IoT Devices Under Siege

    Dahua, the world’s second-largest maker of “Internet of Things” devices like security cameras and digital video recorders (DVRs), has shipped a software update that closes a gaping security hole in a broad swath of its products. The vulnerability allows anyone to bypass the login process for these devices and gain remote, direct control over vulnerable systems. Adding urgency to the situation, there is now code available online that allows anyone to exploit this bug and commandeer a large number of#IoT devices.
    On March 5, a security researcher named Bashis posted to the Full Disclosure security mailing list exploit code for an embarrassingly simple flaw in the way many Dahua security cameras and DVRs handle authentication. These devices are designed to be controlled by a local Web server that#is accessible via a Web browser.
    That server requires the user to enter a username and password, but Bashis found he could force all affected devices to cough up their usernames and a simple hashed value of the password. Armed with this information, he could effectively “pass the hash” and the corresponding username right back to the Web server and be admitted access to the device settings page. From there, he could add users and install or modify the device’s software. From Full Disclosure:
    “This is so simple as:
    1. Remotely download the full user database with all credentials and permissions
    2. Choose whatever admin user, copy the login names and password hashes
    3. Use them as source to remotely login to the Dahua devices
    “This is like a damn Hollywood hack, click on one button and you are in…”
    Bashis said he was so appalled at the discovery that he labeled it an#apparent “backdoor” — an undocumented means of accessing an electronic device that often only the vendor#knows about. Enraged, Bashis decided to publish his exploit code without first notifying Dahua. Later, Bashis said he changed his mind after being contacted by the company and agreed#to remove his code from the online posting.
    Unfortunately, that ship may have already sailed. Bashis’s exploit code already has been copied in several other places online as of this publication.
    Asked why he took down his exploit code, Bashis said in an interview with KrebsOnSecurity that “The hack is too simple, way too simple, and now I want Dahua’s users to get patched firmware’s before they will be victims to some botnet.”
    In an advisory published March 6, Dahua said it has identified nearly a dozen of its products that are vulnerable, and that further review may reveal additional models also have this flaw. The company is urging users to download and install the newest firmware updates as soon as possible. Here are the models known to be affected so far:
    DH-IPC-HDW23A0RN-ZS
    DH-IPC-HDBW23A0RN-ZS
    DH-IPC-HDBW13A0SN
    DH-IPC-HDW13A0SN
    DH-IPC-HFW13A0SN-W
    DH-IPC-HDBW13A0SN
    DH-IPC-HDW13A0SN
    DH-IPC-HFW13A0SN-W
    DHI-HCVR51A04HE-S3
    DHI-HCVR51A08HE-S3
    DHI-HCVR58A32S-S2
    It’s not clear exactly how many devices worldwide may be vulnerable. Bashis says that’s a difficult question to answer, but that he “wouldn’t be surprised if 95 percent of Dahua’s product line has the same problem,” he said. “And also possible their OEM clones.”
    Dahua has not yet responded to my questions or request for comment. I’ll update this post#if things change on that front.
    This is the second time in a week that a major Chinese IoT firm has urgently warned its#customers to update the firmware on their devices. For weeks, experts have been warning that there are signs of attackers exploiting an unknown backdoor or equally serious vulnerability in cameras and DVR devices made by IoT giant Hikvision.
    Writing for video surveillance publication IPVM, Brian Karas reported on March 2 that he was hearing from multiple Hikvision security camera and DVR users who suddenly were locked out of their devices and had new “system” user accounts added without their permission.
    Karas said the devices in question all were set up to be remotely accessible over the Internet, and were running with the default credentials (12345). Karas noted that there don’t appear to be any Hikvision devices sought out by the Mirai worm — the now open-source malware#that is being used to enslave IoT devices in a botnet for launching crippling online attacks (in contrast, Dahua’s products are hugely represented in the list of systems being sought out by the Mirai worm.)
    In addition, a#programmer who has long written and distributed custom firmware for Hikvision devices claims he’s found a backdoor#in “many popular Hikvision products that makes it possible to gain full admin access to the device,” wrote the user “Montecrypto” on the IoT forum IPcamtalk on Mar. 5. “Hikvision gets two weeks to come forward, acknowledge, and explain why the backdoor is there and when it is going to be removed. I sent them an email. If nothing changes, I will publish all details on March 20th, along with the firmware that disables the backdoor.”
    According to IPVM’s Karas, Hikvision has not acknowledged an unpatched backdoor or any other equivalent weakness in its product. But on Mar. 2, the company issued a reminder to its integrator partners about the need to be updated to the latest firmware.

    A special bulletin issued Mar. 2, 2017 by Hikvision. Image: IPVM
    “Hikvision has determined that there is a scripted application specifically targeting Hikvision NVRs and DVRs that meet the following conditions: they have not been updated to the latest firmware; they are set to the default port, default user name, and default password,” the company’s statement reads. “Hikvision has required secure activation since May of 2015, making it impossible for our integrator partners to install equipment with default settings. However, it was possible, before that date, for integrators to install NVRs and DVRs with default settings. Hikvision strongly recommends that our dealer base review the security levels of equipment installed prior to June 2015 to ensure the use of complex passwords and upgraded firmware to best protect their customers.”
    ANALYSIS
    I don’t agree with Bashis’s conclusion that the Dahua flaw was intentional; It appears that the makers of these products simply did not invest much energy, time or money in building security into the software. Rather, security is clearly an afterthought that is bolted on afterwards with these devices, which is why nobody should trust them.
    The truth is that the software that runs on a whole mess of these security cameras and DVRs is very poorly written, and probably full of more security holes just like the flaw Dahua users are dealing with right now. To hope or wish otherwise given what we know about the history of these cheap electronic devices seems sheer folly.
    In December, KrebsOnSecurity warned that many Sony security cameras contained a backdoor that can only be erased by updating the firmware on the devices.
    Some security experts maintain that these types of flaws can’t be easily exploited when the IoT device in question is behind a firewall. But that advice just doesn’t hold water for today’s IoT cameras and DVRs. For one thing, a great many security cameras and other IoT devices will punch a hole in your firewall straight away without your permission, using a technology called Universal Plug-and-Play (UPnP).
    In other cases, IoT products are incorporating peer-to-peer (P2P) technology that cannot be turned off and exposes users to even greater threats. #In that same December 2016 story referenced above, I cited research from security firm Cybereason, which found at least two previously unknown security flaws in dozens of IP camera families that are white-labeled under a number of different brands (and some without brands at all).
    “Cybereason’s team found that they could easily exploit these devices even if they were set up behind a firewall,” that story noted. “That’s because all of these cameras ship with a factory-default peer-to-peer (P2P) communications capability that enables remote ‘cloud’ access to the devices via the manufacturer’s Web site — provided a customer visits the site and provides the unique camera ID stamped on the bottom of the devices.”
    The story continued:
    “Although it may seem that attackers would need physical access to the vulnerable devices in order to derive those unique camera IDs, Cybereason’s principal security researcher Amit Serper said the company figured out a simple way to enumerate all possible camera IDs using the manufacturer’s Web site.”
    My advice? Avoid the P2P models like the plague. If you have security cameras or DVR devices that are connected to the Internet, make sure they are up to date with the latest firmware. Beyond that, consider completely blocking external network access to the devices and enabling a VPN if you truly need remote access to them.
    Howtogeek.com has a decent tutorial on setting up your own VPN to enable remote access to your home or business network; on picking a decent router that supports VPNs; and installing custom firmware like DD-WRT on the router if available (because, as we can see, stock firmware usually is some horribly insecure and shoddy stuff).

    Continued.....

  6. #86
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Why am I concerned about IoT DDoS attacks on the US...this was the recent last major IoT DDoS attack on the US from over 350,000 bots.....notice the internet backbone areas it took down for literally hours.....
    Attached Images Attached Images

  7. #87
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Who could've guessed? -> Bernie Sanders' backers faced a fake news tsunami. Where did it come from? R.U.S.S.I.A.
    http://www.huffingtonpost.com/entry/...shpmg00000004#

  8. #88
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Struggle against fake information
    about events in Ukraine

    How Moscow is spreading its propaganda using EU-funded media

    http://www.stopfake.org/en/how-mosco...-funded-media/

    News in the section ‘Context’ are not fakes. We publish them in order to provide you with a deeper understanding of the techniques and methods used by the Russian government in its information war.

  9. #89
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Breitbart not only spread anti-Clinton/Dems disinformation, it set broader media agenda, @CJR
    http://www.cjr.org/analysis/breitbar...ard-study.php#
    Attached Images Attached Images

  10. #90
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Is social media empowering Dutch populism?
    https://www.ft.com/content/b1830ac2-...-5e720a26771b#

  11. #91
    Council Member
    Join Date
    Aug 2015
    Posts
    849

    Default Historical Russian Information Warfare Against the United States

    From War Is Boring:https://warisboring.com/russia-tried...b82#.8s39e5r56

    Russia Tried to Use Martin Luther King, Jr.’s Assassination to Start a Race War
    The plot involved the KKK, the Jewish Defense League, black militants … and a bombing

    The Cold War often brings to mind visions of cloak-and-dagger spy escapades in Eastern Europe and Moscow — or the countless coups, revolutions, proxy wars and clandestine ops that pitted Communist and Western interests against one another in developing nations around the world.

    Amid these sensational tropes of international espionage, it’s easy to forget the KGB and other intelligence agencies were highly active within the United States. Their exploits here weren’t quite as extravagant, but they went far beyond mundane intelligence gathering.

    There were, of course, Soviet operatives in the United States who did focus strictly on intelligence. In the 1980s, a German-American spy hacked hundreds of networked military computers and sold the information to Russia, and KGB field stations established a massive surveillance program that monitored U.S. radar and satellite transmissions.

    The Kremlin also ordered its agents in America to generate social unrest, undermine faith in the government and develop plans to sabotage targets in the military, energy and infrastructure sectors.

    One such campaign sought to capitalize on the assassination of Dr. Martin Luther King, Jr. — by using it as a pretext for inciting a full-blown race war.

    Propaganda materials attributed to the Ku Klux Klan, black militant organizations and the Jewish Defense League aimed to aggravate ongoing tensions between those groups and compel them to engage in open hostilities against each other.

    From there, in theory, the violence would spread and engulf the general public. The campaign ultimately span three decades and culminated with Operation PANDORA, a plan to bomb a historically black college in New York and blame it on the JDL.

    In 1992 Vasili Mitrokhin, a former KGB archivist with the First Chief Directorate, the unit responsible for foreign intelligence gathering and operations, defected from Russia to England. He brought with him a massive trove of top-secret KGB documents, eventually sharing over 25,000 files with Britain’s MI6 intelligence agency.

    The files became the basis for two books, 1999’s The Sword and the Shield and The World Was Going Our Way: The KGB and the Battle for the Third World in 2005. Mitrokhin co-authored both volumes with British historian Christopher Andrew.

    The books discuss Soviet intelligence gathering activities in the United States and elsewhere, as well as the plans to attack or sabotage dams, oil pipelines, power plants and other targets on American soil. They also provide details on the KGB efforts to inflame racial tensions in hopes of provoking a race war within the United States.

    The race war Moscow envisioned would, effectively, kill two birds with one stone. While the KKK was eventually a factor in the scheme, black militants and the Zionist JDL were the main emphasis. The Kremlin wanted black militants to become the dominant force in African American political discourse and social movements, and hoped to use them to take out the JDL in the process.

    From the Soviet perspective, King’s call for peaceful protests and nonviolent direct action had prevented a more volatile civil rights movement from emerging. If someone such as Stokeley Carmichael or a group like the Black Panther Party took control of the movement, a civil war could erupt on the streets of America.

    Forced to focus on internal conflict, the United States would at least temporarily take its eye off of its foreign interests and lose political and strategic footing on the global stage.

    Carmichael was the preferred candidate, according to Mitrokhin’s source material. Despite his early work with the Student Non-Violent Coordinating Committee, Carmichael had ultimately made his name by popularizing the term “Black Power.”

    In 1967, he went on a global speaking tour, giving speeches in Moscow, Havana and Hanoi, in which he condemned racism and capitalism alike. In the speeches he hinted at an impending race war in the United States, referring, most likely, to the arming of the Black Panthers.
    “We are preparing groups of urban guerrillas for our defense in the cities,’’ Carmichael said in Havana, according to The New York Times. “It is going to be a fight to the death.’’

    Carmichael still harbored nonviolent inclinations, but he was more open to the prospect of violent resistance than King was, and his rhetoric often overlapped with that of his militant contemporaries. That, along with his popularity and influence, was good enough for Moscow.

    Even if Carmichael fell short of Moscow’s more ambitious hopes and a civil war did not commence, replacing King with someone like Carmichael would still give communism a broader audience within the African American community, and potentially America at large. Carmichael and black militants were more openly sympathetic to communism than King, though the latter was not without his critiques of capitalism.

    The KGB decided to hedge its bets anyway, or they just got greedy. Either way, it wasn’t enough for them to try to turn the black community against the white community. The Russians wanted to bring the Jewish community into the fray as well, particularly Zionist extremist groups such as Meir Kahane’s Jewish Defense League.

    If they couldn’t get black militants to take control of the Civil Rights Movement and start a race war, perhaps they could at least get them to take out the JDL.

    The Soviet Union’s propaganda department had been running an anti-Zionist and anti-Israel campaign since the early 1960s, at the latest. This was in part based on an official policy that cast Zionism as a racist and imperialist policy, but was more likely due to Soviet interests in the Persian Gulf and broader Middle East.

    Moscow wanted access to Persian Gulf oil just as badly as Western countries did. The Soviet Union made inroads with some Arab nations, but it never achieved enough power in the region to gain control of the oil supplies. The Soviets increasingly laid blame for their problems in the Middle East on Israel and its ties to the West, thus making Israel and groups who support it targets.

    With the goal of taking out the JDL and buttressing black militancy at the same time, the KGB began a disinformation campaign in the United States to target the JDL and undermine the U.S. government on the “Negro issue,” as Mitrokhin’s documents revealed.

    In 1967 Moscow authorized Yuri Modin, the deputy director of the KGB’s Service A, to implement a strategy of portraying King as an “Uncle Tom” who was working with the the administration of Pres. Lyndon Johnson to secretly pacify the civil rights movement and prevent a violent uprising from the African-American population.

    Modin, who had previously directed the Cambridge Five spy ring in England, would start the operation by using his contacts within the black press to plant articles that were critical of King. Initially, the KGB hoped to take advantage of images of the 1965 Watts riots to stir up feelings of rage. The sense was that if they could spark a certain degree of violence, King would be “swept aside by black radicals” such as Carmichael.

    Mitrokhin’s materials sited in The Sword and the Shield state that Modin was authorized to do the following —


    To organize, through the use of KGB residency resources in the U.S., the publication and distribution of brochures, pamphlets, and appeals denouncing the policy of the Johnson administration on the Negro question and exposing the brutal terrorist methods being used by the government to suppress the Negro rights movement.

    To arrange, via available agent resources, for leading figures in the legal profession to make public statements discrediting the policy of the Johnson administration on the Negro question.

    To forge and distribute through illegal channels a document showing that the John Birch Society, in conjunction with the Minutemen organization, is developing a plan for the physical elimination of leading figures in the Negro movement in the U.S.



    The assassination of King in April 1968 abruptly altered the KGB’s plans. Instead of portraying King as traitor to his people and an accomplice in their oppression, it suddenly became preferable to cast him as a martyr to the cause, someone betrayed by the evil capitalist system that he sought to compromise and negotiate with.

    The riots that erupted in more than 100 U.S. cities after King’s death suggested that racial tensions had perhaps reached a flash point, opening an opportunity for Moscow. The KGB revised its propaganda, but the goal remained the same.

    Despite the violence after King’s assassination, and the KGB’s attempts to expand on it, the race war didn’t really come to fruition. Moscow, however, was still not ready to abandon the plan...

  12. #92
    Council Member
    Join Date
    Aug 2015
    Posts
    849

    Default

    Quote Originally Posted by OUTLAW 09 View Post
    Why am I concerned about IoT DDoS attacks on the US...this was the recent last major IoT DDoS attack on the US from over 350,000 bots.....notice the internet backbone areas it took down for literally hours.....
    So it is true! The best Internet is in Idaho!

  13. #93
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Quote Originally Posted by Azor View Post
    So it is true! The best Internet is in Idaho!
    Notice the exact areas hit match the exact areas with high US military concentrations and important bases....plus the center of US high tech....

  14. #94
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    U.S. plans to charge alleged hackers in Yahoo breach, some of whom reportedly have ties to Russian government
    https://www.wsj.com/articles/u-s-off...42870?mod=e2tw

    Indictment for yahoo hacks will reportedly point to two members of the FSB. Largest ever US hacking case
    http://www.cbsnews.com/news/verizon-...ata-breaches/#

    Yahoo hack was “done with the backing of a nation state,” DOJ to announce; officials say the nation involved is Russia

    Part of a long trend, says @jimcramer on @CNBC. "The Russians aren't COMING. The Russians have BEEN here."
    Last edited by OUTLAW 09; 03-15-2017 at 02:45 PM.

  15. #95
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Wikileaks has exactly one goal (order): To erode trust within the western political landscape.
    No doubt who gives that order.
    Attached Images Attached Images

  16. #96
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    http://linkis.com/wordpress.com/AewD9

    Wikileaks Hands “Keys” to Putin’s Russian Hacker – Readers, Leakers#Tracked

    March 14, 2017

    Exclusive analysis by Laurelai Bailey, published by Patribotics this week confirmed that Julian Assange and Wikileaks obtained two new servers in Russia just one week before the hacked Podesta emails were released.
    Laurelai reported that the ultimate registrant of the servers was one Peter Chayanov, of Russia, a known cyber-criminal and hacker.
    Julian Assange has been identified by the US intelligence community as a front for Russian distribution and ‘deniability’ of Russian government-sponsored hacking. Today, however, as a result of our reporting on the dox by Op Ferguson, that link is far clearer.
    The internet is tightly controlled in Russia. Cyber criminals have to answer to Putin. Mr. Chayanov is the head of a firm called Hostkey, which hosts mail spammers and other malware and hacking tools, despite offering web space to Wikileaks. Wikileaks chose to use a Russian hacker to host their site – and they knew that he was connected to Vladimir Putin and operated with the blessing of Putin’s government.
    Putin and Assange are thus already linked.
    But it is much worse for Wikileaks – and the internet in general – even than it looks. In order not to bury the lead I will report what appears to be the conclusions of the web developers and hackers on Twitter discussing Laurelai’s story, and then report on how they appeared to have arrived there.
    * Wikileaks has handed Chayanov access to everything stored on its site and servers
    * The Russian hacker and spammer can ‘monitor traffic’
    * He can tell who is reading anything on the Wikileaks site anywhere in the world
    * The Russian hacker has access to all documents that have been sent to Wikileaks
    * He can probably bust the anonymity of any computer or user who thought they were anonymously donating to Wikileaks
    * It is not reasonable to suggest that this hacker is other than linked with Russia’s GRU – if he has it, they have it
    * Through Julian Assange and his website, it appears that the Russian hacker and his government can track any readers of the Wikileaks site and any donors of material to it, thus allowing Russia to ‘blackmail’ anyone who ‘sent secrets’ to Wikileaks as a ‘whistleblower’.
    I will update this story later in the day summarizing discussions among the hacker and developer community on Twitter that led to this bombshell conclusion.
    All of the above appear to be factual statements. It is not a fact that Russia did indeed monitor web traffic to Wikileaks, but it seems to be an absolute fact that if they want to, they can – and it seems, from the reaction of Mr. Chayanov upon being outed, almost totally certain that Julian Assange handed Russia the keys to the Wikileaks site deliberately.
    When Julian Assange wrote “Wikileak the Government” he apparently meant “Wikileaks is the Government (of Russia)”.
    A subsequent post will explore the further possibility that Peter Chayanov is also Guccifer2 – providing the materials that hacked the US election, as well as helping Assange and Wikileaks work with Putin to do so.
    His Linkedin says he works for the govt: Academy of National Economy under the Government of the Russian Federation
    Last edited by OUTLAW 09; 03-15-2017 at 02:44 PM.

  17. #97
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    US accuses FSB/FBI liaison officers - but not Kremlin - of cyber-crime. Interesting how Peskov/Zakharova will respond.
    https://www.nytimes.com/2017/03/15/t...ent.html?_r=0#

    The Kaspersky crew used to argue to me that they had nothing to do w Russian intel, b/c they cooperated w the 'other' side of the FSB

    But now, that 'other' side of the FSB has been implicated in the Yahoo hack, the biggest of its kind ever

    Yahoo hackers spied on Russian journalists, US financial types, 14 employees of a Bitcoin firm, and a "Nevada gaming official.'

    These hackers also went after Moscow officials—at the Russian Federation and in the 'Ministry of Internal Affairs.'

    Not to mention employees at Russian cybersecurity and financial firms.

    In other words the hackers weaponized Yahoo's data to attack a host of domestic & foreign, criminal & intel targets.

    The three alleged Russian hackers wanted by the FBI:
    http://www.huffingtonpost.com/entry/...vrhpvi#…

    Notice the semblance of the DNC hack....

    According to the indictment, the FSB hackers sat on Yahoo networks doing digital recon for almost all of 2014 before theft. How Cozy Bear-y.
    Last edited by OUTLAW 09; 03-15-2017 at 05:00 PM.

  18. #98
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    With U.S. accusations that FSB committed major cyber-crimes, Russian state news covers … letter to Tillerson about Obama meddling abroad.
    Attached Images Attached Images

  19. #99
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    The UK Russian embassy is asking people to hand over access to their Twitter accounts, become bots

    https://motherboard.vice.com/en_us/a...twitter-bots#…

  20. #100
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Quote Originally Posted by OUTLAW 09 View Post
    US accuses FSB/FBI liaison officers - but not Kremlin - of cyber-crime. Interesting how Peskov/Zakharova will respond.
    https://www.nytimes.com/2017/03/15/t...ent.html?_r=0#

    The Kaspersky crew used to argue to me that they had nothing to do w Russian intel, b/c they cooperated w the 'other' side of the FSB

    But now, that 'other' side of the FSB has been implicated in the Yahoo hack, the biggest of its kind ever

    Yahoo hackers spied on Russian journalists, US financial types, 14 employees of a Bitcoin firm, and a "Nevada gaming official.'

    These hackers also went after Moscow officials—at the Russian Federation and in the 'Ministry of Internal Affairs.'

    Not to mention employees at Russian cybersecurity and financial firms.

    In other words the hackers weaponized Yahoo's data to attack a host of domestic & foreign, criminal & intel targets.

    The three alleged Russian hackers wanted by the FBI:
    http://www.huffingtonpost.com/entry/...4aiw2mvrhpvi#…

    Notice the semblance of the DNC hack....

    According to the indictment, the FSB hackers sat on Yahoo networks doing digital recon for almost all of 2014 before theft. How Cozy Bear-y.
    DOJ says a Russian hacking plot co-conspirator was arrested yesterday in Canada on a U.S. government provisional arrest warrant


    TIP of the iceberg...this group mark my words is in fact tied to and or either participated in the DNC hack.....

Similar Threads

  1. Malware & other nasty IT / cyber things
    By AdamG in forum Media, Information & Cyber Warriors
    Replies: 111
    Last Post: 02-07-2018, 10:37 PM
  2. Russian Info, Cyber and Disinformation (Catch all till 2017)
    By TheCurmudgeon in forum Media, Information & Cyber Warriors
    Replies: 373
    Last Post: 02-14-2017, 11:30 AM
  3. Syria in 2016 (January-March)
    By davidbfpo in forum Middle East
    Replies: 3135
    Last Post: 03-31-2016, 08:51 PM
  4. Social Media: the widest impact of (merged thread)
    By zenpundit in forum Media, Information & Cyber Warriors
    Replies: 55
    Last Post: 02-29-2016, 06:57 AM
  5. Ukraine: Russo-Ukr War (June-December 2015)
    By davidbfpo in forum Europe
    Replies: 3393
    Last Post: 12-31-2015, 11:53 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •