US Punishes Russia for Election Hacking Ejecting Operatives

Moderators: Elvis, DrVolin, Jeff

Re: US Punishes Russia for Election Hacking Ejecting Operati

Postby seemslikeadream » Fri Jan 27, 2017 8:47 pm

Memos: CEO of Russia's state oil company offered Trump adviser, allies a cut of huge deal if sanctions were lifted

Natasha Bertrand

13h
Carter Page, then an adviser to Donald Trump, at the graduation ceremony for the New Economic School in Moscow on July 8. Associated Press/Pavel Golovkin
A dossier with unverified claims about President Donald Trump's ties to Russia contained allegations that Igor Sechin, the CEO of Russia's state oil company, offered former Trump ally Carter Page and his associates the brokerage of a 19% stake in the company in exchange for the lifting of US sanctions on Russia.

The dossier says the offer was made in July, when Page was in Moscow giving a speech at the Higher Economic School. The claim was sourced to "a trusted compatriot and close associate" of Sechin, according to the dossier's author, former British spy Christopher Steele.

"Sechin's associate said that the Rosneft president was so keen to lift personal and corporate western sanctions imposed on the company, that he offered Page and his associates the brokerage of up to a 19 per cent (privatised) stake in Rosneft," the dossier said. "In return, Page had expressed interest and confirmed that were Trump elected US president, then sanctions on Russia would be lifted."

Four months before the intelligence community briefed Trump, then-President Barack Obama, then-Vice President Joe Biden, and the nation's top lawmakers on the dossier's claims — most of which have not been independently verified but are being investigated by US intelligence agencies — a US intelligence source told Yahoo's Michael Isikoff that Sechin met with Page during Page's three-day trip to Moscow. Sechin, the source told Yahoo, raised the issue of the US lifting sanctions on Russia under Trump.

Page was an early foreign-policy adviser to the Trump campaign. He took a "leave of absence" in September after news broke of his July trip to Moscow, and the campaign later denied that he had ever worked with it.

Page, for his part, was "noncommittal" in his response to Sechin's requests that the US lift the sanctions, the dossier said. But he signaled that doing so would be Trump's intention if he won the election, and he expressed interest in Sechin's offer, according to the document.

In a recent interview with The Wall Street Journal, Trump suggested the sanctions could be lifted if Moscow proved to be a useful ally. "If you get along and if Russia is really helping us," Trump asked, "why would anybody have sanctions if somebody’s doing some really great things?”

Page has criticized the US sanctions on Russia as "sanctimonious expressions of moral superiority." He praised Sechin in a May 2014 blog post for his "accomplishments" in advancing US-Russia relations. A US official serving in Russia while Page worked at Merrill Lynch in Moscow told Isikoff that Page "was pretty much a brazen apologist for anything Moscow did."

Page is also believed to have met with senior Kremlin internal affairs official Igor Diveykin while he was in Moscow last July, according to Isikoff's intelligence sources. The dossier separately claimed that Diveykin — whom US officials believe was responsible for the intelligence collected by Russia about the US election — met with Page and hinted that the Kremlin possessed compromising information about Trump.

It is unclear whether Isikoff's reporting is related to the dossier, which has been circulating among top intelligence officials, lawmakers, and journalists since mid-2016.

A scramble for a foreign investor
After mid-October, the dossier said, Sechin predicted that it would no longer be possible for Trump to win the presidency, so he "put feelers out to other business and political contacts" to purchase a stake in Rosneft.

Rosneft then scrambled to find a foreign investor, holding talks with more than 30 potential buyers from Europe, the US, Asia, and the Middle East. The company signed a deal on December 7 to sell 19.5% of shares, or roughly $11 billion, to the multinational commodity trader Glencore Plc and Qatar's state-owned wealth fund. Qatar's sovereign wealth fund is Glencore's largest shareholder.

The "11th hour deal" was "so last minute," Reuters reported, "that it appeared it would not close in time to meet the government's deadline for booking money in the budget from the sale."

The purchase amounted to the biggest foreign investment in Russia since US sanctions took effect in 2014. It showed that "there are some forces in the world that are ready to help Russia to circumvent the [West's] sanction regime," said Lilia Shevtsova, an associate fellow in the Russia and Eurasia program at Chatham House.

Rosneft CEO Igor Sechin attends a briefing dedicated to the signing of a contract between Rosneft and Essar Oil Ltd. companies in Ufa, Russia, July 8, 2015. REUTERS/Sergei Karpukhin
Rosneft CEO Igor Sechin at a briefing dedicated to the signing of a contract between Rosneft and Essar Oil Ltd. Thomson Reuters
"In Russia we have a marriage between power and business, and that is why all important economic deals need approval and the endorsement of the authorities," Shevtsova said. "This was a very serious commercial deal that hardly could have succeeded without the direct involvement of the Kremlin."

The privatization deal was funded by Gazprombank, whose parent company is the state-owned Russian energy giant Gazprom.

Page holds investments in Gazprom, though he claimed in a letter to FBI Director James Comey in September that he sold his stake in the company "at a loss." His website says he served as an adviser "on key transactions" for the state-owned energy giant before setting up his energy investment fund, Global Energy Capital, in 2008 with former Gazprom executive Sergei Yatsenko.

There is no evidence that Carter played any role in the Rosneft deal. But he was back in Moscow on December 8 — one day after the deal was signed — to "meet with some of the top managers" of Rosneft, he told reporters at the time. Page denied meeting with Sechin, Rosneft's CEO, during that trip but said it would have been "a great honor" if he had.

The Rosneft deal, Page added, was "a good example of how American private companies are unfortunately limited to a great degree due to the influence of sanctions." He said the US and Russia had entered "a new era" of relations but that it was still "too early" to discuss whether Trump would be easing or lifting sanctions on Moscow.

Page's extensive business ties to state-owned Russian companies were investigated by a counterintelligence task force set up last year by the CIA. The investigation, which is reportedly ongoing, has examined whether Russia was funneling money into Trump's presidential campaign — and, if it was, who was serving as the liaison between the Trump team and the Kremlin.

The dossier claims that Trump's former campaign manager Paul Manafort asked Page to be the liaison. That claim has not been verified. Manafort served as a top adviser to a pro-Russian political party in Ukraine from 2004 to 2012 and emerged as a central figure in both the dossier and the intelligence community's early inquiries into Trump's ties to Russia.
http://www.businessinsider.com/carter-p ... ier-2017-1



https://www.youtube.com/watch?v=daKZXYdYKT0
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: US Punishes Russia for Election Hacking Ejecting Operati

Postby seemslikeadream » Wed Feb 01, 2017 11:48 am

Russians suspected of hacking Wisconsin Dems
Paul Srubas, Green Bay (Wis.) Press-Gazette 10:53 p.m. ET Jan. 24, 2017
187972611.jpg
(Photo: Getty Images/iStockphoto)
GREEN BAY — County websites of the Democratic Party in the area have been under attack, at least one apparently by Russian hackers, an officer of the party said.

What appears to have been Russian hackers compromised the website of the 8th Congressional District Democratic Party as well as the sites of seven county Democratic party organizations, said Mary Ginnebaugh, who chairs the congressional district as well as the Brown County Democratic parties.

Russian hackers have been accused on the national level with interfering with the U.S. presidential election by getting into the Democratic National Committee’s website as well as that of the Democratic Congressional Campaign Committee in Washington.

While no one can prove beyond doubt that Russians also were involved in the local hack job, two hackers left “calling cards” with Russian email addresses on the local websites in an apparent gesture of contempt or braggadocio, Ginnebaugh said. Green Bay police were notified and have forwarded information to the FBI, she said.

Microsoft to block Windows flaw used by Russian hackers
Ginnebaugh said she was stunned when a computer security consultant told her that Russians may have been involved.

“It was ‘Wait a minute, we’re little bitty Green Bay, not some powerhouse,’” she said. “I was like, ‘Really?’”

The hackers may have been targeting the state site and stumbled onto the 8th Congressional District site, Ginnebaugh said. “We’re one letter off,” she said. “We’re wiscdems.com and the state is wisdems.com.”

The 8th Congressional domain name wiscdems.com serves as an umbrella for county democratic organizations within the district, Ginnebaugh said. Visitors can get to the individual sites from the umbrella site or vice versa. However, the sites are independent of the state and national sites, she said.

The Winnebago County Democratic Party first noticed a problem with its website in November, shortly after the election. People trying to get into that website were being abruptly redirected to some random website and couldn’t get to the party’s site, Ginnebaugh said.

Officers from the Winnebago County party, part of whose county lies in the 8th District, notified the 8th District party. Staff looked into it and determined the problem appeared to be isolated to the Winnebago County site, Ginnebaugh said.

But when technicians from the 8th District couldn’t fix it, they contacted Jane Benson of Main Jane Designs of Green Bay. Benson is a web designer and does online marketing, but she also often works as an IT consultant for the local Democratic parties.

Benson found the problem was wider than 8th District staffers thought. Seven county sites, including Brown County’s, and the umbrella site all were compromised, Benson said. Aside from Winnebago County noticing the problem with its link, they also were notified by Google that their searches were revealing a corruption. Google demanded the corruption be fixed or the site would be blacklisted from Google searches.

Shawano, Marinette, Oconto, Kewaunee and Calumet county party sites were hacked, as were Brown and Winnebago and the overall 8th district site, Ginnebaugh said. Door, Outagamie, Menominee and Waupaca counties were not affected.

At Benson’s direction, the party hired Sucuri, an internationally known cyber security company. It cleaned their sites of all malware and took a variety of other protective steps, Benson said.

All websites are made up of code that often turns out to have a security weakness that can make a website vulnerable, Benson said. Patches are sent out and administrators must update each website to keep it protected. With the election over and the holidays in full gear, people were on vacation, few were visiting the websites and attentiveness apparently lapsed, allowing hackers to get back in, Benson said.

Russian hackers did not break into the computers of Donald Trump's presidential campaign or active accounts of the Republican National Committee, according to FBI chief James Comey. Video provided by AFP Newslook

“Somehow, somebody was able to disable one of the Sucuri security features on the wiscdems.com website,” Benson said. “There’s an expectation that the plugins and platform code will be updated, and if they're not, it can leave an opening for hackers to get in.”

Two new users showed up as registered administrators of the website: larisa@steamreal.ru and ewartumba@mail.ru. The “.ru” suffix indicates a Russian origin, Benson said. The profile pages of the users had characters in the Russian alphabet in "Address" and "About Me" fields, she said.

Code was entered, apparently through a back door, to add two registered users, but the website is set up to automatically block new registrants, so the intruders could do no damage. "It's not clear how they got there," Benson said.

The intruders could just as easily have removed all trace of having been there and just backed quietly out, but they chose to leave their names “as if to say, ‘We can get in whenever we want,’” Benson said.

She said she can’t say whether Russians were really involved or whether the addresses could have been faked by someone mimicking a connection based on what had been in the news. But it was important that police and the FBI become involved, to “make this information part of the body of information police and the FBI are compiling from the national investigation,” she said.

A call to Green Bay police detectives was not returned Monday.

Benson said it was important for the public to know the hackers did not succeed in “harvesting information,” that breaches in the sites have been repaired and that everything is being professionally monitored to keep it secure.

Ginnebaugh said the state Democratic Party also has been notified and would presumably be passing the information on to national levels.
http://www.usatoday.com/story/news/poli ... /97023222/
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: US Punishes Russia for Election Hacking Ejecting Operati

Postby seemslikeadream » Thu Mar 02, 2017 5:36 pm

Image



US Senate calls on British spy Christopher Steele to give evidence on explosive Trump-Russia dossier

Exclusive: Republicans and Democrats in Congress keen to facilitate discreet meetings in the UK or on neutral territory, as pressure grows on President

Kim Sengupta Defence Editor Thursday 2 March 2017 18:30 GMT157 comments

President Donald Trump arrives to board Air Force One at Joint Base Andrews in Maryland Reuters
Christopher Steele, the former MI6 spy who prepared the explosive Trump report, has been approached about testifying before the US Senate Intelligence Committee’s investigation into the new President’s alleged links with Russia, The Independent can reveal.

Mr Steele’s friends say it is currently unlikely he would be willing to travel to the US. But it is understood Democrats – as well as some Republicans – in Congress are prepared to facilitate discreet initial meetings in the UK or on other neutral territory.

John McCain, the former Republican presidential candidate, and chairman of the Senate Armed Services Committee, sent an intermediary to London in November last year to collect Mr Steele’s dossier, which was subsequently passed personally by the Senator to FBI director James Comey.

And Mr Steele had, while carrying out his Trump inquiry, himself liaised for regular periods with the bureau.

Mr Trump has personally attacked Mr Steele, declaring the report on the Kremlin connection by the former MI6 officer as a fabricated work, put together by a “failed spy”.

In reality, Mr Steele was, and continues to be, held in high regard by British security and intelligence services as well as the American security officials who worked with him in the past.

It emerged this week that the FBI had, at one stage, proposed to pay him to continue his investigation into Mr Trump and his associates.


But that deal fell through and Mr Steele ultimately continued to work without pay because he was so worried by what he was discovering.

Mr Steele has not yet responded to requests to meet with Senate officials – described as informal at this stage – for testimony, which have come over the last fortnight. But friends say he may be willing to speak about his investigation to senators and US officials if certain security conditions are met.

The development comes amid fresh revelations of the Trump administration’s interaction with the Russians. It has emerged that Jeff Sessions, the Attorney General, was in contact with Moscow’s ambassador to the US during the election campaign.

It has also emerged that in the last days of Barack Obama’s presidency, officials were so worried that the incoming Trump administration would try to suppress or destroy incriminating material that they passed on information to the intelligence agencies and senior figures in Congress.

There is now similar concern that the Trump White House is trying to sabotage the Russia investigations. Democrats have asked for an inquiry into attempts by White House chief of staff, Reince Priebus, to get the FBI to dismiss media reports about members of Mr Trump’s coterie contacting Russian officials.

The drive to contact Mr Steele and others, according to those familiar with the issue, is to try and ensure that as much information as possible is gathered by the Senate Intelligence Committee.

The committee is carrying out its own investigation, separate from one being conducted by the FBI, on the Russian links and attempts by the Kremlin to interfere in the American political process. There will, however, be mutual sharing of relevant material.

The Washington Post this week reported the plan by the FBI to pay Mr Steele, who was one of MI6’s foremost Russia specialists, to continue his inquiries.

The Independent understands that the offer came after the discovery of a campaign of cyber hacking on state electoral systems in September, which led to a public charge against Moscow by the Obama administration.

Mr Steele became involved in the Trump investigation through the Washington-based firm Fusion GPS, which had been hired by Republican opponents of Mr Trump in September 2015.

In June 2016, Mr Steele joined up with the team. In July, Mr Trump won the Republican nomination and the Democrats became new employers of Mr Steele and Fusion GPS. With that contract due to come to an end with the election, the FBI stepped in with its offer of funding.

Mr Steele has been regularly supplying information to the FBI. In June last year, for instance, he produced a memo which went to the bureau stating that Mr Trump’s campaign team had agreed to a Russian request to dilute attention on Moscow’s intervention in Ukraine.

Four days later Mr Trump stated that he would recognise Moscow’s annexation of Crimea: officials involved in his campaign having already asked the Republican party’s election platform to remove a pledge for military assistance to the Ukrainian government against separatist rebels in the east of the country.

Mr Steele claimed the Trump campaign was taking this path because it was aware that the Russians were hacking Democratic Party emails. The same day that Mr Trump spoke about Crimea, he called on the Kremlin to hack Hillary Clinton’s emails.

However, Mr Steele became increasingly frustrated that the FBI was failing to take action on the intelligence from others as well as him.

He came to believe there was a cover-up, that a cabal within the bureau blocked a thorough inquiry into Mr Trump, focusing instead on the investigation into Hillary Clinton’s emails. The MI6 officer’s passing of information to the FBI ceased in December last year.
http://www.independent.co.uk/news/world ... 08456.html


seemslikeadream » Wed Jan 11, 2017 4:29 pm wrote:SURPRISE! it wasn't 4ch :roll:


Ex-spy behind Trump intelligence dossier identified: report
BY MARK HENSCH - 01/11/17 03:22 PM EST 248


Ex-spy behind Trump intelligence dossier identified: report
© Getty Images
A former British intelligence officer who prepared a dossier about President-elect Trump’s ties to Russia has been identified, according to a new report.

Christopher Steele created the controversial document about the Russian government’s alleged power over Trump, The Wall Street Journal reported Wednesday.

The dossier, which alleges links between Trump's campaign and the Russian government, as well as the existence of compromising Russian-owned material on Trump, created a stir Tuesday. CNN reported that the dossier's contents came up in an intelligence meeting with Trump, and BuzzFeed later published the unverified document — two reports Trump and his staff denounced in a press conference today.

Steele is now a director at a private security and investigations firm in London, according to the Journal.

Steele, 52, is one of two directors at Orbis Business Intelligence Ltd. The dossier's creator has been repeatedly described in reports as having a good reputation in intelligence circles.
Orbis was formed in 2009 by former British intelligence professionals, according to the firm’s website. The company mounts “intelligence-gathering operations” and conducts “complex, often cross-border investigations."

A source told the Journal that Steele created the dossier, which is a series of unsigned memos seemingly written between June and December 2016.

Steele also devised a plan for disseminating the document to U.S. and European law enforcement officials, they added, including the FBI.

Orbis’s other co-director is Christopher Burrows, 58, a former counselor in Britain’s Foreign and Commonwealth office.

Burrows told the publication he would not “confirm or deny” Orbis had a role in the report.

“We have no political ax to grind,” he said, adding that Orbis “sees what’s out there first” when conducting an investigation and then performs a “stress test” on its results.

CNN reported Tuesday, meanwhile, that top intelligence officials presented Trump with a two-page synopsis of the dossier last week.

The synopsis was reportedly attached as an appendix to the intelligence community’s report on alleged Russian interference in the 2016 presidential race.

The controversial dossier alleges the Russian government possesses compromising financial and personal information about Trump. It also claims that people close to Trump kept touch with Moscow during last year’s presidential campaign.

U.S. intelligence officials have not verified the dossier's details, however, and it remains unclear how reliable they are.

Trump on Wednesday fiercely criticized the dossier's leak to media outlets.
http://thehill.com/policy/national-secu ... ied-report





Alastair Reid
‏@ajreid
ICYMI: BBC correspondent says there's more than one source, more than one tape & more than one date of allegations in Trump intel dossier


https://twitter.com/ajreid/status/81922 ... 68/video/1



REMINDER

OCT. 31 2016 5:36 PM

Was a Trump Server Communicating With Russia?

This spring, a group of computer scientists set out to determine whether hackers were interfering with the Trump campaign. They found something they weren’t expecting.

By Franklin Foer
U.S. presidential nominee Donald Trump gives a fist-pump to the ground crew as he arrives on his plane in St. Augustine, Florida, U.S. October 24, 2016.
Donald Trump gives a fist-pump to the ground crew as he arrives on his plane in St. Augustine, Florida, on Oct. 24.
Jonathan Ernst/Reuters

Read Franklin Foer's follow-up story for new statements from the Trump campaign and Alfa Bank and analysis of the competing theories about the server and its activity.⁠⁠

The greatest miracle of the internet is that it exists—the second greatest is that it persists. Every so often we’re reminded that bad actors wield great skill and have little conscience about the harm they inflict on the world’s digital nervous system. They invent viruses, botnets, and sundry species of malware. There’s good money to be made deflecting these incursions. But a small, tightly knit community of computer scientists who pursue such work—some at cybersecurity firms, some in academia, some with close ties to three-letter federal agencies—is also spurred by a sense of shared idealism and considers itself the benevolent posse that chases off the rogues and rogue states that try to purloin sensitive data and infect the internet with their bugs. “We’re the Union of Concerned Nerds,” in the wry formulation of the Indiana University computer scientist L. Jean Camp.

In late spring, this community of malware hunters placed itself in a high state of alarm. Word arrived that Russian hackers had infiltrated the servers of the Democratic National Committee, an attack persuasively detailed by the respected cybersecurity firm CrowdStrike. The computer scientists posited a logical hypothesis, which they set out to rigorously test: If the Russians were worming their way into the DNC, they might very well be attacking other entities central to the presidential campaign, including Donald Trump’s many servers. “We wanted to help defend both campaigns, because we wanted to preserve the integrity of the election,” says one of the academics, who works at a university that asked him not to speak with reporters because of the sensitive nature of his work.

Hunting for malware requires highly specialized knowledge of the intricacies of the domain name system—the protocol that allows us to type email addresses and website names to initiate communication. DNS enables our words to set in motion a chain of connections between servers, which in turn delivers the results we desire. Before a mail server can deliver a message to another mail server, it has to look up its IP address using the DNS. Computer scientists have built a set of massive DNS databases, which provide fragmentary histories of communications flows, in part to create an archive of malware: a kind of catalog of the tricks bad actors have tried to pull, which often involve masquerading as legitimate actors. These databases can give a useful, though far from comprehensive, snapshot of traffic across the internet. Some of the most trusted DNS specialists—an elite group of malware hunters, who work for private contractors—have access to nearly comprehensive logs of communication between servers. They work in close concert with internet service providers, the networks through which most of us connect to the internet, and the ones that are most vulnerable to massive attacks. To extend the traffic metaphor, these scientists have cameras posted on the internet’s stoplights and overpasses. They are entrusted with something close to a complete record of all the servers of the world connecting with one another.

In late July, one of these scientists—who asked to be referred to as Tea Leaves, a pseudonym that would protect his relationship with the networks and banks that employ him to sift their data—found what looked like malware emanating from Russia. The destination domain had Trump in its name, which of course attracted Tea Leaves’ attention. But his discovery of the data was pure happenstance—a surprising needle in a large haystack of DNS lookups on his screen. “I have an outlier here that connects to Russia in a strange way,” he wrote in his notes. He couldn’t quite figure it out at first. But what he saw was a bank in Moscow that kept irregularly pinging a server registered to the Trump Organization on Fifth Avenue.

More data was needed, so he began carefully keeping logs of the Trump server’s DNS activity. As he collected the logs, he would circulate them in periodic batches to colleagues in the cybersecurity world. Six of them began scrutinizing them for clues.

Trump Tower.
Trump Tower.
Ullstein Bild/Getty Images

(I communicated extensively with Tea Leaves and two of his closest collaborators, who also spoke with me on the condition of anonymity, since they work for firms trusted by corporations and law enforcement to analyze sensitive data. They persuasively demonstrated some of their analytical methods to me—and showed me two white papers, which they had circulated so that colleagues could check their analysis. I also spoke with academics who vouched for Tea Leaves’ integrity and his unusual access to information. “This is someone I know well and is very well-known in the networking community,” said Camp. “When they say something about DNS, you believe them. This person has technical authority and access to data.”)

The researchers quickly dismissed their initial fear that the logs represented a malware attack. The communication wasn’t the work of bots. The irregular pattern of server lookups actually resembled the pattern of human conversation—conversations that began during office hours in New York and continued during office hours in Moscow. It dawned on the researchers that this wasn’t an attack, but a sustained relationship between a server registered to the Trump Organization and two servers registered to an entity called Alfa Bank.

The researchers had initially stumbled in their diagnosis because of the odd configuration of Trump’s server. “I’ve never seen a server set up like that,” says Christopher Davis, who runs the cybersecurity firm HYAS InfoSec Inc. and won a FBI Director Award for Excellence for his work tracking down the authors of one of the world’s nastiest botnet attacks. “It looked weird, and it didn’t pass the sniff test.” The server was first registered to Trump’s business in 2009 and was set up to run consumer marketing campaigns. It had a history of sending mass emails on behalf of Trump-branded properties and products. Researchers were ultimately convinced that the server indeed belonged to Trump. (Click here to see the server’s registration record.) But now this capacious server handled a strangely small load of traffic, such a small load that it would be hard for a company to justify the expense and trouble it would take to maintain it. “I get more mail in a day than the server handled,” Davis says.

“I’ve never seen a server set up like that.”
Christopher Davis of the cybersecurity firm HYAS InfoSec Inc.
That wasn’t the only oddity. When the researchers pinged the server, they received error messages. They concluded that the server was set to accept only incoming communication from a very small handful of IP addresses. A small portion of the logs showed communication with a server belonging to Michigan-based Spectrum Health. (The company said in a statement: “Spectrum Health does not have a relationship with Alfa Bank or any of the Trump organizations. We have concluded a rigorous investigation with both our internal IT security specialists and expert cyber security firms. Our experts have conducted a detailed analysis of the alleged internet traffic and did not find any evidence that it included any actual communications (no emails, chat, text, etc.) between Spectrum Health and Alfa Bank or any of the Trump organizations. While we did find a small number of incoming spam marketing emails, they originated from a digital marketing company, Cendyn, advertising Trump Hotels.”)

Spectrum accounted for a relatively trivial portion of the traffic. Eighty-seven percent of the DNS lookups involved the two Alfa Bank servers. “It’s pretty clear that it’s not an open mail server,” Camp told me. “These organizations are communicating in a way designed to block other people out.”

Earlier this month, the group of computer scientists passed the logs to Paul Vixie. In the world of DNS experts, there’s no higher authority. Vixie wrote central strands of the DNS code that makes the internet work. After studying the logs, he concluded, “The parties were communicating in a secretive fashion. The operative word is secretive. This is more akin to what criminal syndicates do if they are putting together a project.” Put differently, the logs suggested that Trump and Alfa had configured something like a digital hotline connecting the two entities, shutting out the rest of the world, and designed to obscure its own existence. Over the summer, the scientists observed the communications trail from a distance.

* * *

While the researchers went about their work, the conventional wisdom about Russian interference in the campaign began to shift. There were reports that the Trump campaign had ordered the Republican Party to rewrite its platform position on Ukraine, maneuvering the GOP toward a policy preferred by Russia, though the Trump campaign denied having a hand in the change. Then Trump announced in an interview with the New York Times his unwillingness to spring to the defense of NATO allies in the face of a Russian invasion. Trump even invited Russian hackers to go hunting for Clinton’s emails, then passed the comment off as a joke. (I wrote about Trump’s relationship with Russia in early July.)

In the face of accusations that he is somehow backed by Putin or in business with Russian investors, Trump has issued categorical statements. “I mean I have nothing to do with Russia,” he told one reporter, a flat denial that he repeated over and over. Of course, it’s possible that these statements are sincere and even correct. The sweeping nature of Trump’s claim, however, prodded the scientists to dig deeper. They were increasingly confident that they were observing data that contradicted Trump’s claims.

US Republican presidential candidate Donald Trump speaks at a rally at The Champions Center Expo in Springfield, Ohio, on October 27, 2016.
Donald Trump speaks at a rally at in Springfield, Ohio, on Thursday.
Paul Vernon/Getty Images

In the parlance that has become familiar since the Edward Snowden revelations, the DNS logs reside in the realm of metadata. We can see a trail of transmissions, but we can’t see the actual substance of the communications. And we can’t even say with complete certitude that the servers exchanged email. One scientist, who wasn’t involved in the effort to compile and analyze the logs, ticked off a list of other possibilities: an errant piece of spam caroming between servers, a misdirected email that kept trying to reach its destination, which created the impression of sustained communication. “I’m seeing a preponderance of the evidence, but not a smoking gun,” he said. Richard Clayton, a cybersecurity researcher at Cambridge University who was sent one of the white papers laying out the evidence, acknowledges those objections and the alternative theories but considers them improbable. “I think mail is more likely, because it’s going to a machine running a mail server and [the host] is called mail. Dr. Occam says you should rule out mail before pulling out the more exotic explanations.” After Tea Leaves posted his analysis on Reddit, a security blogger who goes by Krypt3ia expressed initial doubts—but his analysis was tarnished by several incorrect assumptions, and as he examined the matter, his skepticism of Tea Leaves softened somewhat.

I put the question of what kind of activity the logs recorded to the University of California’s Nicholas Weaver, another computer scientist not involved in compiling the logs. “I can't attest to the logs themselves,” he told me, “but assuming they are legitimate they do indicate effectively human-level communication.”

Weaver’s statement raises another uncertainty: Are the logs authentic? Computer scientists are careful about vouching for evidence that emerges from unknown sources—especially since the logs were pasted in a text file, where they could conceivably have been edited. I asked nine computer scientists—some who agreed to speak on the record, some who asked for anonymity—if the DNS logs that Tea Leaves and his collaborators discovered could be forged or manipulated. They considered it nearly impossible. It would be easy enough to fake one or maybe even a dozen records of DNS lookups. But in the aggregate, the logs contained thousands of records, with nuances and patterns that not even the most skilled programmers would be able to recreate on this scale. “The data has got the right kind of fuzz growing on it,” Vixie told me. “It’s the interpacket gap, the spacing between the conversations, the total volume. If you look at those time stamps, they are not simulated. This bears every indication that it was collected from a live link.” I asked him if there was a chance that he was wrong about their authenticity. “This passes the reasonable person test,” he told me. “No reasonable person would come to the conclusion other than the one I’ve come to.” Others were equally emphatic. “It would be really, really hard to fake these,” Davis said. According to Camp, “When the technical community examined the data, the conclusion was pretty obvious.”

It’s possible to impute political motives to the computer scientists, some of whom have criticized Trump on social media. But many of the scientists who talked to me for this story are Republicans. And almost all have strong incentives for steering clear of controversy. Some work at public institutions, where they are vulnerable to political pressure. Others work for firms that rely on government contracts—a relationship that tends to squash positions that could be misinterpreted as outspoken.

* * *

The researchers were seeing patterns in the data—and the Trump Organization’s potential interlocutor was itself suggestive. Alfa Bank emerged in the messy post-Soviet scramble to create a private Russian economy. Its founder was a Ukrainian called Mikhail Fridman. He erected his empire in a frenetic rush—in a matter of years, he rose from operating a window washing company to the purchase of the Bolshevik Biscuit Factory to the co-founding of his bank with some friends from university. Fridman could be charmingly open when describing this era. In 2003, he told the Financial Times, “Of course we benefitted from events in the country over the past 10 years. Of course we understand that the distribution of state property was not very objective. … I don’t want to lie and play this game. To say one can be completely clean and transparent is not realistic.”

To build out the bank, Fridman recruited a skilled economist and shrewd operator called Pyotr Aven. In the early ’90s, Aven worked with Vladimir Putin in the St. Petersburg government—and according to several accounts, helped Putin wiggle out of accusations of corruption that might have derailed his ascent. (Karen Dawisha recounts this history in her book Putin’s Kleptocracy.) Over time, Alfa built one of the world’s most lucrative enterprises. Fridman became the second richest man in Russia, valued by Forbes at $15.3 billion.

Alfa’s oligarchs occupied an unusual position in Putin’s firmament. They were insiders but not in the closest ring of power. “It’s like they were his judo pals,” one former U.S. government official who knows Fridman told me. “They were always worried about where they stood in the pecking order and always feared expropriation.” Fridman and Aven, however, are adept at staying close to power. As the U.S. District Court for the District of Columbia once ruled, in the course of dismissing a libel suit the bankers filed, “Aven and Fridman have assumed an unforeseen level of prominence and influence in the economic and political affairs of their nation.”
Unlike other Russian firms, Alfa has operated smoothly and effortlessly in the West. It has never been slapped with sanctions. Fridman and Aven have cultivated a reputation as beneficent philanthropists. They endowed a prestigious fellowship. The Woodrow Wilson International Center for Scholars, the American-government funded think tank, gave Aven its award for “Corporate Citizenship” in 2015. To protect its interests in Washington, Alfa hired as its lobbyist former Reagan administration official Ed Rogers. Richard Burt, who helped Trump write the speech in which he first laid out his foreign policy, previously served on Alfa’s senior advisory board.* The branding campaign has worked well. During the first Obama term, Fridman and Aven met with officials in the White House on two occasions, according to visitor logs.

Fridman and Aven have significant business interests to promote in the West. One of their holding companies, LetterOne, has vowed to invest as much as $3 billion in U.S. health care. This year, it sank $200 million into Uber. This is, of course, money that might otherwise be invested in Russia. According to a former U.S. official, Putin tolerates this condition because Alfa advances Russian interests. It promotes itself as an avatar of Russian prowess. “It’s our moral duty to become a global player, to prove a Russian can transform into an international businessman,” Fridman told the Financial Times.

* * *

Tea Leaves and his colleagues plotted the data from the logs on a timeline. What it illustrated was suggestive: The conversation between the Trump and Alfa servers appeared to follow the contours of political happenings in the United States. “At election-related moments, the traffic peaked,” according to Camp. There were considerably more DNS lookups, for instance, during the two conventions.

pol_161031_screenshotlarge
Start: DNS lookup history start date.

RFC from Alfa-Bank: Alfa-Bank rep provided with 2 ips, hostname, count.

Errors: 4:11 a.m. UTC: DNS lookup errors Trump-Email.com.

Errors: 1:12 a.m. UTC: DNS lookup errors Trump-Email.com.

Taken down: 9:53 a.m. EST USA time: Trump-Email.com deleted from Trump authoritative name server zone.
In September, the scientists tried to get the public to pay attention to their data. One of them posted a link to the logs in a Reddit thread. Around the same time, the New York Times’ Eric Lichtblau and Steven Lee Myers began chasing the story.* (They are still pursuing it.) Lichtblau met with a Washington representative of Alfa Bank on Sept. 21, and the bank denied having any connection to Trump. (Lichtblau told me that Times policy prevents him from commenting on his reporting.)

The Times hadn’t yet been in touch with the Trump campaign—Lichtblau spoke with the campaign a week later—but shortly after it reached out to Alfa, the Trump domain name in question seemed to suddenly stop working. When the scientists looked up the host, the DNS server returned a fail message, evidence that it no longer functioned. Or as it is technically diagnosed, it had “SERVFAILed.” (On the timeline above, this is the moment at the end of the chronology when the traffic abruptly spikes, as servers frantically attempt to resend rejected messages.) The computer scientists believe there was one logical conclusion to be drawn: The Trump Organization shut down the server after Alfa was told that the Times might expose the connection. Weaver told me the Trump domain was “very sloppily removed.” Or as another of the researchers put it, it looked like “the knee was hit in Moscow, the leg kicked in New York.”

As one of the researchers put it, it looked like “the knee was hit in Moscow, the leg kicked in New York.”
Four days later, on Sept. 27, the Trump Organization created a new host name, trump1.contact-client.com, which enabled communication to the very same server via a different route. When a new host name is created, the first communication with it is never random. To reach the server after the resetting of the host name, the sender of the first inbound mail has to first learn of the name somehow. It’s simply impossible to randomly reach a renamed server. “That party had to have some kind of outbound message through SMS, phone, or some noninternet channel they used to communicate [the new configuration],” Paul Vixie told me. The first attempt to look up the revised host name came from Alfa Bank. “If this was a public server, we would have seen other traces,” Vixie says. “The only look-ups came from this particular source.”

According to Vixie and others, the new host name may have represented an attempt to establish a new channel of communication. But media inquiries into the nature of Trump’s relationship with Alfa Bank, which suggested that their communications were being monitored, may have deterred the parties from using it. Soon after the New York Times began to ask questions, the traffic between the servers stopped cold.

* * *

Last week, I wrote to Alfa Bank asking if it could explain why its servers attempted to connect with the Trump Organization on such a regular basis. Its Washington representative, Jeffrey Birnbaum of the public relations firm BGR, provided me the following response:

Alfa hired Mandiant, one of the world's foremost cyber security experts, to investigate and it has found nothing to the allegations. I hope the below answers respond clearly to your questions. Neither Alfa Bank nor its principals, including Mikhail Fridman and Petr Aven, have or have had any contact with Mr. Trump or his organizations. Fridman and Aven have never met Mr. Trump nor have they or Alfa Bank had any business dealings with him. Neither Alfa nor its officers have sent Mr. Trump or his organizations any emails, information or money. Alfa Bank does not have and has never had any special or exclusive internet connection with Mr. Trump or his entities. The assertion of a special or private link is patently false.
I asked Birnbaum if he would connect me with Mandiant to elaborate on its findings. He told me:

Mandiant is still doing its deep dive into the Alfa Bank systems. Its leading theory is that Alfa Bank's servers may have been responding with common DNS look ups to spam sent to it by a marketing server. But it doesn't want to speak on the record until it's finished its investigation.
It’s hard to evaluate the findings of an investigation that hasn’t ended. And of course, even the most reputable firm in the world isn’t likely to loudly broadcast an opinion that bites the hand of its client.

I posed the same basic questions to the Trump campaign. Trump spokeswoman Hope Hicks sent me this in response to my questions by email:

The email server, set up for marketing purposes and operated by a third-party, has not been used since 2010. The current traffic on the server from Alphabank's [sic] IP address is regular DNS server traffic—not email traffic. To be clear, The Trump Organization is not sending or receiving any communications from this email server. The Trump Organization has no communication or relationship with this entity or any Russian entity.
I asked Hicks to explain what caused the Trump Organization to rename its host after the New York Times called Alfa. I also asked how the Trump Organization arrived at its judgment that there was no email traffic. (Furthermore, there’s no such thing as “regular” DNS server traffic, at least not according to the computer scientists I consulted. The very reason DNS exists is to enable email and other means of communication.) She never provided me with a response.

What the scientists amassed wasn’t a smoking gun. It’s a suggestive body of evidence that doesn’t absolutely preclude alternative explanations. But this evidence arrives in the broader context of the campaign and everything else that has come to light: The efforts of Donald Trump’s former campaign manager to bring Ukraine into Vladimir Putin’s orbit; the other Trump adviser whose communications with senior Russian officials have worried intelligence officials; the Russian hacking of the DNC and John Podesta’s email.

We don’t yet know what this server was for, but it deserves further explanation.

Update, Oct. 31, 2016: The article has been updated to make clear that the New York Times reporters learned of the logs independently, not from the Reddit thread. (Return.)

Correction, Nov. 1, 2016: The article originally stated that Richard Burt serves on Alfa’s senior advisory board. He no longer sits on that board. (Return.)

Read Franklin Foer's follow-up story for new statements from the Trump campaign and Alfa Bank and analysis of the competing theories about the server and its activity.⁠⁠

See more of Slate’s election coverage.
http://www.slate.com/articles/news_and_ ... ussia.html




The law firm that spoke at Trump's Press Conference was named Russia's LAW FIRM OF THE YEAR.

https://www.morganlewis.com/news/chambe ... f-the-year




In total there are 108 users online :: 3 registered, 6 hidden and 99 guests (based on users active over the past 5 minutes)
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: US Punishes Russia for Election Hacking Ejecting Operati

Postby seemslikeadream » Tue Mar 07, 2017 3:40 pm

Ex-spy behind Trump dossier reappears
BY MARK HENSCH - 03/07/17 01:19 PM EST 256

A former British spy who created an unverified dossier about President Trump’s ties to Russia returned to work Tuesday.

“I’m now going to be focusing my efforts on supporting the broader interests of our company here,” Christopher Steele said from his London-based office, according to the Associated Press.

Steele, 52, added he is “really pleased” about resuming work at Orbis Business Intelligence, a private security firm. He went into hiding in January after his name surfaced in reports about the dossier.

The former MI6 agent thanked the public for its support but said he won't be making additional comments, according to the AP.
His explosive 35-page memo was compiled as opposition research on Trump during the presidential campaign. The unverified work alleges that Russia’s government has compromising information concerning Trump.

Trump has decried the document as “fake news” compiled by political foes before he became president in January.

Senate Judiciary Chairman Chuck Grassley (R-Iowa) on Monday reportedly opened an inquiry into allegations the FBI previously worked with Steele. Grassley sent FBI Director James Comey a letter asking for records pertaining to any agreements between his bureau and Steele.

The Washington Post reported last week that the FBI agreed to pay Steele to continue investigating Trump's ties to Moscow before the election, though the payments never materialized after news of the dosser went public. Steele had also in the past reportedly worked with the FBI on an anti-corruption probe involving FIFA.

Comey purportedly briefed Trump on the dossier's existence and contents during a private meeting in January. Several news organizations reported about the dossier's existence, while BuzzFeed published the document in full, prompting backlash. Trump and the White House denied the memo's veracity.

“The idea that the FBI and associated of the Clinton campaign would pay Mr. Steele to investigate the Republican nominee for President in the run-up to the election raises further questions about the FBI’s independence from politics, as well as the Obama administration’s use of law enforcement and intelligence agencies for political ends,” Grassley wrote.

The FBI is investigating whether Russia interfered in the 2016 race, and the subject remains a focus of several congressional inquiries.
http://thehill.com/policy/national-secu ... -reappears
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: US Punishes Russia for Election Hacking Ejecting Operati

Postby seemslikeadream » Wed Mar 15, 2017 10:16 am

Russian Espionage Piggybacks on a Cybercriminal’s Hacking

By MICHAEL SCHWIRTZ and JOSEPH GOLDSTEINMARCH 12, 2017

Evgeniy M. Bogachev. The F.B.I. has offered a $3 million bounty for his capture, the most ever for a cybercriminal. CreditFBI

To the F.B.I., Evgeniy M. Bogachev is the most wanted cybercriminal in the world. The bureau has announced a $3 million bounty for his capture, the most ever for computer crimes, and has been trying to track his movements in hopes of grabbing him if he strays outside his home turf in Russia.

He has been indicted in the United States, accused of creating a sprawling network of virus-infected computers to siphon hundreds of millions of dollars from bank accounts around the world, targeting anyone with enough money worth stealing — from a pest control company in North Carolina to a police department in Massachusetts to a Native American tribe in Washington.

In December, the Obama administration announced sanctions against Mr. Bogachev and five others in response to intelligence agencies’ conclusions that Russia had meddled in the presidential election. Publicly, law enforcement officials said it was his criminal exploits that landed Mr. Bogachev on the sanctions list, not any specific role in the hacking of the Democratic National Committee.

But it is clear that for Russia, he is more than just a criminal. At one point, Mr. Bogachev had control over as many as a million computers in multiple countries, with possible access to everything from family vacation photographs and term papers to business proposals and highly confidential personal information. It is almost certain that computers belonging to government officials and contractors in a number of countries were among the infected devices. For Russia’s surveillance-obsessed intelligence community, Mr. Bogachev’s exploits may have created an irresistible opportunity for espionage.

While Mr. Bogachev was draining bank accounts, it appears that the Russian authorities were looking over his shoulder, searching the same computers for files and emails. In effect, they were grafting an intelligence operation onto a far-reaching cybercriminal scheme, sparing themselves the hard work of hacking into the computers themselves, officials said.

The Russians were particularly interested, it seems, in information from military and intelligence services regarding fighting in eastern Ukraine and the war in Syria, according to law enforcement officials and the cybersecurity firm Fox-IT. But there also appear to have been attempts to gain access to sensitive military and intelligence information on infected computers in the United States, often consisting of searches for documents containing the words “top secret” or “Department of Defense.”

The Russian government has plenty of its own cyberspace tools for gathering intelligence. But the piggybacking on Mr. Bogachev’s activities offers some clues to the breadth and creativity of Russia’s espionage efforts at a time when the United States and Europe are scrambling to counter increasingly sophisticated attacks capable of destroying critical infrastructure, disrupting bank operations, stealing government secrets and undermining democratic elections.

This relationship is illustrated by the improbable mix of characters targeted with the sanctions announced by the Obama administration. Four were senior officers with Russia’s powerful military intelligence agency, the G.R.U. Two were suspected cyberthieves on the F.B.I.’s most wanted list: an ethnic Russian from Latvia named Alexsey Belan with a red-tinted Justin Bieber haircut, and Mr. Bogachev, whose F.B.I. file includes a photograph of him holding his spotted Bengal cat while wearing a matching set of leopard-print pajamas.

From Thief to Russian Asset?

His involvement with Russian intelligence may help explain why Mr. Bogachev, 33, is hardly a man on the run. F.B.I. officials say he lives openly in Anapa, a run-down resort town on the Black Sea in southern Russia. He has a large apartment near the shore and possibly another in Moscow, officials say, as well as a collection of luxury cars, though he seems to favor driving his Jeep Grand Cherokee. American investigators say he enjoys sailing and owns a yacht.

Anapa, Russia, a resort town on the Black Sea where Mr. Bogachev lives.CreditDmitry Feoktistov/TASS, via Getty Images
Running the criminal scheme was hard work. Mr. Bogachev often complained of being exhausted and “of having too little time for his family,” said Aleksandr Panin, a Russian hacker, now in a federal prison in Kentucky for bank fraud, who used to communicate with Mr. Bogachev online. “He mentioned a wife and two kids as far as I remember,” Mr. Panin wrote in an email.

Beyond that, little is known about Mr. Bogachev, who preferred to operate anonymously behind various screen names: slavik, lucky12345, pollingsoon. Even close business associates never met him in person or knew his real name.

“He was very, very paranoid,” said J. Keith Mularski, an F.B.I. supervisor in Pittsburgh whose investigation of Mr. Bogachev led to an indictment in 2014. “He didn’t trust anybody.”

Russia does not have an extradition treaty with the United States, and Russian officials say that so long as Mr. Bogachev has not committed a crime on Russian territory, there are no grounds to arrest him.

Attempts to reach Mr. Bogachev for this article were unsuccessful. In response to questions, his lawyer in Anapa, Aleksei Stotskii, said, “The fact that he is wanted by the F.B.I. prevents me morally from saying anything.”

A line in Mr. Bogachev’s file with the Ukrainian Interior Ministry, which has helped the F.B.I. track his movements, describes him as “working under the supervision of a special unit of the F.S.B.,” referring to the Federal Security Service, Russia’s main intelligence agency. The F.S.B. did not respond to a request for comment.

That Mr. Bogachev remains at large “is the most powerful argument” that he is an asset of the Russian government, said Austin Berglas, who was an assistant special agent in charge of cyberinvestigations out of the F.B.I.’s New York field office until 2015. Hackers like Mr. Bogachev are “moonlighters,” Mr. Berglas said, “doing the bidding of Russian intelligence services, whether economic espionage or straight-up espionage.”

Such an arrangement offers the Kremlin a convenient cover story and an easy opportunity to take a peek into the extensive networks of computers infected by Russian hackers, security experts say. Russian intelligence agencies also appear to occasionally employ malware tools developed for criminal purposes, including the popular BlackEnergy, to attack the computers of enemy governments. The recent revelations by WikiLeaks about C.I.A. spying tools suggest that the agency also kept a large reference library of hacking kits, some of which appear to have been produced by Russia.

It also hints at a struggle to recruit top talent. A job with the Russian intelligence agencies does not command the prestige it did in the Soviet era. The Russian state has to compete against the dream of six-figure salaries and stock options in Silicon Valley. A recruiting pitch from a few years ago for the Defense Ministry’s cyberwarfare brigade offered college graduates the rank of lieutenant and a bed in a room with four other people.

Former Assistant Attorney General Leslie R. Caldwell, of the Justice Department’s Criminal Division, announced the effort to disrupt GameOver ZeuS in 2014. Criminal charges against Mr. Bogachev were also unsealed. CreditGary Cameron/Reuters
And so the Kremlin at times turns to the “dark web” or Russian-language forums devoted to cyberfraud and spam. Mr. Bogachev, according to court papers from his criminal case, used to sell malicious software on a site called Carding World, where thieves buy and sell stolen credit card numbers and hacking kits, according to the F.B.I. One recent posting offered to sell American credit card information with CVV security numbers for $5. A user named MrRaiX was selling a malware supposedly designed to pilfer passwords from programs like Google Chrome and Outlook Express.

Rather than shut down such sites, as the F.B.I. typically tries to do, Russian intelligence agents appear to have infiltrated them, security experts say.

Some of the forums state specifically that almost any type of criminality is allowed — bank fraud, counterfeiting documents, weapons sales. One of the few rules: no work in Russia or the former Soviet Union. In Carding World, and in many other forums, a violation results in a lifetime ban.

The Interpreter Newsletter

Understand the world with sharp insight and commentary on the major news stories of the week.

The F.B.I. has long been stymied in its efforts to get Russian cybercriminals. For a time, the bureau had high hopes that its agents and Russian investigators with the F.S.B. would work together to target Russian thieves who had made a specialty of stealing Americans’ credit card information and breaking into their bank accounts. “Here’s to great investigations,” F.B.I. and F.S.B. agents would toast each other at Manhattan steakhouses during periodic trust-building visits, Mr. Berglas said.

But help rarely seemed to materialize. After a while, agents began to worry that the Russian authorities were recruiting the very suspects that the F.B.I. was pursuing. The joke among Justice Department officials was the Russians were more likely to pin a medal on a suspected criminal hacker than help the F.B.I. nab him.

“Almost all the hackers who have been announced by the U.S. government through indictments are immediately tracked by the Russian government,” said Arkady Bukh, a New York-based lawyer who often represents Russian hackers arrested in the United States. “All the time they’re asked to provide logistical and technical support.”

While it was a widely held suspicion, it is tough to prove the connection between cyberthieves and Russian intelligence. But in one case, Mr. Berglas said, F.B.I. agents monitoring an infected computer were surprised to see a hacker who was the target of their investigation share a copy of his passport with a person the F.B.I. believed to be a Russian intelligence agent — a likely signal that the suspect was being recruited or protected. “That was the closest we ever came,” he said.

Fishing for Top Secrets

Mr. Bogachev’s hacking career began well over a decade ago, leading to the creation of a malicious software program called GameOver ZeuS, which he managed with the help of about a half-dozen close associates who called themselves the Business Club, according to the F.B.I. and security researchers. Working around the clock, his criminal gang infected an ever-growing network of computers. It was able to bypass the most advanced banking security measures to quickly empty accounts and transfer the money abroad through a web of intermediaries called money mules. F.B.I. officials said it was the most sophisticated online larceny scheme they had encountered — and for years, it was impenetrable.

Mr. Bogachev became extremely wealthy. At one point, he owned two villas in France and kept a fleet of cars parked around Europe so he would never have to rent a vehicle while on vacation, according to a Ukrainian law enforcement official with knowledge of the Bogachev case, who requested anonymity to discuss the continuing investigation. Officials say he had three Russian passports with different aliases allowing him to travel undercover.



At the height of his operations, Mr. Bogachev had between 500,000 and a million computers under his control, American officials said. And there is evidence that the Russian government took an interest in knowing what was on them.

Beginning around 2011, according to an analysis by Fox-IT, computers under Mr. Bogachev’s control started receiving requests for information — not about banking transactions, but for files relating to various geopolitical developments pulled from the headlines.

Around the time that former President Barack Obama publicly agreed to start sending small arms and ammunition to Syrian rebels, in 2013, Turkish computers infected by Mr. Bogachev’s network were hit with keyword searches that included the terms “weapon delivery” and “arms delivery.” There were also searches for “Russian mercenary” and “Caucasian mercenary,” suggesting concerns about Russian citizens fighting in the war.

Ahead of Russia’s military intervention in Ukraine in 2014, infected computers were searched for information about top-secret files from the country’s main intelligence directorate, the S.B.U. Some of the queries involved searches for personal information about government security officials, including emails from Georgia’s foreign intelligence service, the Turkish Foreign Ministry and others, said Michael Sandee, one of the researchers from Fox-IT.

And at some point between March 2013 and February 2014, there were searches for English-language documents, which seemed to be fishing for American military and intelligence documents. The queries were for terms including “top secret” and “Department of Defense,” said Brett Stone-Gross, a cybersecurity analyst involved in analyzing GameOver ZeuS. “These were in English,” he said. “That was different.”

Cybersecurity experts who studied the case say there is no way to know who ordered the queries. But they were so disconnected from the larceny and fraud that drove Mr. Bogachev’s operation that analysts say there can be no other motive but espionage.

Whether the searches turned up any classified document or sensitive government material is unknown, although the odds are good that there were a number of federal government employees or military contractors with infected personal computers.

“They had such a large number of infections, I would say it’s highly likely they had computers belonging to U.S. government and foreign government employees,” Mr. Stone-Gross said.

In the summer of 2014, the F.B.I., together with law enforcement agencies in over half a dozen countries, carried out Operation Tovar, a coordinated attack on Mr. Bogachev’s criminal infrastructure that shut down his network and liberated computers infected with GameOver ZeuS.

Prosecutors said they were in talks with the Russian government, trying to secure cooperation for the capture of Mr. Bogachev. But the only apparent legal trouble Mr. Bogachev has faced in Russia was a lawsuit filed against him by a real estate company in 2011 over payment of about $75,000 on his apartment in Anapa, according to court papers there. And even that he managed to beat.

These days, officials believe Mr. Bogachev is living under his own name in Anapa and occasionally takes boat trips to Crimea, the Ukrainian peninsula that Russia occupied in 2014. Mr. Mularski, the F.B.I. supervisor, said his agents were “still pursuing leads.”

https://www.nytimes.com/2017/03/12/worl ... achev.html



Justice Dept. to announce charges in massive Yahoo hacks
Kevin Johnson and Jessica Guynn, USA TODAY Published 10:03 p.m. ET March 14, 2017 | Updated 9 hours ago

Yahoo's latest security breach is said to have affected over 1 billion users. Here's what you should do to protect yourself. Sean Dowling (@seandowlingtv) has more. Buzz60

SAN FRANCISCO — The Justice Department is expected to announce charges as soon as Wednesday related to hacking attacks that compromised millions of Yahoo user accounts, according to a U. S. official.

The official, who is not authorized to comment publicly, declined to elaborate. The Justice Department has scheduled an announcement Wednesday morning.

Yahoo declined to comment. Verizon, which is buying Yahoo's core Internet business, also declined to comment.

Bloomberg first reported the development late Tuesday.

It's unclear if the charges stem from the hacking of data of approximately 1 billion Yahoo users that Yahoo disclosed in December or a separate incident that involved about 500 million accounts that took place in 2014. Yahoo has said it has evidence linking the 500-million-account breach to a state-sponsored actor.

It's new and it's bad: Yahoo discloses 1B account breach
The security breaches prompted Verizon to negotiate a price reduction, trimming $350 million from the acquisition of Yahoo for a total of $4.48 billion. The two companies will share some legal and regulatory liabilities arising from the breaches.

Yahoo CEO Marissa Mayer agreed to forgo any annual equity award she might get for 2017 because of the massive breach her company suffered in 2014.

The Yahoo board also voted to withhold her 2016 annual bonus — usually around $2 million— for the same reason. Under her contract, her equity award is not to be less than $12 million per year. Yahoo's general counsel Ronald S. Bell resigned from the company and received no payout.
http://www.usatoday.com/story/tech/news ... /99194172/
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Previous

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 52 guests