tag:blogger.com,1999:blog-90318409773030290062024-03-13T20:38:08.012-07:00Digital DaoEvolving Hostilities in the Global Cyber CommonsUnknownnoreply@blogger.comBlogger403125tag:blogger.com,1999:blog-9031840977303029006.post-22795984630300544282022-03-03T09:18:00.002-08:002022-03-03T09:31:35.252-08:00Captured Documents Related to Russia's 30th Division of Surface Ships <table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto;"><tbody><tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgGaLIt4bLfpESmrNr31ilGJ8uHShnOkppONPVt51u9STASPap5hKoP85REbm5DxMbAFFpuyPB9WpPFPGXrNs55Di34jUzcMiZ_IOXA5x_xSJwr0XCYkAI55fubDVZe62b1opKzLZxAGfvYuLkUtNbiNMuQlBaE321Nj4aRFRQCyO5RbSau_r4MiMcq=s1600" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="1062" data-original-width="1600" height="212" src="https://blogger.googleusercontent.com/img/a/AVvXsEgGaLIt4bLfpESmrNr31ilGJ8uHShnOkppONPVt51u9STASPap5hKoP85REbm5DxMbAFFpuyPB9WpPFPGXrNs55Di34jUzcMiZ_IOXA5x_xSJwr0XCYkAI55fubDVZe62b1opKzLZxAGfvYuLkUtNbiNMuQlBaE321Nj4aRFRQCyO5RbSau_r4MiMcq=s320" width="320" /></a></td></tr><tr><td class="tr-caption" style="text-align: center;">Russian Defense Ministry photo taken from the Moskva on Feb 18, 2022</td></tr></tbody></table><p>Following up on an <a href="https://jeffreycarr.blogspot.com/2022/02/russian-black-sea-fleet-servers.html" target="_blank">earlier report</a> of the success of Ukraine's Cyber Forces in accessing the servers of Russia's Black Sea Fleet, here's a sampling of additional documents from the ones shared with Ukraine's Defense Intelligence Service.</p><p>They are related to the 30th Division of Surface Ships, formerly known as the 11th BASS in 2014 when it was also engaged in Russia's aggression against Ukraine and Crimea. The military unit number was 42948 until 2016 when it was changed to 84201.</p><p style="text-align: justify;"><span style="font-family: Arial;"><span style="background-color: white; font-size: 14px;">The <a href="https://southfront.org/military-analysis-russian-black-sea-fleet/">30th Division of Surface Ships</a> (VCH 84201) consists of:</span></span></p><ul style="box-sizing: border-box; line-height: 28px; margin-bottom: 1rem; margin-top: 0px;"><li style="box-sizing: border-box;"><b>Missile Cruiser</b> – Moskva ♦ Missiles: 16 x P-500/SS-N-12 Bazalt/Sandbox SSM; 8 x B303A VLS systems; 2 x Osa-MA Sam Systems ♦ Guns: 1 – Twin 130 mm / 70 cal. AK 130. DP; 6 – AK-630 CIWS Gatling Guns; 2 – 45 mm / 85 cal Gun</li><li style="box-sizing: border-box;"><b>Large Antisubmarine Ship</b> – Kerch ♦ Missiles: 2 x 4 URK-5/SS-N-14 Rastrub/Silex SSM/ASW missiles; 2 Shtorm SAM systems; 2 Osa-M SAM systems ♦ Guns: 2 x 2 76.2 mm/59cal AK-726 DP; 4 x 6 30 mm AK-630 AA</li><li style="box-sizing: border-box;"><b>Patrol Ship</b> – Smetlivyy ♦ Missiles: 2 x Uran; 2 Volna-M SAM systems ♦ Guns: 1 x 2 76.2 mm/59 cal DP AK-726</li><li style="box-sizing: border-box;"><b>Patrol Ship</b> – Ladnyy ♦ Missiles: 4 URK-5/SS-N-14 Rasturb/Silex SSM/ASW missiles; 2 Osa-MA-2 SAM systems ♦ Guns: 2 dual 76.2 mm/59cal DP AK-726</li><li style="box-sizing: border-box;"><b>Patrol Ship</b> – Pytlivyy ♦ Missiles: 4 URPK-5 Rasturb/SS-N-14 Siles SSM/ASW missiles; 2 Osa-MA-2 SAM systems ♦ Guns: 2 x 1 100 mm DP AK-100</li></ul><h3 style="text-align: left;">Number and type of military personnel assigned</h3><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgorXkZa2AC7NDmFPLyIWkv5llltEy-J_pczrTqjdvnIuJP31CtRshpDRbrdPfQmG_OWuueQEUuqxEqnJvh-nukDK0E46cDOi-Mhg7aVltC3KkZjPuSv7jxV4sLue8YBys3MPZMN0om3IW6iZ_80CQKPxiKjHFygTA2JjBaS5n1nJpZCgxWn98dZVWP=s1080" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="774" data-original-width="1080" height="229" src="https://blogger.googleusercontent.com/img/a/AVvXsEgorXkZa2AC7NDmFPLyIWkv5llltEy-J_pczrTqjdvnIuJP31CtRshpDRbrdPfQmG_OWuueQEUuqxEqnJvh-nukDK0E46cDOi-Mhg7aVltC3KkZjPuSv7jxV4sLue8YBys3MPZMN0om3IW6iZ_80CQKPxiKjHFygTA2JjBaS5n1nJpZCgxWn98dZVWP=s320" width="320" /></a></div><div class="separator" style="clear: both; text-align: center;"><br /></div><h3 style="clear: both; text-align: left;">Morale and Psychological Assessment of Syrian Operations on Moskva's Crew</h3><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjFS4Sz8OQtQN7Jb-Yii7zSASmgOYgjMOD3_MmyKluuIzRwc-1ebAcKL7hqh5uyFhVMfWVQWlphlHNjxNngf-E5JJ8LDzGx6sqwe09VtzoqjoPAwYUg2UYBMXRQ-8ipVu8FADq4Gh1RrQ_sNrrqk2fVs5E6IKhX5hn1Nli-7fFF6VWNMcY70ykmC9r0=s2220" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="2220" data-original-width="1836" height="320" src="https://blogger.googleusercontent.com/img/a/AVvXsEjFS4Sz8OQtQN7Jb-Yii7zSASmgOYgjMOD3_MmyKluuIzRwc-1ebAcKL7hqh5uyFhVMfWVQWlphlHNjxNngf-E5JJ8LDzGx6sqwe09VtzoqjoPAwYUg2UYBMXRQ-8ipVu8FADq4Gh1RrQ_sNrrqk2fVs5E6IKhX5hn1Nli-7fFF6VWNMcY70ykmC9r0=s320" width="265" /></a></div><br /><div>This is a detailed review of how the Moskva maintained crew morale during its deployment and operations in Syria. An English language machine translation of this report can be downloaded <a href="https://jeffreycarr.me/wp-content/uploads/2022/03/МоскваСирия-translation.pdf">here</a>. </div><div><br /></div><h3 style="text-align: left;">Crew Members of Patrol Ship Ladnyy</h3><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjggACDeIi2yfD9bPZz4KWbhAK3SdA5Q863cTMcM1V00MoqBclnO5hqxZmpM3lY6tgjavj_EanlAYCJ_XyWv4BqKdgSWDvOArwMLEqc3k58bTZURBAboDFIvvC01oTfDztYVZoqqWSvcXYXYgywwrXMdAcIDvuKWl319iKIkkFMY3FE9qpOwvhFmUTI=s1035" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="698" data-original-width="1035" height="216" src="https://blogger.googleusercontent.com/img/a/AVvXsEjggACDeIi2yfD9bPZz4KWbhAK3SdA5Q863cTMcM1V00MoqBclnO5hqxZmpM3lY6tgjavj_EanlAYCJ_XyWv4BqKdgSWDvOArwMLEqc3k58bTZURBAboDFIvvC01oTfDztYVZoqqWSvcXYXYgywwrXMdAcIDvuKWl319iKIkkFMY3FE9qpOwvhFmUTI=s320" width="320" /></a></div><div><br /></div><div>Additional reports will be forthcoming soon. You can assist Ukraine by sharing news of the capture of sensitive Russian military information on your social media accounts and with journalists. </div><h2 style="text-align: left;">Related Articles</h2><div style="text-align: left;"><div><h4 style="background-color: white; font-family: "EB Garamond", serif; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-weight: 400; line-height: normal; margin: 0px; text-transform: uppercase;"><span style="font-size: medium;"><a href="https://jeffreycarr.blogspot.com/2022/03/russias-chief-missile-officer-sergei.html" target="_blank">RUSSIA'S CHIEF MISSILE OFFICER SERGEI GENNADIEVICH BUEV'S MOBIL PHONE HACKED BY UKRAINE CYBER FORCE</a></span></h4><h4 style="background-color: white; font-family: "EB Garamond", serif; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-weight: 400; line-height: normal; margin: 0px; text-transform: uppercase;"><span style="font-size: medium;"><br /><a href="https://jeffreycarr.blogspot.com/2022/02/fsb-special-operations-detachment.html" target="_blank">FSB SPECIAL OPERATIONS DETACHMENT HACKED BY UKRAINE CYBER TROOPS</a></span></h4><h4 style="background-color: white; font-family: "EB Garamond", serif; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-weight: 400; line-height: normal; margin: 0px; text-transform: uppercase;"><span style="font-size: medium;"><br /><a href="https://jeffreycarr.blogspot.com/2022/02/ukraine-cyber-troops-breach-rosatom.html" target="_blank">UKRAINE CYBER TROOPS BREACH ROSATOM STATE NUCLEAR ENERGY CORPORATION</a></span></h4><h4 style="background-color: white; font-family: "EB Garamond", serif; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-weight: 400; line-height: normal; margin: 0px; text-transform: uppercase;"><span style="font-size: medium;"><br /><a href="https://jeffreycarr.blogspot.com/2022/02/russian-black-sea-fleet-servers.html" target="_blank">RUSSIAN BLACK SEA FLEET SERVERS BREACHED BY UKRAINE'S CYBER FORCES</a><br /><span face="Roboto, Helvetica, Arial, sans-serif" style="color: #343434; text-align: left;"><br /></span><a href="https://jeffreycarr.blogspot.com/2022/02/russian-military-unit-vch-6762-breached.html" target="_blank">RUSSIAN MILITARY UNIT VCH 6762 BREACHED BY UKRAINE MILITARY CYBER FORCES</a></span></h4></div></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-9749190059040062242022-03-01T09:23:00.003-08:002022-03-03T16:13:55.571-08:00Russia's Chief Missile Officer Sergei Gennadievich Buev's Mobile Phone Hacked by Ukraine Cyber Force<p> Ukraine's Cyber Force has gained access to the mobile phone of Sergei Gennadievich Buev, the Chief Missile Officer for Russia's Ministry of Defense. </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhERtQB04BRwLxdeOkCriS5QGWqcVVi56kpwnxlJ2ikYXc7JhcgzelkQHVcb8wtiaiao6B3SsE0DdKbFHbQQ_JgpmNrCGgUIQNgZL0a8ihSPJ2QGt1YhwpsdRYBjAU46b59BO7dObvWF1NB0CJoShTcmaNerw8e64ELg_sByzTDPIAUpnq45rvraTjn=s512" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="512" data-original-width="384" height="320" src="https://blogger.googleusercontent.com/img/a/AVvXsEhERtQB04BRwLxdeOkCriS5QGWqcVVi56kpwnxlJ2ikYXc7JhcgzelkQHVcb8wtiaiao6B3SsE0DdKbFHbQQ_JgpmNrCGgUIQNgZL0a8ihSPJ2QGt1YhwpsdRYBjAU46b59BO7dObvWF1NB0CJoShTcmaNerw8e64ELg_sByzTDPIAUpnq45rvraTjn=s320" width="240" /></a></div><br /><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgAfYdht67EPghiEzwirfRymw9rly039pTIGSwaY5FUfeN68ibNMIRGY-jZvrtVDwwdSy4DrWTY21NshUAhgIHhqvotncTHpnfCEFv5kCZfFG-AubPaVees5qP8-j-k2p79yX0a1cGXSEPsg1lzDf6epFbpFMDHRRsbvoNlmTxiihc3c7k5o2zLyZ2G=s1920" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1920" data-original-width="1080" height="320" src="https://blogger.googleusercontent.com/img/a/AVvXsEgAfYdht67EPghiEzwirfRymw9rly039pTIGSwaY5FUfeN68ibNMIRGY-jZvrtVDwwdSy4DrWTY21NshUAhgIHhqvotncTHpnfCEFv5kCZfFG-AubPaVees5qP8-j-k2p79yX0a1cGXSEPsg1lzDf6epFbpFMDHRRsbvoNlmTxiihc3c7k5o2zLyZ2G=s320" width="180" /></a></div><div class="separator" style="clear: both; text-align: left;"><br /></div><div>That background image on Buev's mobile phone is that of a Soyuz rocket that he photographed at the new Vostochny Cosmodrome during his visit on April 3, 2017.</div><div><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhe43m98Ab9t2OCgdIwoD-y_HaRwLy3FnrmRD2lRHBYDA2AU2OsAeWxHCd6bL6hFFPEa7fscjp1u9Mo6VP80JyHaFUXfIAmPo6rhILX8L3m39u9o58ltKlClQzGMBusKZzK_Z7_i3ceglP82c92qeex3bxyAO1U9B6azhJU7zFJVyy-Ceu8UbRiakHx=s640" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="284" data-original-width="640" height="142" src="https://blogger.googleusercontent.com/img/a/AVvXsEhe43m98Ab9t2OCgdIwoD-y_HaRwLy3FnrmRD2lRHBYDA2AU2OsAeWxHCd6bL6hFFPEa7fscjp1u9Mo6VP80JyHaFUXfIAmPo6rhILX8L3m39u9o58ltKlClQzGMBusKZzK_Z7_i3ceglP82c92qeex3bxyAO1U9B6azhJU7zFJVyy-Ceu8UbRiakHx=s320" width="320" /></a></div><br /><div>Vostochny has been plagued with problems since its construction began in 2011. </div><div><br /></div><div>On April 3, 2016, exactly one year prior to Buev's visit, workers went on a hunger strike because they hadn't been paid. In the following month, a criminal case was launched against Yuri Khrizman, the former head of the Far Eastern branch of Russia's Federal Agency for Special Construction. He and a number of others were found guilty of Abuse of Power during construction of Vostochny Space Port with damages set at 5.2 billion Rubles according to <a href="https://tass.com/society/991534">TASS</a>. The verdict was rendered in February of 2018. Documents found on Buev's phone showed that he was there, in part, to see if things had improved.</div><div><br /></div><div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhSR2i914Iw79NgWPqI0-AsVqntc9E78fnVO50HK4OjcDd1sfIIShjU2hd6hZTwxkP06OmQzVzADI0Mf_h_G9OxxPIxVZDwW1fCCQEIWmIcUx2DLDJa5qMsQof7TImXQEj1v_E30D0-sIF--f238N7dZr4HO_Rj8vTKhmDI-reEqv0d3AMwQ_tlH59S" style="margin-left: 1em; margin-right: 1em;"><img data-original-height="516" data-original-width="291" height="400" src="https://blogger.googleusercontent.com/img/a/AVvXsEhSR2i914Iw79NgWPqI0-AsVqntc9E78fnVO50HK4OjcDd1sfIIShjU2hd6hZTwxkP06OmQzVzADI0Mf_h_G9OxxPIxVZDwW1fCCQEIWmIcUx2DLDJa5qMsQof7TImXQEj1v_E30D0-sIF--f238N7dZr4HO_Rj8vTKhmDI-reEqv0d3AMwQ_tlH59S=w225-h400" width="225" /></a></div><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhp1qyiIbruS2MSw3OiEGoYk9dV1ghpcsj5dfb5WJfNHn7p30Kua1txMdYm0ryHPMZ8I1EhsazkhTIhgwbrClReLOiW9F4E4FGFelq50H75JQpt3AhSB_zIKOE6XIHiEWAlhU-dv-FqM_yxZG0FFs1aiLHV991UQVIje0xTFyrKGNGnBVjoUcPwdSsf" style="margin-left: 1em; margin-right: 1em;"><img data-original-height="516" data-original-width="291" height="400" src="https://blogger.googleusercontent.com/img/a/AVvXsEhp1qyiIbruS2MSw3OiEGoYk9dV1ghpcsj5dfb5WJfNHn7p30Kua1txMdYm0ryHPMZ8I1EhsazkhTIhgwbrClReLOiW9F4E4FGFelq50H75JQpt3AhSB_zIKOE6XIHiEWAlhU-dv-FqM_yxZG0FFs1aiLHV991UQVIje0xTFyrKGNGnBVjoUcPwdSsf=w225-h400" width="225" /></a></div><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: left;">Other documents on Buev's phone dated just before his trip show that he was also there to check on the work done on a multi-functional space relay system called <a href="https://rostender.info/region/moskva-gorod/26601195-tender-sozdanie-abonentskoj-apparatury-retranslyacii-mnogofunkcionalnoj-kosmicheskoj-sistemy-retranslyacii-luch-shifr-okr-luch-abonent">Luch-Abonent</a>. </div></div></div><div><br /><div class="separator" style="clear: both; text-align: center;"><span style="margin-left: 1em; margin-right: 1em;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjtt0jOIbw_82Zv3DfjoekT-qeNSfPcpkKJhBWeP9aAFW4dQe_YiM8eBGnSCi5ClDQRXpxKp8Cp4QR_aL88AhyO-fnPLTrww5Tqc0gG3nFVaQxZG3-3xV8VX4hFEHo61ZraRj1PV1pGcj1plHAvGu6lee7hIKCgpawCdtIv2XrLR710FkfouHCzEsLo" style="margin-left: 1em; margin-right: 1em;"><img data-original-height="512" data-original-width="384" height="400" src="https://blogger.googleusercontent.com/img/a/AVvXsEjtt0jOIbw_82Zv3DfjoekT-qeNSfPcpkKJhBWeP9aAFW4dQe_YiM8eBGnSCi5ClDQRXpxKp8Cp4QR_aL88AhyO-fnPLTrww5Tqc0gG3nFVaQxZG3-3xV8VX4hFEHo61ZraRj1PV1pGcj1plHAvGu6lee7hIKCgpawCdtIv2XrLR710FkfouHCzEsLo=w300-h400" width="300" /></a></span><div class="separator" style="clear: both; margin-left: 1em; margin-right: 1em; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjtt0jOIbw_82Zv3DfjoekT-qeNSfPcpkKJhBWeP9aAFW4dQe_YiM8eBGnSCi5ClDQRXpxKp8Cp4QR_aL88AhyO-fnPLTrww5Tqc0gG3nFVaQxZG3-3xV8VX4hFEHo61ZraRj1PV1pGcj1plHAvGu6lee7hIKCgpawCdtIv2XrLR710FkfouHCzEsLo" style="margin-left: 1em; margin-right: 1em;"><br /></a></div><div class="separator" style="clear: both; margin-left: 1em; margin-right: 1em; text-align: center;"><span style="margin-left: 1em; margin-right: 1em;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjtt0jOIbw_82Zv3DfjoekT-qeNSfPcpkKJhBWeP9aAFW4dQe_YiM8eBGnSCi5ClDQRXpxKp8Cp4QR_aL88AhyO-fnPLTrww5Tqc0gG3nFVaQxZG3-3xV8VX4hFEHo61ZraRj1PV1pGcj1plHAvGu6lee7hIKCgpawCdtIv2XrLR710FkfouHCzEsLo" style="margin-left: 1em; margin-right: 1em;"><img data-original-height="512" data-original-width="384" height="400" src="https://blogger.googleusercontent.com/img/a/AVvXsEifThtz7eX3eAV3ZkQdXuQIJuyDhktIAZ006VM7nvgemmqzd-5V_3XypSettrnhJF1i-AXanbmOC348k36XDdpoNkQRiwCY5_dySHF0Tvqio37BaNCMuV3_eEAuhl6WzQTs_B0LXFzBjY5CZd1jSHwu4IBQQKQ1QaKfK_aK1XU5qgxyI6EM_pBeiZE1=w300-h400" width="300" /></a></span></div><div class="separator" style="clear: both; margin-left: 1em; margin-right: 1em; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjtt0jOIbw_82Zv3DfjoekT-qeNSfPcpkKJhBWeP9aAFW4dQe_YiM8eBGnSCi5ClDQRXpxKp8Cp4QR_aL88AhyO-fnPLTrww5Tqc0gG3nFVaQxZG3-3xV8VX4hFEHo61ZraRj1PV1pGcj1plHAvGu6lee7hIKCgpawCdtIv2XrLR710FkfouHCzEsLo" style="margin-left: 1em; margin-right: 1em;"><br /></a></div><div class="separator" style="clear: both; margin-left: 1em; margin-right: 1em; text-align: center;"><div class="separator" style="clear: both; text-align: center;"><span style="margin-left: 1em; margin-right: 1em;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjtt0jOIbw_82Zv3DfjoekT-qeNSfPcpkKJhBWeP9aAFW4dQe_YiM8eBGnSCi5ClDQRXpxKp8Cp4QR_aL88AhyO-fnPLTrww5Tqc0gG3nFVaQxZG3-3xV8VX4hFEHo61ZraRj1PV1pGcj1plHAvGu6lee7hIKCgpawCdtIv2XrLR710FkfouHCzEsLo" style="margin-left: 1em; margin-right: 1em;"><img data-original-height="512" data-original-width="384" height="400" src="https://blogger.googleusercontent.com/img/a/AVvXsEirGw930Lmvvo1vOVkEek62-i_0f57GbdPovIDhxrFm_BY6xc_JCesVPqbfznJX8WMy_cFRW5xIFuCJjnKlHjt5P1sseUpskw-wH944Grf3osZQU3Hy7XUHKhuXI3IVZwkzXaTZg5QoPOXl9w0mhMmg6fTuYE2ld6DHoyS3zzEF0LF4qXeMRR6EfVdG=w300-h400" width="300" /></a></span></div><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: left;">The Space Port's second launch was scheduled for Nov 28, 2017, seven months after Buev's visit. A Soyuz rocket would carry a $45 million dollar weather satellite. Unfortunately, mission control couldn't communicate with the satellite after launch and there were <a href="https://www.space.com/38918-russian-satellites-lose-contact-after-launch.html">fears</a> that it had crashed into the Atlantic ocean.</div><div style="text-align: left;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjtt0jOIbw_82Zv3DfjoekT-qeNSfPcpkKJhBWeP9aAFW4dQe_YiM8eBGnSCi5ClDQRXpxKp8Cp4QR_aL88AhyO-fnPLTrww5Tqc0gG3nFVaQxZG3-3xV8VX4hFEHo61ZraRj1PV1pGcj1plHAvGu6lee7hIKCgpawCdtIv2XrLR710FkfouHCzEsLo" style="margin-left: 1em; margin-right: 1em;"><br /></a></div><div style="text-align: left;"><br /></div></div></div></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-73358089896808372722022-02-27T10:01:00.004-08:002022-02-27T10:01:43.142-08:00FSB Special Operations Detachment Hacked By Ukraine Cyber Troops<p>Ukraine's Cyber Troops gained access to the computer network of an FSB special operations detachment (Unit 607) that has been operating in Ukraine as part of VCH 6762. They've downloaded personnel information on 171 unit members, changed financial account data, and released photos of the latrines taken before the base was occupied. </p><p>This document authorizes FSB unit 607 to operate outside of Russia's borders. It's dated Oct 12, 2021.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgRwkII1nwjkrmkiOt6_6NfXxpGLbvBjInit-UWpRoJzC95DIiCwrih5QNKe_22KMjwkjfq_deACRDUxNL_Cueyss5Iu92Tkh6OfIdV03mpi7nKRWS3yAyXAQ1L2jJfUv_MT2R1JxveizTuqNd-9pC70EPflTXPEf0hCEAs07QvGjNBkSwcUTA50-3U=s4032" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="4032" data-original-width="3024" height="400" src="https://blogger.googleusercontent.com/img/a/AVvXsEgRwkII1nwjkrmkiOt6_6NfXxpGLbvBjInit-UWpRoJzC95DIiCwrih5QNKe_22KMjwkjfq_deACRDUxNL_Cueyss5Iu92Tkh6OfIdV03mpi7nKRWS3yAyXAQ1L2jJfUv_MT2R1JxveizTuqNd-9pC70EPflTXPEf0hCEAs07QvGjNBkSwcUTA50-3U=w300-h400" width="300" /></a></div><br /><p>The GPS metadata on one of the photos taken on Feb 22nd confirms early deployment to Belgorod, about 50km from the Russia-Ukraine border and 89km to Kharkiv. </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEheUa5ZSG0Z94V8SiSJFCCakody9N2rgpN0tuAAEGv34-_1xoEg7YUXY0vWMF9m-lyArqKGg7rNZO44U9w2drsI-nDQAs71NvL76lL660vqrSsLhU5npF3VezCpyrum89iVQid_F7buL0BvJI4Xp4aFvEmOKu9u8Ei-OCts8HaAY7uI0yGGtjuL_qwP=s3264" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="3264" data-original-width="2448" height="320" src="https://blogger.googleusercontent.com/img/a/AVvXsEheUa5ZSG0Z94V8SiSJFCCakody9N2rgpN0tuAAEGv34-_1xoEg7YUXY0vWMF9m-lyArqKGg7rNZO44U9w2drsI-nDQAs71NvL76lL660vqrSsLhU5npF3VezCpyrum89iVQid_F7buL0BvJI4Xp4aFvEmOKu9u8Ei-OCts8HaAY7uI0yGGtjuL_qwP=s320" width="240" /></a></div><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhlOIfnGf4FBW8xuMSpPmtvijdFYwoKYmxiA3dLbYNlrPfVWOYZr_BaMqsu4kYIn9bVcNlL0l8YG14jExvrBMsMyAjtRJdjiYCdMrkfJ5_NvrIkNeQbstubqmhSdvNdg4q-jwwbM3zMKnBeSK79sEwKGhTcTVWkZcNLG4d8Rnqrh0IfjY2ADhG1RvXj=s2050" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1792" data-original-width="2050" height="350" src="https://blogger.googleusercontent.com/img/a/AVvXsEhlOIfnGf4FBW8xuMSpPmtvijdFYwoKYmxiA3dLbYNlrPfVWOYZr_BaMqsu4kYIn9bVcNlL0l8YG14jExvrBMsMyAjtRJdjiYCdMrkfJ5_NvrIkNeQbstubqmhSdvNdg4q-jwwbM3zMKnBeSK79sEwKGhTcTVWkZcNLG4d8Rnqrh0IfjY2ADhG1RvXj=w400-h350" width="400" /></a></div><br /><p>This request for 73 cubic meters of firewood is also dated Feb 22, two days before the invasion (the date is in the metadata).</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEigjHcFy9cbmft7Hb_1xZ0QUF3NFF-AVftXrpRAHuEylnMUMbgI30BXV3JtISzn7ucOnX8drUc-t_BlwV4hNlwnnApMnYmgfqSquV9E0fDD_CBXUR3-e5q4xN2HMhM-qnp6_QdpQzeEW77ZSj25Go6o9ndlNTl8M-rV0351TGeE3sCSxyXh73dJO1DO=s1920" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1920" data-original-width="1412" height="320" src="https://blogger.googleusercontent.com/img/a/AVvXsEigjHcFy9cbmft7Hb_1xZ0QUF3NFF-AVftXrpRAHuEylnMUMbgI30BXV3JtISzn7ucOnX8drUc-t_BlwV4hNlwnnApMnYmgfqSquV9E0fDD_CBXUR3-e5q4xN2HMhM-qnp6_QdpQzeEW77ZSj25Go6o9ndlNTl8M-rV0351TGeE3sCSxyXh73dJO1DO=s320" width="235" /></a></div><p>These screenshots show the access that the hackers had into the accounting system used by Military Unit 6762. </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEh_U8Nmegyqx79DbZh8QjYvP5EuPiuNugiAmQtNKRCVYgkkShQ80g3fT2osiWYyXwV04hb27rOt3VwouXfO9hOom9Bn3VAIeex4-L7tyIs8JG0UghlGY4uvsFVc1DIFTZVWMIYeaFmHQUG3BjRmnNt5XUWwtO5XzsBEfJOApvuKk9n-NpVaOM7hVj-z=s1600" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="900" data-original-width="1600" height="225" src="https://blogger.googleusercontent.com/img/a/AVvXsEh_U8Nmegyqx79DbZh8QjYvP5EuPiuNugiAmQtNKRCVYgkkShQ80g3fT2osiWYyXwV04hb27rOt3VwouXfO9hOom9Bn3VAIeex4-L7tyIs8JG0UghlGY4uvsFVc1DIFTZVWMIYeaFmHQUG3BjRmnNt5XUWwtO5XzsBEfJOApvuKk9n-NpVaOM7hVj-z=w400-h225" width="400" /></a></div><br /><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjNhBhDkJTwJty-R3-UFqMB23vO4JXfjXdcTiKqV5MNUGtDFoRfVASrU3c-Wb-89rBi258CgllZFxqiGmofeLJY3tCThfs-lPRdtRzEyV0XMDCgPony8sFPyEnMnc7FmUQn_7239i_Q_2r1vZb2afq_Dnu_KGYX9cSqu_RJl2KKniDwvgU13BYSUk-e=s1600" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="900" data-original-width="1600" height="225" src="https://blogger.googleusercontent.com/img/a/AVvXsEjNhBhDkJTwJty-R3-UFqMB23vO4JXfjXdcTiKqV5MNUGtDFoRfVASrU3c-Wb-89rBi258CgllZFxqiGmofeLJY3tCThfs-lPRdtRzEyV0XMDCgPony8sFPyEnMnc7FmUQn_7239i_Q_2r1vZb2afq_Dnu_KGYX9cSqu_RJl2KKniDwvgU13BYSUk-e=w400-h225" width="400" /></a></div><br /><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhG1pDfBnzfJl2_3V_zqvEOm5wyjPXZGX9pCKT-yB5uNuUxeXhAjEBo99KlIZpxy9Fbd4l-pvPjsY63z9cCT6nb3W2JbhLsNWsZynOFszK9oX4Qosv5zG4BA7_tb8nQke6rsxkGL3QLegaNoKOXDQMHcY3uy5wk4AiwXyXgPNQyN9gRtLnsc5iXZlHS=s1920" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1080" data-original-width="1920" height="225" src="https://blogger.googleusercontent.com/img/a/AVvXsEhG1pDfBnzfJl2_3V_zqvEOm5wyjPXZGX9pCKT-yB5uNuUxeXhAjEBo99KlIZpxy9Fbd4l-pvPjsY63z9cCT6nb3W2JbhLsNWsZynOFszK9oX4Qosv5zG4BA7_tb8nQke6rsxkGL3QLegaNoKOXDQMHcY3uy5wk4AiwXyXgPNQyN9gRtLnsc5iXZlHS=w400-h225" width="400" /></a></div><br /><p>Ukraine's Cyber Forces still control the computer network of this Russian unit as of this writing.</p><p><br /></p>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-50511813767085474502022-02-27T05:46:00.000-08:002022-02-27T05:46:10.229-08:00Ukraine Cyber Troops Breach Rosatom State Nuclear Energy Corporation<p>Ukraine Cyber Troops, a division under the Ministry of Defense, has been conducting multiple successful computer network operations against Russian government targets since the start of the invasion.</p><p>The latest breach is against Rosatom State Nuclear Energy Corporation, which consists of over 350 enterprises as well as Russia's nuclear weapons complex. All of the files, with the exception of a few shared with the author for this post, have been delivered to Ukraine's Ministry of Defense Intelligence Service for analysis.</p><p>1. Request for Top Secret clearance for non-Rosatom employees assigned to work at the Urals Electrochemical Combine - a uranium enrichment plant located in Novouralsk, Sverdlovsk Oblast. </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEiUzVr45m4rUGrTZZbSY5WHdU4iyFlmMtnEepKEgG2SQO7NuxpKBBNYKOSkudKfUhJKe4Tur09ZTiTwBLow5VbA4zn4uWUmp5M-12yFEtk0ku_cvKoOs5NdqcXXrQrr6wEUKSft8YfzRNNhaOdfDWN0f2TNuKWv5wZUrNBfERdkyBTboJ0eqorf2-bA=s1113" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="782" data-original-width="1113" height="281" src="https://blogger.googleusercontent.com/img/a/AVvXsEiUzVr45m4rUGrTZZbSY5WHdU4iyFlmMtnEepKEgG2SQO7NuxpKBBNYKOSkudKfUhJKe4Tur09ZTiTwBLow5VbA4zn4uWUmp5M-12yFEtk0ku_cvKoOs5NdqcXXrQrr6wEUKSft8YfzRNNhaOdfDWN0f2TNuKWv5wZUrNBfERdkyBTboJ0eqorf2-bA=w400-h281" width="400" /></a></div>2. An internal letter with attachments from Rosatom Director General Evegny Salkov containing instructions regarding the Research Reactor Complex that Rosatom is building in Bolivia.<div><br /><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhmFJs8UebvcY6LRBFP0yUsT4GMlKp_uuOqE3Mqz3hM1lVvLY7b7817ZPvAt_KErX70jNUVAiU6IEtWhaFKrgnHXMP3uH56e8VL1RhvPKjIUUlVNsX_3qbBy1fjQv9bSOmakugMqZeTrEdcCSLVLjpXhqfni3rcJ9ND1Ml2n50nmB0tVOb8Vk4ZppyG=s1774" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="837" data-original-width="1774" height="189" src="https://blogger.googleusercontent.com/img/a/AVvXsEhmFJs8UebvcY6LRBFP0yUsT4GMlKp_uuOqE3Mqz3hM1lVvLY7b7817ZPvAt_KErX70jNUVAiU6IEtWhaFKrgnHXMP3uH56e8VL1RhvPKjIUUlVNsX_3qbBy1fjQv9bSOmakugMqZeTrEdcCSLVLjpXhqfni3rcJ9ND1Ml2n50nmB0tVOb8Vk4ZppyG=w400-h189" width="400" /></a></div><div class="separator" style="clear: both; text-align: left;"><br /></div><div class="separator" style="clear: both; text-align: left;">3. A safety analysis report for the BARS-4 Nuclear Research Facility</div><div class="separator" style="clear: both; text-align: left;"><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhUiC6JeHHUurDQ39NCsd7KUiR8wchiobIhvdlKfpSCxebXfsluKrC7QnNiIW581KdfmpafDkMwcd_sUSANs8qQW1Y-4hYukd5hW3viwtWJeeh8h3a4jZecYA0PNGKtE2Cr5-oa0l4CkHt4toghPedA2dbxALStOhpVntBBvZjwMOBepSo19x2vUHWL=s1891" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="869" data-original-width="1891" height="184" src="https://blogger.googleusercontent.com/img/a/AVvXsEhUiC6JeHHUurDQ39NCsd7KUiR8wchiobIhvdlKfpSCxebXfsluKrC7QnNiIW581KdfmpafDkMwcd_sUSANs8qQW1Y-4hYukd5hW3viwtWJeeh8h3a4jZecYA0PNGKtE2Cr5-oa0l4CkHt4toghPedA2dbxALStOhpVntBBvZjwMOBepSo19x2vUHWL=w400-h184" width="400" /></a></div><br /><div class="separator" style="clear: both;">4. A schematic for the Igolsko-Talovoe-Parabel Oil Pipeline</div><div class="separator" style="clear: both;"><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhdl63rjfogLAroc8Ea1BfOTtdKd-IRxwiJ_5E9q0K1Vsyf8upFF8V0OQyenhXLpY_eqvFWpDjsxOvQ0X_ixf-jO7huR9qSAwMmcfoxVlb7EqBR7dgw8gyPr9XAjydngRNZcwrEazZ-QDS_j52nD1GZn2KvBJvDZ6xyVubwPXmDJJnJBRcE54cuTqsX=s1193" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="808" data-original-width="1193" height="271" src="https://blogger.googleusercontent.com/img/a/AVvXsEhdl63rjfogLAroc8Ea1BfOTtdKd-IRxwiJ_5E9q0K1Vsyf8upFF8V0OQyenhXLpY_eqvFWpDjsxOvQ0X_ixf-jO7huR9qSAwMmcfoxVlb7EqBR7dgw8gyPr9XAjydngRNZcwrEazZ-QDS_j52nD1GZn2KvBJvDZ6xyVubwPXmDJJnJBRcE54cuTqsX=w400-h271" width="400" /></a></div><div class="separator" style="clear: both; text-align: left;"><br /></div>My next post will feature documents obtained by the Cyber Forces regarding Russia's plans for spacecraft systems and complexes for ensuring the actions of Russia's Armed Forces.</div><div><br /></div><h2 style="text-align: left;">RELATED POSTS</h2><a href="https://jeffreycarr.blogspot.com/2022/02/russian-black-sea-fleet-servers.html" target="_blank">RUSSIAN BLACK SEA FLEET SERVERS BREACHED BY UKRAINE'S CYBER FORCES</a><div><br /><a href="https://jeffreycarr.blogspot.com/2022/02/russian-military-unit-vch-6762-breached.html" target="_blank">RUSSIAN MILITARY UNIT VCH 6762 BREACHED BY UKRAINE MILITARY CYBER FORCES</a><div style="text-align: left;"><br /><div class="separator" style="clear: both;"><br /></div><div class="separator" style="clear: both; text-align: left;"><br /></div><br /><div><br /></div></div></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-26044339475949397262022-02-26T09:02:00.004-08:002022-02-26T09:20:32.459-08:00Russian Black Sea Fleet Servers Breached By Ukraine's Cyber Forces<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEi1WEieAWt1yMLoIRAZ-BOwh1IUTeRFgOnaQ5sM2LOmhlH1kfJCePahmos-_3rxcfaNIgLYijxwAf4VFX3p-X64MaPVtKLlmiJ0OE-Ico-XqqIGOc7771j9ygaSof_q0p990W1eIKEb7b6JcX-5nDHtOKk4-oOzKrz75NJacUS0WciX6rLqWkjmqNEM=s1600" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1063" data-original-width="1600" height="266" src="https://blogger.googleusercontent.com/img/a/AVvXsEi1WEieAWt1yMLoIRAZ-BOwh1IUTeRFgOnaQ5sM2LOmhlH1kfJCePahmos-_3rxcfaNIgLYijxwAf4VFX3p-X64MaPVtKLlmiJ0OE-Ico-XqqIGOc7771j9ygaSof_q0p990W1eIKEb7b6JcX-5nDHtOKk4-oOzKrz75NJacUS0WciX6rLqWkjmqNEM=w400-h266" title="Russian Cruiser "Moskva" - Flagship of the Black Sea Fleet" width="400" /></a></div><br /><div class="separator" style="clear: both; text-align: center;"><span style="font-size: x-small;">Russian Cruiser "Moskva" - flagship of the Black Sea fleet</span></div><p>Ukraine's Cyber Forces are continuing to breach Russian Ministry of Defense targets and extract valuable data, apparently at will. This time the target was the communications servers for Russia's Black Sea fleet. </p><p>The breach was announced this morning on <a href="https://t.me/volodymyrzolkin/1126">Telegram</a>. Here is a translation:</p><blockquote style="border: none; margin: 0px 0px 0px 40px; padding: 0px;"><i>"The cyber troops of Ukraine have received full access to the internal correspondence of the command of the Black Sea Fleet of the Russian Federation. Current correspondence was immediately sent to the special services. Glory to Ukraine!"</i></blockquote><p>One ship specifically mentioned in the stolen documents was the pride of the Russian Navy and the flagship of the Black Sea fleet - the Moskva. Her schematics were included in the stolen data pictured below:</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEiIb3lzaOzVLqT_J5GgubpGASGt62hMuFX4bbypxg0XIl5YzF-nSH0pdet74hQSbsxD6EmDoXtYZVBXnq0OkX3eIL94Kt2v5a4Foc_sS0DAxncGLsOsARydGToLeg8aZ92sPAhbBykSTsxX3w7pOaGjHwd8mnn9U4TGfBO6VpFhSBkq1NYNQb1VabJG=s1280" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="905" data-original-width="1280" height="283" src="https://blogger.googleusercontent.com/img/a/AVvXsEiIb3lzaOzVLqT_J5GgubpGASGt62hMuFX4bbypxg0XIl5YzF-nSH0pdet74hQSbsxD6EmDoXtYZVBXnq0OkX3eIL94Kt2v5a4Foc_sS0DAxncGLsOsARydGToLeg8aZ92sPAhbBykSTsxX3w7pOaGjHwd8mnn9U4TGfBO6VpFhSBkq1NYNQb1VabJG=w400-h283" width="400" /></a></div><br /><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEge8aIUX-brxcy5dN8rsAUa5kyctosFM8xxt15skIRvpdoy7N49hkdxxhBNtOkLSii5JvQm47bj_tDq1jwypywVLHVOIsb7yRqWVm3MKfP7NRRjZAFHhQASS625DLGrPZRdgjLX39IQ2j18p1OKrAnbT5wW1amQwV_pfV8Z6OXgGtPfY-eGbS21judF=s1280" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="905" data-original-width="1280" height="283" src="https://blogger.googleusercontent.com/img/a/AVvXsEge8aIUX-brxcy5dN8rsAUa5kyctosFM8xxt15skIRvpdoy7N49hkdxxhBNtOkLSii5JvQm47bj_tDq1jwypywVLHVOIsb7yRqWVm3MKfP7NRRjZAFHhQASS625DLGrPZRdgjLX39IQ2j18p1OKrAnbT5wW1amQwV_pfV8Z6OXgGtPfY-eGbS21judF=w400-h283" width="400" /></a></div><br />Also taken was information about the 68th Sea Area Defense Brigade (military unit #26977, Sevastopol) that was involved in the occupation of Crimea, and the 11th Brigade of Anti-Submarine Ships (BASS) including the Russian Destroyer Smetlivy that was involved in the Russian attack on Ukraine in 2014. Additional cyber attacks against Russian Ministry of Defense are ongoing and will be shared here as frequently as possible.Unknownnoreply@blogger.com0Washington, DC, USA38.9071923 -77.036870710.596958463821153 -112.1931207 67.217426136178844 -41.880620699999994tag:blogger.com,1999:blog-9031840977303029006.post-30776395440479491312022-02-25T16:26:00.003-08:002022-02-26T06:52:37.869-08:00Russian Military Unit VCH 6762 Breached By Ukraine Military Cyber Forces<br /><div class="separator" style="clear: both; text-align: center;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgeR_YfhkYX0N0LPP8-YvOa9Rzts1f7ktPybsTkwoyVLRAlaJcshjAHEo6zX3jS_G0KJ8o1PNyp_FsjXoPbrTHTzzKnVw7bwnUY7aRelmURqf8jqQw1HMlgyDNFRWzlsyN1eAvVpxqfM6MaVwvvw6ZqX19cMRf8qJf8-Xm6tVsKNw5sU6N29UCSyg7k=s2048" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1218" data-original-width="2048" height="238" src="https://blogger.googleusercontent.com/img/a/AVvXsEgeR_YfhkYX0N0LPP8-YvOa9Rzts1f7ktPybsTkwoyVLRAlaJcshjAHEo6zX3jS_G0KJ8o1PNyp_FsjXoPbrTHTzzKnVw7bwnUY7aRelmURqf8jqQw1HMlgyDNFRWzlsyN1eAvVpxqfM6MaVwvvw6ZqX19cMRf8qJf8-Xm6tVsKNw5sU6N29UCSyg7k=w400-h238" width="400" /></a></div><span style="font-size: x-small;">One of thousands of captured documents, passports, credit card accounts </span></div><div class="separator" style="clear: both; text-align: center;"><span style="font-size: x-small;">obtained from the accounting department of VCH 6762</span> </div><br />Russian military unit <a href="https://ru.wikipedia.org/wiki/%D0%9E%D1%82%D1%80%D1%8F%D0%B4_%D1%81%D0%BF%D0%B5%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D0%BE%D0%B3%D0%BE_%D0%BD%D0%B0%D0%B7%D0%BD%D0%B0%D1%87%D0%B5%D0%BD%D0%B8%D1%8F_%C2%AB%D0%90%D0%B2%D0%B0%D0%BD%D0%B3%D0%B0%D1%80%D0%B4%C2%BB" target="_blank">VCH 6762</a> is part of the Ministry of Internal Affairs, based in the City of Zheleznovodsk, a part of Stavropol Krai in the North Caucasus region of Southern Russia. Over the years they've been deployed to suppress riots, combat terrorism, and generally participate in the territorial defense of Russia. <div><br /></div><div>According to the <a href="https://excheck.pro/company/2630016162/licenses" target="_blank">Federal Tax Service</a>, Military Unit 6762 has seven licenses by the FSB related to the protection of state secrets and the production of explosives and hazardous chemicals for classes I, II, and III.</div><div><br /></div><div>Today, members of Ukraine's elite Cyber Troops breached the accounting and document management system used by Unit 6762 and accessed personnel data including passports, military IDs, credit cards, and payment records. </div><div><br /></div><div>One of the hackers engaged in the breach had a <a href="https://t.me/volodymyrzolkin/1069" target="_blank">message</a> for the Russian soldiers. </div><div><br /></div><blockquote style="border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;"><i>"Military personnel of this unit were sent to Ukraine. All the money from their cards will go to the purchase of weapons for the Armed Forces of Ukraine."</i></blockquote><div><br /></div><div>The malware used to conduct this operation was an 0-day created by the operators themselves. This is a formidable unit. They have a long list of Russian targets, and they're just getting started. </div>Unknownnoreply@blogger.comWashington, DC, USA38.9071923 -77.036870710.596958463821153 -112.1931207 67.217426136178844 -41.880620699999994tag:blogger.com,1999:blog-9031840977303029006.post-42802834667929048752021-09-22T09:14:00.000-07:002021-09-22T09:14:23.338-07:00China's Ministry of State Security Uses TikTok To Identify and Profile U.S. Military Members<p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-JnQt0USkXEE/YUtV-vz7NJI/AAAAAAAAC8k/fo-TvL0rcloYSN2ajdewjtBQx_5hO7VKACLcBGAsYHQ/s575/bytedance%2Bmss%2Bimage.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="373" data-original-width="575" height="208" src="https://1.bp.blogspot.com/-JnQt0USkXEE/YUtV-vz7NJI/AAAAAAAAC8k/fo-TvL0rcloYSN2ajdewjtBQx_5hO7VKACLcBGAsYHQ/s320/bytedance%2Bmss%2Bimage.png" width="320" /></a></div><br /><span style="background-color: white; color: var(--print_secondary, #757575); font-family: var(--font_family_headings, var(--font_family_headings_preset, "SF Compact Display", -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol")); font-size: 19px;">ByteDance ordered to improve its user portrait mining software in TikTok's 700 million user base</span><p></p><p style="background-color: white; color: #1a1a1a; font-family: Spectral, serif, -apple-system, system-ui, "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 19px; line-height: 1.6em; margin: 0px 0px 1em;">While this headline is for a fictional scenario at the <a href="https://safehouse.global/sm-iwx/" rel="nofollow ugc noopener" style="color: #1a1a1a;">Social Media Information Warfighter Exercise</a> on Nov 19th, there’s no way to know that it isn’t already happening and just hasn’t been reported. In fact, the sub-heading is 100% real.</p><h2 style="-webkit-font-smoothing: antialiased; background-color: white; color: #1a1a1a; font-family: var(--font_family_headings, var(--font_family_headings_preset, "SF Compact Display", -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol")); font-size: 1.625em; font-weight: var(--font_weight_headings_preset, bold); line-height: 1.16em; margin: 1em 0px 0.625em;">BACKGROUND</h2><p style="background-color: white; color: #1a1a1a; font-family: Spectral, serif, -apple-system, system-ui, "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 19px; line-height: 1.6em; margin: 0px 0px 1em;">According to <a href="https://www.theinformation.com/articles/tiktok-still-has-key-software-developers-in-china-despite-effort-to-move-offshore?rc=io9jxz" rel="nofollow ugc noopener" style="color: #1a1a1a;">The Information</a>, ByteDance, TikTok’s parent company, recently placed and then deleted a job posting for a Beijing-based senior TikTok engineer whose responsibilities include “mining user portraits based on massive user behavior data.”</p><p style="background-color: white; color: #1a1a1a; font-family: Spectral, serif, -apple-system, system-ui, "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 19px; line-height: 1.6em; margin: 0px 0px 1em;">Earlier this year, <a href="https://www.reuters.com/world/china/beijing-owns-stakes-bytedance-weibo-domestic-entities-records-show-2021-08-17/" rel="nofollow ugc noopener" style="color: #1a1a1a;">Reuters</a> reported that the Chinese government took a 1% stake and one of three board seats in Beijing Bytedance Technology, which holds some of the licenses for Douyin, the Chinese version of TikTok (also owned by Bytedance). The licenses related to the company’s video and information platforms.</p><p style="background-color: white; color: #1a1a1a; font-family: Spectral, serif, -apple-system, system-ui, "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 19px; line-height: 1.6em; margin: 0px 0px 1em;">On April 4, 2019, <a href="https://www.sohu.com/a/310285747_420076" rel="nofollow ugc noopener" style="color: #1a1a1a;">Sohu.com</a> reported that Bytedance signed a mutual cooperation agreement with China’s Ministry of Public Security (the State Police) called the National Public Security New Media Matrix. During the ceremony, Zhan Jun, Secretary of the Party Committee and Director of the Press and Propaganda Bureau of the Ministry of Public Security announced</p><blockquote style="background-color: white; border-left: 4px solid var(--background_pop); color: #1a1a1a; font-family: Spectral, serif, -apple-system, system-ui, "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 19px; margin: 1em 0px;"><p style="line-height: 1.6em; margin: 0px 0px 1em 1em;">“In the next step, we will further increase the in-depth cooperation with ByteDance in the creation and production of new media content, further enhance the public security propaganda and dissemination power, influence and credibility, and promote the in-depth development of public security organs’ media integration.</p></blockquote><p style="background-color: white; color: #1a1a1a; font-family: Spectral, serif, -apple-system, system-ui, "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 19px; line-height: 1.6em; margin: 0px 0px 1em;">The hashtag “#militarytiktok” is popular on the platform with 1.1B views as today.</p><h2 style="-webkit-font-smoothing: antialiased; background-color: white; color: #1a1a1a; font-family: var(--font_family_headings, var(--font_family_headings_preset, "SF Compact Display", -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol")); font-size: 1.625em; font-weight: var(--font_weight_headings_preset, bold); line-height: 1.16em; margin: 1em 0px 0.625em;">SUMMARY</h2><p style="background-color: white; color: #1a1a1a; font-family: Spectral, serif, -apple-system, system-ui, "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 19px; line-height: 1.6em; margin: 0px 0px 1em;">When you have the most popular social video platform in the world with almost 700 million monthly active users (all of whom are outside of China) under the control of the Chinese Communist Party, its important to understand the risks associated with using the platform. One of the best ways to understand and assess risk is to war-game a scenario.</p><p style="background-color: white; color: #1a1a1a; font-family: Spectral, serif, -apple-system, system-ui, "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 19px; line-height: 1.6em; margin: 0px 0px 1em;">The most useful scenarios, while fictional, are based in fact. To quote Benjamin Franklin, by failing to prepare, you are preparing to fail.</p><p style="background-color: white; color: #1a1a1a; font-family: Spectral, serif, -apple-system, system-ui, "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 19px; line-height: 1.6em; margin: 0px;">Find out more and register today at <a href="https://safehouse.global/sm-iwx" rel="nofollow ugc noopener" style="color: #1a1a1a;">SafeHouse.Global</a>.</p>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-65233192481197086942018-10-02T23:24:00.000-07:002018-10-02T23:44:54.502-07:00WA State Has Now Killed 18 Wolves Because Of One Ranch - the Diamond M<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://2.bp.blogspot.com/--z6G4Q0e5UY/W7RBuGMU-RI/AAAAAAAACME/9V6HER8coVIxrYBvJW1Pb_VfVuznCIAGwCLcBGAs/s1600/2018-10-02_20-52-28.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="423" data-original-width="572" height="472" src="https://2.bp.blogspot.com/--z6G4Q0e5UY/W7RBuGMU-RI/AAAAAAAACME/9V6HER8coVIxrYBvJW1Pb_VfVuznCIAGwCLcBGAs/s640/2018-10-02_20-52-28.jpeg" width="640" /></a></div>
<br />
<div style="text-align: center;">
<span style="font-size: x-small;">Source: http://www.capitalpress.com/washington/20160611/a-family-tradition-of-efficiency</span></div>
<br />
The McIrvin family, owners of the Diamond M cattle ranch for five generations, have been running cattle in Colville National Forest, one million acres of federal land in Ferry, Stevens and Pend Oreille counties. There's no good reason for it because the land is ill-suited for cattle and it's home to about 100 wolves; an endangered species in WA state.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://2.bp.blogspot.com/-3urn3mWh0nw/W7RCYu274JI/AAAAAAAACMM/Yb2zIVq66z8Eas_sFoXSXFxIflG3IETegCLcBGAs/s1600/2018-10-02_21-11-20.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="599" data-original-width="724" height="528" src="https://2.bp.blogspot.com/-3urn3mWh0nw/W7RCYu274JI/AAAAAAAACMM/Yb2zIVq66z8Eas_sFoXSXFxIflG3IETegCLcBGAs/s640/2018-10-02_21-11-20.jpeg" width="640" /></a></div>
<div style="text-align: center;">
<span style="font-size: x-small;">Source: https://www.seattletimes.com/seattle-news/environment/with-their-cattle-grazing-in-washingtons-wolf-country-ranchers-work-and-worry/</span></div>
<div style="text-align: center;">
<br /></div>
The Diamond M has about 4,500 head of cattle. They lost 16 cattle to wolves in 2016 according to the Seattle Times. That's 1/3 of one percent of their livestock. As of today, 18 wolves have been killed out of a total population of about 110, or 16%.<br />
<br />
I'll say that again so that it sinks in.<br />
<br />
16% of the <u>total population</u> of an endangered species in WA state have been killed because one rancher lost .003% of his herd grazing on land that he doesn't own.<br />
<br />
The worst part of this madness is that every other rancher in Eastern WA takes the compensation offered by the State for cattle depredation, which equals twice the value of the dead cows.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://4.bp.blogspot.com/-fqR_pgRfEAg/W7RHAOVfUoI/AAAAAAAACMg/0TnKS0Bw4pQFY-pGW0aydvKkrwooB2ZkACLcBGAs/s1600/2018-10-02_21-34-10.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="330" data-original-width="811" height="260" src="https://4.bp.blogspot.com/-fqR_pgRfEAg/W7RHAOVfUoI/AAAAAAAACMg/0TnKS0Bw4pQFY-pGW0aydvKkrwooB2ZkACLcBGAs/s640/2018-10-02_21-34-10.jpeg" width="640" /></a></div>
<div style="text-align: center;">
<span style="font-size: x-small;">Source: https://wdfw.wa.gov/conservation/gray_wolf/livestock/compensation.html</span></div>
<br />
But Len McIrvin <a href="http://www.capitalpress.com/Livestock/20180529/wolves-breed-problems-for-washington-ranchers">doesn't want</a> the State's money. He wants dead wolves. His grandson and partner, Justin Hedrick, who's also president of the Steven's County Cattlemen's Association (SCCA), also wants a return to leg-hold traps (currently illegal) according to the <a href="https://www.heraldnet.com/news/state-to-kill-second-wolf-pack-after-more-cattle-deaths/">Seattle Times</a>.<br />
<blockquote class="tr_bq">
<i>“It’s such a crooked, damn deal they’re throwing at us,” (Len McIrvin) said. “Wolves and cattle are like oil and water. They do not mix, and they never will.”</i></blockquote>
<blockquote class="tr_bq">
<i><span style="background-color: white;">"If we take $100,000 from the department, that's us saying, 'It's all right for the wolves to be here as long as you pay us,'" Len McIrvin said. "It's not all right, they will put us out of business."</span> </i></blockquote>
<div>
WA State has killed 19 wolves since 2012, all because Len McIrvin, owner of the richest cattle ranch in the State, thinks getting paid twice the value of a dead cow is a "crooked damn deal" and that, basically, the only good wolf is a dead wolf.</div>
<h3 style="text-align: left;">
Justin Hedrick on the "flawed" Colville National Forest Plan Revision </h3>
<div>
It's not just wolves that the McIrvins and Hedrick want gone. They're also opposed to environmental protections for wildlife according to this <a href="https://stevenscountycattlemen.com/log-it-graze-it-or-watch-it-burn/">letter</a> that Hedrick wrote in his capacity as President of the Cattlemen's Association to the US Forest Service and US Dept of Agriculture about their proposed CNF management plan revisions:<br />
<blockquote class="tr_bq">
<i>"(T)he proposed Colville National Forest Plan Revision would impose nonsensical, arbitrary restrictions onto the current allotments, making compliant management impossible. For instance, parts of the plan require that ranchers manage their cattle in order to leave enough grass for snowshoe hair (sic) that may eventually be eaten by lynx. Other areas require that ranchers leave six to eight inches of stubble height near waterways and salt blocks and watering tanks would be prohibited around rare plants.</i></blockquote>
</div>
<blockquote class="tr_bq">
<i>Additionally, cattle are required to be managed so they do not congregate on trails, destination areas and cultural sites. Grazing cattle must also be kept away from spawning fish."</i></blockquote>
In short, Hedrick is complaining because he and his fellow ranchers may actually have to manage their cattle while on publicly-owned land in the CNF. Perhaps if the Diamond M ranch managed their cattle as required, they wouldn't be losing them to wolves. But that's probably "nonsensical" thinking, like protecting waterways, spawning fish, and snowshoe hare (not "hair", Justin).<br />
<br />
The good news is that the U.S. Forest Service and USDA kept those provisions intact in the final <a href="https://www.fs.usda.gov/detail/colville/landmanagement/planning/?cid=stelprd3824594">CNF management plan</a> released last month.<br />
<div>
<br /></div>
<div>
<br /></div>
</div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-9031840977303029006.post-679255753364397182016-09-22T11:06:00.002-07:002016-09-22T11:06:14.605-07:00Crushing Force as a Change Agent (or The Bullshit Luxury of 10,000 Failed Attempts)<div dir="ltr" style="text-align: left;" trbidi="on">
<h3 class="graf graf--h3" name="2acf">
<br /></h3>
<figure class="graf graf--figure" name="e4ba"><img class="graf-image" data-height="400" data-image-id="1*dgkaEay_w-rUhJbK6x3tsA.png" data-width="600" draggable="false" src="https://cdn-images-1.medium.com/max/800/1*dgkaEay_w-rUhJbK6x3tsA.png" /></figure><div>
<br /></div>
<h4 style="text-align: left;">
<div style="text-align: center;">
<i style="font-weight: normal;"><span style="font-size: large;">"I have not failed 10,000 times. I have successfully found </span></i></div>
<div style="text-align: center;">
<i style="font-weight: normal;"><span style="font-size: large;">10,000 ways that will not work." </span></i></div>
<span style="font-weight: normal;"><div style="text-align: center;">
<i><span style="font-size: large;">- (Thomas Edison)</span></i></div>
</span></h4>
<div>
<br /><pre class="graf graf--pre" name="7e2e">
</pre>
I’m the founder of a failed cybersecurity startup. Or, to use Edison’s perspective, I’ve successfully found multiple ways for my startup not to make a profit. But Edison’s positive spin on failure is bullshit. Only a scientist or an tenured academic on a salary has the luxury of failing so many times. When you’re an entrepreneur over 50, like I am, the stakes are much higher. When you have others depending on you, the pressure doubles with every failed attempt to turn things around. Energy is sapped. Resources, already limited, are further drained. Pretty soon, exhausted, you may find yourself contemplating options that you can’t put words to.<br /><br />I decided, instead, to put words to my experience of crushing force as a change agent in the hope that I can find a solution for myself, my company, and help others who may be in similar circumstances. In other words, I’d love to hear from you if anything in this article resonates.<h4 class="graf graf--h4" name="b471" style="text-align: center;">
(Read the full article at <a href="https://medium.com/@jeffreycarr/crushing-force-as-a-change-agent-945f75a95875#.tqddmx7q7">Medium.com</a> or <a href="https://www.linkedin.com/pulse/crushing-force-change-agent-jeffrey-carr?trk=prof-post">Linkedin</a>)</h4>
</div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-67726606130839829282016-07-11T07:13:00.002-07:002019-11-25T06:33:56.502-08:00Faith-Based Attribution<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://4.bp.blogspot.com/-avxwKhHMSwU/V4Oph2C5KzI/AAAAAAAAB8s/Vk2FdvwKaSwMCEWM_czebk45-jh7zcvVgCLcB/s1600/PS_0148_SCIENCE_CARE.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://4.bp.blogspot.com/-avxwKhHMSwU/V4Oph2C5KzI/AAAAAAAAB8s/Vk2FdvwKaSwMCEWM_czebk45-jh7zcvVgCLcB/s320/PS_0148_SCIENCE_CARE.jpg" width="320" /></a></div>
<br />
"Faith-Based Attribution" is my latest article on the challenges of attributing attacks to the person or entity responsible. Check it out at <a href="https://www.linkedin.com/pulse/faith-based-attribution-jeffrey-carr/">LinkedIn.com</a>.</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-18396650285914500222016-06-19T22:23:00.000-07:002016-06-19T22:23:13.459-07:00The DNC Breach and the Hijacking of Common Sense<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-left: 36pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">"When you need something to be true, you will look for patterns; you connect the dots like the stars of a constellation. Your brain abhors disorder. You see faces in clouds and demons in bonfires. Those who claim the powers of divination hijack these natural human tendencies. They know they can depend on you to use subjective validation in the moment and confirmation bias afterward."</span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-left: 36pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Author: David McRaney</span><span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><span class="Apple-tab-span" style="white-space: pre;"> </span></span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> </span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">This article is about the DNC breach and its attribution to the Russian government. But first, imagine that the DNC breach wasn’t a network breach but a shooting (no one was injured). No one knows who the shooter was but he left behind his weapon, a Kalishnikov AKM made in Russia. </span></div>
<b id="docs-internal-guid-9fbee6ff-6c40-ab67-82a8-63a812cb5442" style="font-weight: normal;"><br /></b>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The unknown shooter used a Russian-made weapon. Does that mean that the shooter is Russian? Or that the shooter works for the company, Kalishnikov Concern? Or even more likely in the crazy world of cyber investigations, that the designer of the AKM is also the shooter?</span></div>
<b style="font-weight: normal;"><br /></b>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Police would certainly explore the possibility that the shooter may have been Russian but they wouldn’t exclude other suspects. And no investigator in his right mind would arrest the CEO of Remington Arms, Sig Sauer, Kalishnikov Concern or any other arms manufacturer because a gun they made was used in a crime.</span></div>
<b style="font-weight: normal;"><br /></b>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">In the physical world of crime investigation, common sense dictates that the perpetrator of a crime may use any weapon and not just one made in the country of his birth, and that the developer or manufacturer of the weapon most likely isn’t the perpetrator of the crime. </span></div>
<b style="font-weight: normal;"><br /></b>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">And yet, those seemingly crazy assumptions are made every day by cybersecurity companies involved in incident response and threat intelligence. </span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br /></span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">The malware was written in Russian? It was a Russian who attacked you. </span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"><br /></span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: Arial; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Chinese characters in the code? You've been hacked by the Peoples Liberation Army.</span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<br /></div>
<div style="text-align: center;">
<span style="font-family: Arial;"><span style="font-size: 15px; white-space: pre-wrap;"><a href="https://medium.com/@jeffreycarr/the-dnc-breach-and-the-hijacking-of-common-sense-20e89dacfc2b#.ocq9keju6">Read the rest of this article at Medium.com</a></span></span></div>
</div>
Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-9031840977303029006.post-50966370173459693692016-06-15T09:33:00.000-07:002016-06-15T16:44:59.635-07:00The DNC Hack: Dangers of Playing the Nation State Blame Game<div dir="ltr" style="text-align: left;" trbidi="on">
<b>UPDATE</b>: Someone claiming to be responsible for the DNC breach has released the Trump opposition file to Gawker and mocked CrowdStrike according to the <a href="http://www.csoonline.com/article/3084594/security/dnc-hacker-slams-crowdstrike-publishes-opposition-memo-on-donald-trump.html?utm_source=twitterfeed&utm_medium=twitter">Salted Hash</a> blog:<br />
<i><br /></i>
<i>"The main part of the papers, thousands of files and mails, I gave to WikiLeaks. They will publish them soon. I guess CrowdStrike customers should think twice about company’s competence," they wrote."</i><br />
<br />
CrowdStrike's response to Salted Hash included mention of a "Russian Intelligence Disinformation Campaign", and that they stand by their findings of Russian government involvement.<br />
<br />
------------------<br />
On June 14, the Washington Post <a href="https://www.washingtonpost.com/world/national-security/russian-government-hackers-penetrated-dnc-stole-opposition-research-on-trump/2016/06/14/cf006cb4-316e-11e6-8ff7-7b6c1998b7a0_story.html">reported</a> that the Democratic National Committee had suffered a breach of their network by Russian hacker groups who stole the DNC's opposition research on Donald Trump. The Post's headline read "Russian Government Hackers penetrated DNC ..."<br />
<br />
I trust CrowdStrike's judgment that the hackers were Russian-speaking, but were they employed by competing Russian intelligence services as CrowdStrike maintains? The truth is - no one knows for sure. CrowdStrike merely believes that they are. Here's the essential argument that Dmitri made in his <a href="https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/">blog post</a>:<br />
<br />
<ol style="text-align: left;">
<li>Fancy Bear and Cozy Bear appeared to work separately from each other in the DNC network without being aware of the other's presence. </li>
<li>Russian intelligence services (GRU, SVR, FSB) compete with each other.</li>
<li>The group Fancy Bear "may be affiliated" with the GRU.</li>
<li>Therefore Cozy Bear must be affiliated with the FSB or SVR.</li>
</ol>
<div>
I'm embarrassed to say that that kind of logic is par for the course in the crazy world of cyber threat intelligence. When it comes from a company with the size and reputation of CrowdStrike, it isn't questioned in national policy circles. It's accepted as fact. Soon it will appear as a footnote in some academic's article about "nation state cyber war". The FBI's database will be updated without any critical examination of the data. </div>
<div>
<br /></div>
<div>
And should a more serious cyber event occur at any point in the future that even smells like Fancy Bear or Cozy Bear, it'll be declared an attack by the Russian government and a diplomatic incident could occur, even though the Kremlin may have had nothing to do with it. </div>
<div>
<br /></div>
<div>
The truth is that there's no way using digital forensics to differentiate between a skillful and well-paid Russian-speaking mercenary hacker group working on their own, and equally skilled Russian hackers employed by the FSB. And something as simple as <a href="https://ccdcoe.org/multimedia/responsible-attribution-prerequisite-accountability.html">responsible attribution</a> would go a long way towards avoiding unnecessary diplomatic tensions between governments.</div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-28785970412966120042016-06-06T20:01:00.002-07:002016-06-06T20:05:20.769-07:00The Next Evolution of Suits and Spooks: Entertainment<div dir="ltr" style="text-align: left;" trbidi="on">
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right; margin-left: 1em; text-align: right;"><tbody>
<tr><td style="text-align: center;"><a href="https://2.bp.blogspot.com/-HdwMeA_X0LE/V1Y5zCP8cZI/AAAAAAAAB7o/lROlyfielJgYmlTIdgjP1KyNhvgB37xPACLcB/s1600/FARN13.jpg" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" height="160" src="https://2.bp.blogspot.com/-HdwMeA_X0LE/V1Y5zCP8cZI/AAAAAAAAB7o/lROlyfielJgYmlTIdgjP1KyNhvgB37xPACLcB/s320/FARN13.jpg" width="320" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Farnborough International Airshow 2014</td></tr>
</tbody></table>
I founded Suits and Spooks in <a href="http://jeffreycarr.blogspot.com/2011/07/suits-and-spooks-why-im-inviting-ic-to.html#more">2011</a> in an effort to make it easier for startup technology companies to engage with the Intelligence Community; a problem based largely back then on an antiquated acquisition system. A lot has changed in five years, and so has Suits and Spooks.<br />
<br />
Today, I'm pleased to announce the next evolution of this event. Delivering security training to executives by combining it with a hugely entertaining event like the world's largest military airshow in Farnborough, U.K.<br />
<br />
<a href="http://www.taiaglobal.info/counterespionage-the-need-for-speed/">Espionage @ Farnborough International Airshow</a> will give our guests VIP treatment, hands-on time with the world's most advanced aircraft, space, and unmanned aerial systems while former British Intelligence officers and Special Operations Forces operators act as their guides with information on how espionage is conducted at shows like Farnborough and how to counter same.<br />
<br />
Later that evening, back in London, former and current British Intelligence officers will review the tradecraft and the counterespionage techniques that our guests should know to keep their IP and R&D safe from bad actors (both in the cyber and physical domains).<br />
<br />
While we are making this trip available to individuals, we can customize it for a company as a team-building, security-training, client entertainment, or client acquisition event. Please contact me if you'd like to discuss this further.<br />
<br />
In the meantime, please check out and follow our brand new <a href="https://www.instagram.com/suitsandspooks/">@SuitsandSpooks Instagram</a> account for some incredible pictures related to our upcoming Farnborough / London trip, and to stay current about our future trips. You can also follow us on <a href="https://twitter.com/suitsandspooks">Twitter,</a> or just visit the <a href="http://suitsandspooks.com/">SuitsandSpooks.com</a> website.<br />
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-13790289873162725502016-05-30T21:37:00.001-07:002016-05-30T21:37:57.343-07:00How Common Is It To Underestimate Customer Acquisition Costs?<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://3.bp.blogspot.com/-Zf2ueLQSXeY/V00Teu0FwII/AAAAAAAAB7I/WqgBLKLEf9sUAwXBr6mFDQFLwqHVjQX4wCLcB/s1600/EN_GrandPrixFAQ_WashingtonDC_Header.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="186" src="https://3.bp.blogspot.com/-Zf2ueLQSXeY/V00Teu0FwII/AAAAAAAAB7I/WqgBLKLEf9sUAwXBr6mFDQFLwqHVjQX4wCLcB/s320/EN_GrandPrixFAQ_WashingtonDC_Header.jpg" width="320" /></a></div>
<br /><br />I'm not a marketing guy. I always figured that if you build a solution that solves a hard problem, the customers will come. Right now, every marketing guy reading this is falling down laughing, but I really did believe that. <br /><br />In 2011 and 2012, after participating in dozens of post-breach consultations with multi-nationals, I learned about a problem with no viable solution (how can a company with millions of files determine which are most valuable to a potential adversary). <br /><br />From 2013-2015, I devised a solution, recruited a team to build it, and found angel investors to finance it. The solution was so simple, so based in common sense, and so easy to implement, that I was certain that our customers would embrace it the moment that we presented it to them. Boy, was I wrong.<br /><br />I underestimated customer acquisition, and I overestimated product adoption. As I speak with some peers in the industry about it, I'm learning that I'm not alone in making this mistake. I'm working on some ways to remedy that problem for my company, and in the process I've put together a plan to help other startups avoid that same mistake. I'm kicking that plan off today with this post. <br /><br />Our sixth annual <a href="https://suitsandspooks.com/">Suits and Spooks DC</a> event (Jan 11-12, 2017) will be all about cyber espionage, APT actors, and the cybersecurity companies and startups that can help companies and government agencies defend against it. <br /><br />Day one will explore and identify the high value technologies that are being targeted, and by whom. <br /><br />Day two will give 12 cyber security startups fifteen minutes to demo their product or service to our attendees; at least 50% of whom will be decision-makers from our startups' list of target customers. They'll be attending free of charge. <br /><br />Sound good? Sign your startup or company up as a sponsor today and we'll spend the next six months working with you to identify, connect with, and invite as many executives at the director level or higher at your target companies that we can - free of charge. By letting my team help you win new customers, you'll help us generate income for our own marketing efforts. I think it's a win-win. If you agree, please connect with me on <a href="https://www.linkedin.com/in/jeffreyscarr">LinkedIn</a> and ask for a sponsorship package.</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-35468752277773679042016-05-17T13:55:00.002-07:002016-05-17T13:55:24.956-07:00Cyber Espionage's Three-Legged Stool Dilemma<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://2.bp.blogspot.com/-I5jrCXomm2E/VztnTWMxhTI/AAAAAAAAB6k/n7U5Y-IGluYVc_be4Dan7SCts1JbGjEegCLcB/s1600/barstool.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="276" src="https://2.bp.blogspot.com/-I5jrCXomm2E/VztnTWMxhTI/AAAAAAAAB6k/n7U5Y-IGluYVc_be4Dan7SCts1JbGjEegCLcB/s320/barstool.jpg" width="320" /></a></div>
<br />
<div>
Cyber espionage is a worldwide multi-billion dollar problem for every technologically advanced nation; even the ones that the U.S. traditionally considers its adversaries (Russia and China). </div>
<div>
<br /></div>
<div>
Think of it as a stool with three legs: Targets (High Value Technologies), Actors (both State and non-State), and Defenses (ways that we can protect those HVTs). </div>
<div>
<br /></div>
<div>
The reason why companies and government agencies continue to lose their expensive HVTs to their rivals and adversaries is that their three legged stool is missing one or more of its legs. It's really as simple as that.</div>
<div>
<br /></div>
<div>
At <a href="http://suitsandspooks.com/">Suits and Spooks DC</a> (January 11-12, 2017) we'll take a deep dive into how governments and corporations need to assess these three components by discovering answers to the following questions:</div>
<div>
<br /></div>
<div>
What are the most valuable technologies of 2017 and beyond?</div>
<div>
Which threat actors are targeting those technologies, and how?</div>
<div>
How can you best defend your technologies against those threat actors?</div>
<div>
<br /></div>
<div>
Day one will address the first two questions while day two will showcase about a dozen companies whose focus is defending against acts of cyber espionage.</div>
<div>
<br /></div>
<div>
Seats are limited to no more than 100 people. <a href="http://suitsandspooks.com/">Register today</a> and save 60%.</div>
<div>
<br /></div>
<div>
If you have a topic in mind that you think would be a good fit for our event, <a href="mailto:jc@taiaglobal.com">send over</a> a title, abstract, and your bio. Our current speakers include Dr. David Bray (CIO at the FCC) and Lewis Shepherd (formerly with Microsoft and the Defense Intelligence Agency).</div>
<div>
<br /></div>
<div>
If you work for a cyber security company and would like to be considered for a 15 minute slot on day two to showcase your product for our government and corporate attendees, <a href="mailto:jc@taiaglobal.com">contact me</a> at your earliest opportunity. We're only going to feature 12 companies.</div>
<div>
<br /></div>
<div>
<br /></div>
</div>
Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-9031840977303029006.post-38670130678645910182016-03-22T11:51:00.001-07:002016-03-22T11:51:27.138-07:00Attend Our Counterterrorism Workshop on March 29 in Washington DC<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-zdUyCto0WnE/VvGTMhn92iI/AAAAAAAAB44/-tBuW84fWHgEJInWRfaXVY5ZQDYaa5egw/s1600/5eb4cf8b409f4b889177f3dc98d1637d_18.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="179" src="https://1.bp.blogspot.com/-zdUyCto0WnE/VvGTMhn92iI/AAAAAAAAB44/-tBuW84fWHgEJInWRfaXVY5ZQDYaa5egw/s320/5eb4cf8b409f4b889177f3dc98d1637d_18.jpg" width="320" /></a></div>
ISIL, aka ISIS or The Daesh, has claimed responsibility for yesterdays <a href="http://www.theguardian.com/world/live/2016/mar/22/brussels-airport-explosions-live-updates">suicide bomber attacks</a> in Brussels which targeted transportation hubs. <div>
<br /></div>
<div>
Government and corporate employees are invited to attend <a href="https://taia.global/">Taia Global's</a> one day workshop on <a href="http://suitsandspooks.com/">Terrorism, Technology and the Law</a> in Washington D.C. on March 29th. </div>
<div>
<br /></div>
<div>
You'll join a small group of government and military employees, information security professionals, and international lawyers at the Waterview Conference Center for a full day of briefings and discussions on how technology is a forcemultiplier for terrorists, how the laws of warfare are being changed due to technology, and most importantly, how to weigh courses of action while bypassing cognitive and emotional traps. </div>
<div>
<br /></div>
<div>
Use coupon code SAVE30 in the next 48 hours and save $30 on the $179 registration fee (only $149). </div>
<div>
<br /></div>
<div style="text-align: center;">
<a href="http://suitsandspooks.com/">FOR AGENDA AND REGISTRATION INFORMATION</a></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-3761519739606432492016-03-17T19:28:00.000-07:002016-03-18T05:01:08.034-07:00Do Your High Value Assets Match Russia or China's?<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px; line-height: 24px; widows: 1;">
If you want to know what the Chinese and Russian governments consider valuable, just follow the R&D money.<br />
<br />
Our linguist/researchers have been busy building the world's first and only commercial R&D database which up until now has been accessible only via our Redact™ search engine so that you can tell if your high value digital assets are at risk.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px; line-height: 24px; widows: 1;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px; line-height: 24px; widows: 1;">
As of today, you can purchase our entire Russia and China catalog of R&D entities with descriptions of thousands of currently funded projects for your company or agency's internal use.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px; line-height: 24px; widows: 1;">
<a data-mce-href="https://taia.global/wp-content/uploads/2016/03/2016-03-16_14-32-55.png" href="https://taia.global/wp-content/uploads/2016/03/2016-03-16_14-32-55.png" rel="attachment wp-att-1110"><img alt="2016-03-16_14-32-55" class="alignnone size-medium wp-image-1110" data-mce-src="https://taia.global/wp-content/uploads/2016/03/2016-03-16_14-32-55-300x286.png" height="286" src="https://taia.global/wp-content/uploads/2016/03/2016-03-16_14-32-55-300x286.png" style="height: auto; max-width: 100%;" width="300" /></a></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px; line-height: 24px; widows: 1;">
<a data-mce-href="https://taia.global/wp-content/uploads/2016/03/2016-03-16_14-32-23.png" href="https://taia.global/wp-content/uploads/2016/03/2016-03-16_14-32-23.png" rel="attachment wp-att-1111"><img alt="2016-03-16_14-32-23" class="alignnone size-medium wp-image-1111" data-mce-src="https://taia.global/wp-content/uploads/2016/03/2016-03-16_14-32-23-300x181.png" height="181" src="https://taia.global/wp-content/uploads/2016/03/2016-03-16_14-32-23-300x181.png" style="height: auto; max-width: 100%;" width="300" /></a></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px; line-height: 24px; widows: 1;">
Download our <a data-mce-href="https://taia.global/wp-content/uploads/2016/03/Catalog-of-Russian-RD-Data-2016.pdf" href="https://taia.global/wp-content/uploads/2016/03/Catalog-of-Russian-RD-Data-2016.pdf">Russia catalog</a> and our <a data-mce-href="https://taia.global/wp-content/uploads/2016/03/Catalog-of-Chinese-RD-Data-2016-1.pdf" href="https://taia.global/wp-content/uploads/2016/03/Catalog-of-Chinese-RD-Data-2016-1.pdf">China catalog</a> for more details. Contact us for pricing.</div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-36271784640002724532016-03-13T22:32:00.000-07:002016-03-14T05:35:26.277-07:00An Exclusive Opportunity To Look Inside China's Plan To Become A Tech Power<div dir="ltr" style="text-align: left;" trbidi="on">
Whether we in the West like it or not, the People's Republic of China is continuing to achieve rapid technological growth in a growing number of areas thanks in part to its smart use of Five Year Plans, increased spending on research and development, and technology acquisition through a variety of means from foreign companies.<br />
<br />
<a href="http://www.reuters.com/article/us-china-parliament-tech-idUSKCN0W707Z?utm_source=SITC+Bulletin%2C+March+11%2C+2016&utm_campaign=SITC+Bulletin%2C+2016&utm_medium=email">Reuters</a> reports that China aims to boost its R&D spending for its 13th Five Year Plan to 2.5% of GDP compared to 2.1% during the period of 2011-2015. According to <a href="http://www.nsf.gov/news/news_summ.jsp?cntn_id=137394&org=NSF&from=news">Indicators 2016</a>, <i>"China is now the second-largest performer of R&D, accounting for 20 percent of global R&D as compared to the United States, which accounts for 27 percent."</i><br />
<br />
The following are some of the overarching initiatives of China's 13th Five Year Plan and some of the Chinese research institutions and state key labs working on those issues.<br />
<br />
If your company is working on parallel technologies to those being funded by the Chinese (or Russian) government as part of its strategic technology initiatives, it's not enough to just know the broad topics (even though some cyber security companies want you to think so). You need to know the specifics. Only Taia Global uses human linguist/researchers to discover what those specifics are and makes them searchable in a custom-built search engine.<br />
<br />
We want as many companies as possible to try out our <a href="https://parrot.fhl.global/users/sign_in">Redact™ R&D search engine</a> for one month without any obligation. To that end we have lowered the price of a one month subscription from $499/mo to just $99. Use discount code MAR2016 at checkout.<br />
<br />
<b>Agricultural Modernization</b><br />
<div>
Development Research Center of the State Council<br />
<br />
<b>Industrial Planning and Optimization</b><br />
Development Research Center of the State Council<br />
Department of Electrical Engineering, Tsinghua University<br />
<br />
<b>Urbanization</b><br />
Development Research Center of the State Council<br />
Guiyang University<br />
<br />
<b>Internet</b><br />
State Key Laboratory of Software Development Environment<br />
Institute of Information System and Engineering, School of Software, Tsinghua University<br />
Aerospace Software Engineering Research Center, School of Computer Science and Technology, Harbin Institute of Technology<br />
Information Security Technology, Institute of Computer Science & Technology, Peking University<br />
Network Technology Research Center, Institute of Computing Technology, Chinese Academy of Sciences<br />
Institute of Aerospace Information Technology, School of Aerospace Engineering, Tsinghua University<br />
Information Security Research Centre, Southeast University<br />
<br />
<b>Economic Governance</b><br />
Institute of Economics, Chinese Academy of Social Sciences (CASS)<br />
Development Research Center of the State Council<br />
State Key Laboratory of New Ceramics and Fine Processing<br />
State Key Laboratory of Software Development Environment<br />
<br />
<b>Innovation-driven Development Strategy</b><br />
Development Research Center of the State Council<br />
<br />
<b>Coordinated Regional Development</b><br />
Development Research Center of the State Council<br />
Institute of World Economics and Politics, Chinese Academy of Social Sciences (CASS)<br />
Institute of Economics, Chinese Academy of Social Sciences (CASS)<br />
<br />
<b>Innovation Social Governance</b><br />
Development Research Center of the State Council<br />
University of Science and Technology of China: College of Computer Science and Technology<br />
<br />
<b>Economic and National Defense Construction</b><br />
National Defense Technology, Key Laboratory of Shockwave and Detonation Physics (Laboratory of Shock and Detonation (LSD)), China Academy of Engineering Physics (CAEP)<br />
<div>
Aerospace Software Engineering Research Center, School of Computer Science and Technology, Harbin Institute of Technology<br />
Information Security Theory and Technology Research Laboratory, School of Computer Science and Technology, Southwest University of Science and Technology<br />
China Academy of Engineering Physics (CAEP)<br />
Jilin University<br />
Guiyang University<br />
<br />
<b>Education and Health</b><br />
Aerospace Software Engineering Research Center, School of Computer Science and Technology, Harbin Institute of Technology<br />
China Academy of Engineering Physics (CAEP)<br />
Guiyang University<br />
Department Basic Medical, School of Medicine, Tsinghua University<br />
<br />
<b>Ecological Environment</b><br />
Tianjin University<br />
State Key Laboratory of Advanced Metals and Materials<br />
<br />
<b>Strategy and Security</b><br />
State Key Laboratory of Software Development Environment<br />
State Key Laboratory of ASIC and Systems<br />
Department of Electrical Engineering, Tsinghua University<br />
Institute of Information System and Engineering, School of Software, Tsinghua University<br />
Information Security Technology, Institute of Computer Science & Technology, Peking University<br />
National Research Center for Information Technology Security<br />
Information Security Theory and Technology Research Laboratory, School of Computer Science and Technology, Southwest University of Science and Technology<br />
Information Security Research Centre, Southeast University<br />
University of Science and Technology of China: College of Computer Science and Technology<br />
China Academy of Engineering Physics (CAEP)<br />
Jilin University</div>
</div>
<div>
<br /></div>
<div>
Included in your trial subscription is the ability to search R&D projects not just in China but also in Russia, South Korea, and France. Learn more about Taia Global and our Redact™ and OverWatch™ products at our <a href="https://taia.global/">website</a>.</div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-65749515353617981102016-01-31T19:31:00.001-08:002016-01-31T19:31:36.554-08:00Two Rare Gifts For The Next 20 People Who Register for Suits and Spooks DC 2016<div dir="ltr" style="text-align: left;" trbidi="on">
Suits and Spooks DC 2016 is now less than two weeks away and I'd like to make it our best attended event in the five years since I founded this security forum. To that end, I'm giving away two rare gifts for the next 20 people who register for a full two day pass ($599 for Industry; $499 for Gov't and Academia).<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-zH8RL9WpT5s/Tu36rkE5DBI/AAAAAAAAAOc/BjSdQye5Av8/s1600/2011-12-18_06-36-59.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="http://4.bp.blogspot.com/-zH8RL9WpT5s/Tu36rkE5DBI/AAAAAAAAAOc/BjSdQye5Av8/s200/2011-12-18_06-36-59.jpg" width="151" /></a></div>
The first gift is an autographed and personalized 2nd edition copy of my book Inside Cyber Warfare (O'Reilly Media, 2011). The Russia section alone has been praised by Russia and China cyberwarfare expert Lt. Col. Timothy Thomas as containing unique material not found anywhere else.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-6m_riJ_YoYM/Vq7QYBTdYxI/AAAAAAAAB3s/lYYvOl5xNLc/s1600/IMG_0240.jpeg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="http://1.bp.blogspot.com/-6m_riJ_YoYM/Vq7QYBTdYxI/AAAAAAAAB3s/lYYvOl5xNLc/s200/IMG_0240.jpeg" width="150" /></a></div>
The second gift is a 2011 Plank Holder Challenge Coin issued at our very first Suits and Spooks event at Facebook's old loft space in Palo Alto. The flip side of the coin says "PLANK HOLDER - SUITS AND SPOOKS 2011 - Palo Alto, CA".<br />
<br />
This offer will end once we sell out so act today and pick up your book and challenge coin at the event on Feb 11-12 at the National Press Club.<br />
<br />
Full details on the agenda and speakers as well as your registration options are at <a href="http://www.suitsandspooks.com/">www.suitsandspooks.com</a>.<br />
<br /></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-37313293053395340922016-01-26T22:02:00.000-08:002016-01-26T22:02:44.067-08:00Kung Fu Panda 3: A Collaboration Between Dreamworks and China's State Council<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px; line-height: 24px; widows: 1;">
<a data-mce-href="http://www.hollywoodreporter.com/news/china-box-office-kung-fu-858877" href="http://www.hollywoodreporter.com/news/china-box-office-kung-fu-858877">Kung Fu Panda 3</a> opens simultaneously in the U.S. and China on Jan 29th to high hopes by Dreamworks Animation and Oriental Dreamworks, which is a joint venture formed with China Media Capital and Shanghai Media Group. A test run of two screenings at various Chinese theaters last weekend yielded an impressive $6.5 million, and January 29th is a coveted opening date in China due to its proximity to the Chinese New Year and Valentines Day.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px; line-height: 24px; widows: 1;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px; line-height: 24px; widows: 1;">
The Shanghai Media Group is a State-run organization, and animation is a strategic technology that has its own Five-Year Plan. The following is a high level overview from the 12th Five Year plan (2011-2015):</div>
<ul style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px; line-height: 24px; widows: 1;">
<li>Guiding the production of original animation creation</li>
<li>Creating a system to make innovation profitable</li>
<li>Promoting the balanced development of the animation industry</li>
<li>Advancing the technical innovation ability of the animation industry</li>
<li>Implementing the strategy for key enterprises and major projects</li>
<li>Strengthening talent support</li>
<li>Facilitating the animation industry to “go global”</li>
<li>Enhancing the international cooperation of the animation industry</li>
<li>Encouraging the animation industry to “go global”</li>
<li>Safeguarding measures including increasing financial input to the industry, protecting intellectual property, and improving investing and financing policies</li>
</ul>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px; line-height: 24px; widows: 1;">
China's emphasis on improving its animation production facilities is a double-edged sword for foreign companies. On the one hand, it gives foreign animation companies like Dreamworks (NASDAQ: DWA) or Walt Disney (NYSE: DIS) hard-to-get access to China, which is arguably the most important market in the world. On the other hand, it gives China access to the foreign company's intellectual property through overt technology transfer that happens when foreign companies hire Chinese engineers who eventually leave the foreign company and take their newly found skills to a Chinese animation company. There is also covert technology acquisition which can occur through hacking and other secretive means.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px; line-height: 24px; widows: 1;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px; line-height: 24px; widows: 1;">
One reason why the Chinese government is so enthusiastic about animation is that it serves the Chinese Communist Party's propaganda function. Song Lei, an expert in the subject and a former employee of China's Ministry of Culture wrote a <a data-mce-href="http://www.acgstudy.com/page326?article_id=1118" href="http://www.acgstudy.com/page326?article_id=1118">blog post</a> about Japan and America's use of animation as propaganda (machine translation):</div>
<blockquote style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px; line-height: 24px; widows: 1;">
"Of course. Japanese anime serve as propaganda in postwar Japan an important role in East Asian countries have large numbers of young people are fond of Japanese anime, there are tens of thousands of Chinese students learning Japanese because the Japanese anime away every year, the book in Japanese scholars Endo reputation , also devoted to the "knowledge-Japanese" and "Hari clan" generation. American animation also with its strong capital in the world to promote their liberty, equality of the world, the US-centered values, as well as a variety of American superheroes."</blockquote>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 16px; line-height: 24px; widows: 1;">
<span class="goog-text-highlight">Later in the post Song writes that in comparison to Japan and America, China's animation propaganda has just started and the quality is relatively low. This is at least partly why foreign film and animation companies will find open arms in China, at least until China's ambitions in this area have been achieved. When that happens I predict that access to China's market will tighten considerably for those same foreign firms.</span></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-88110510188046206172016-01-07T05:56:00.000-08:002016-01-08T10:10:35.998-08:007 Reasons Not To Miss Suits and Spooks DC This Year<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="color: #454545; font-family: Arial, Helvetica, sans-serif; font-size: 13.3333px; line-height: normal; widows: 1;">
<div _mce_style="font-size: 12pt;" style="font-size: 12pt;">
<br /></div>
</div>
<table _mce_style="display: table; background-color: #ebf5f6;" border="0" cellpadding="0" cellspacing="0" class="mceItemTable" id="textEdit" style="background-color: #ebf5f6; color: black; font-family: Times; widows: 1; width: 100%px;" styleclass=" style_FeatureBGColor"><tbody>
<tr><td _mce_style="padding: 25px 25px 0px; font-size: 18pt; font-family: Arial, Helvetica, sans-serif; color: #ee5624;" align="left" style="padding: 25px 25px 0px;" styleclass=" style_FeatureHeadingText style_FeatureHeading" valign="top"><div style="color: #ee5624; font-family: Arial, Helvetica, sans-serif; font-size: 18pt;">
</div>
<h3>
#7: The Rise of Global Terrorism</h3>
Engage in a discussion about the evolution and expansion of terrorism by the Islamic State with CIA and DOD experts Mark Kelton and Dave Kilcullen.<br /><br /><h3>
#6: Are Commercial Airlines Safe From Hacking</h3>
Should you be worried about hackers interfering with the control systems of commercial aircraft? What safety measures are in place to keep that from happening? Jim Vasatka, the Director of Aviation Security at Boeing will answer your questions in a special CLOSED TO THE PRESS briefing. <br /><br /><h3>
#5: Is The Cyber Security Industry Over-Valued</h3>
Should you invest in the cyber security industry or is the industry vastly over-valued? Niloo Howe, Elad Yoran, and other VCs will share their thoughts. <br /><br /><h3>
#4: How Do Adversaries Track U.S. Executives Overseas</h3>
Are you an executive who frequently travels overseas? Learn how foreign agents can target you through your mobile device's electronic signature and other means. A retired Navy SOF Chief will walk you through it. <br /><br /><h3>
#3: How Can Your Company Do Business In High Risk Countries Without Losing Its IP</h3>
If you work for a multinational corporation, learn how your company can do business in high risk nations and not lose your intellectual property to foreign governments or criminal hackers. Panelists: Jody Westby, Joel Brenner, and Jeffrey Carr <br /><br /><h3>
#2: How Are Criminals Using Digital Currencies</h3>
Hear Will Gragido explain what digital currencies are, how criminals are using them, and whether you should be concerned. <br /><br /><h3>
#1: What Legal Regimes Control Cyber Warfare, And How Are They Changing</h3>
Listen to NATO, DOD, and legal scholars (Eneken Tikk-Ringas, Gary Brown, and Catherine Lotrionte) debate the legal ramifications of digital attacks against civilian infrastructure and how that may change the way that warfare is conducted. <br /><br /><h3 style="text-align: center;">
<a href="http://www.suitsandspooks.com/">Only 30 seats remaining. Grab yours today.</a></h3>
</td></tr>
</tbody></table>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-14483855411329644612015-12-13T20:52:00.001-08:002015-12-13T20:52:10.225-08:00Get An Insider's Perspective On The Commercial Airline Threat Landscape (Closed To The Press) <div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-keOzyxWVGMQ/Vm5Jb8AIQxI/AAAAAAAAB2Y/ufgAW2AgOso/s1600/dreamstime_m_42761657.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="213" src="http://1.bp.blogspot.com/-keOzyxWVGMQ/Vm5Jb8AIQxI/AAAAAAAAB2Y/ufgAW2AgOso/s320/dreamstime_m_42761657.jpg" width="320" /></a></div>
<span style="background-color: white; color: #1a1a1a; font-family: Corbel, Geneva, Verdana, Arial, sans-serif; font-size: 14.6667px; line-height: normal; widows: 1;"><br /></span>
<span style="background-color: white; color: #1a1a1a; font-family: Corbel, Geneva, Verdana, Arial, sans-serif; font-size: 14.6667px; line-height: normal; widows: 1;">This is a unique opportunity to hear Jim Vasatka (Director of Aviation Security at Boeing) discuss the overall cybersecurity threat space as it pertains to commercial aircraft in a NO PRESS, Chatham House Rules environment. Attendees will also be invited to submit implementation ideas for AIAA's Cybersecurity Framework. </span><br />
<span style="background-color: white; color: #1a1a1a; font-family: Corbel, Geneva, Verdana, Arial, sans-serif; font-size: 14.6667px; line-height: normal; widows: 1;"><br /></span>
<div style="widows: 1;">
<span style="color: #1a1a1a; font-family: Corbel, Geneva, Verdana, Arial, sans-serif;"><span style="background-color: white; font-size: 15px;">For the first time in five years, Suits and Spooks DC is structured in half-day blocks of sessions - Aerospace, Critical Infrastructure, Finance, and Future Warfare. You now have the option of registering for a single or multiple blocks ($199 per block), or the full two days ($599). Lunch is included with either option.</span></span></div>
<div style="widows: 1;">
<span style="color: #1a1a1a; font-family: Corbel, Geneva, Verdana, Arial, sans-serif;"><span style="background-color: white; font-size: 15px;"><br /></span></span></div>
<h3 style="text-align: center;">
<span style="color: #1a1a1a; font-family: Corbel, Geneva, Verdana, Arial, sans-serif;"><span style="background-color: white; font-size: 15px;"><a href="http://www.suitsandspooks.com/">Learn More</a></span></span></h3>
<div style="widows: 1;">
<span style="color: #1a1a1a; font-family: Corbel, Geneva, Verdana, Arial, sans-serif;"><span style="background-color: white; font-size: 15px;"><br /></span></span></div>
<div style="widows: 1;">
<span style="color: #1a1a1a; font-family: Corbel, Geneva, Verdana, Arial, sans-serif;"><span style="background-color: white; font-size: 15px;"><br /></span></span></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-68748809660834390902015-12-12T10:37:00.001-08:002015-12-12T10:37:54.065-08:00Who Has The Chinese Government Arrested For Hacking OPM? Possibly No One.<div dir="ltr" style="text-align: left;" trbidi="on">
On December 1st, Attorney General Loretta E. Lynch and Department of Homeland Security Secretary Jeh Johnson, together with Chinese State Councilor Guo Shengkun, co-chaired the first U.S.-China High-Level Joint Dialogue on Cybercrime and Related Issues.<br /><br />On December 2nd, China’s official news agency <a href="http://news.xinhuanet.com/english/2015-12/02/c_134874733_2.htm">Xinhua</a> reported on the meeting and dropped a bombshell: “Among the cases discussed included the one related to the alleged theft of data of the U.S. Office of Personnel Management by Chinese hackers. Through investigation, the case turned out to be a criminal case rather than a state-sponsored cyber attack as the U.S. side has previously suspected.”<br /><br />The Washington Post’s Ellen Nakashima was the first to write an <a href="https://www.washingtonpost.com/world/national-security/chinese-government-has-arrested-hackers-suspected-of-breaching-opm-database/2015/12/02/0295b918-990c-11e5-8917-653b65c809eb_story.html">article</a> about the Xinhua announcement and <a href="https://www.google.com/search?q=china+official+xinhua+news+agency&oq=xinhua%2C+china+offical&aqs=chrome.1.69i57j0.8799j0j7&sourceid=chrome&es_sm=91&ie=UTF-8#q=china+arrests+opm+hackers">other news media</a> quickly followed suit. The fact is that the Chinese government has not provided any details about the OPM hackers’ arrests. It’s hard to fathom why China’s Minister of Public Security State Councilor Guo Shengkun, who was part of the China delegation (depicted in the picture below), didn’t provide any details during the ministerial meetings. It certainly wasn’t mentioned in the U.S. Dept. of Justice’s <a href="http://www.justice.gov/opa/pr/first-us-china-high-level-joint-dialogue-cybercrime-and-related-issues-summary-outcomes-0">press release</a>.<div>
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-NLSOgx71QRQ/VmxnUbRic4I/AAAAAAAAB2M/yahbuyRdVhU/s1600/134874733_14490171056501n.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="238" src="http://2.bp.blogspot.com/-NLSOgx71QRQ/VmxnUbRic4I/AAAAAAAAB2M/yahbuyRdVhU/s400/134874733_14490171056501n.jpg" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both;">
It’s not that the Chinese government hasn’t been arresting hackers. The Ministry of Public Security (MPS) has been very busy doing just that for most of this year according to the Legal Daily, a State-owned newspaper that covers legal developments. According to the Legal Daily, China’s thirteenth five year plan (which hasn’t yet been formally released) emphasizes the following network security related issues:</div>
<div class="separator" style="clear: both;">
</div>
<ul style="text-align: left;">
<li>Improved network security</li>
<li>Purify the Internet environment (gambling, pornography, drugs, etc.)</li>
<li>Strengthen multilateral and bilateral coordination</li>
<li>Participation in global network security initiatives</li>
</ul>
<br />
<div class="separator" style="clear: both;">
To combat criminal hackers, the MPS launched a six-month special action. As of November, the MPS opened 400 criminal cases against 900 individuals including cyber criminals and hackers. Those arrests occurred between May and November for crimes including gambling, extortion, hacking, drug sales, and pornography.</div>
<div class="separator" style="clear: both;">
<br /></div>
<div class="separator" style="clear: both;">
China has made commitments to the U.S. that it will not engage in acts of cyber espionage for commercial gain and it may have every intention to keep those commitments — partly because there are many other legal ways that it can acquire the information it wants, partly to avoid possible U.S. economic sanctions, and partly because it has made incredible technological progress over the past 20 years so stealing is less of a requirement than it used to be.</div>
<div class="separator" style="clear: both;">
<br /></div>
<div class="separator" style="clear: both;">
Arresting the OPM hackers and providing the details to the FBI would seem to be an easy way to gain credibility for its earlier promise. Perhaps the MPS will indeed provide the details that the Dept. of Justice is most likely asking for ever since the Xinhua article appeared on Dec 2nd. Otherwise, this entire affair will keep getting weirder and weirder.</div>
<div class="separator" style="clear: both;">
<br /></div>
<h2 style="text-align: left;">
Recommended Reading:</h2>
<div class="separator" style="clear: both;">
Graham Webster for <i>The Diplomat</i>: “<a href="http://thediplomat.com/2015/12/has-u-s-cyber-pressure-worked-on-china/">Has U.S. Cyber Pressure Worked On China?</a>”</div>
<div class="separator" style="clear: both;">
Peter Mattis for <i>The Jamestown Foundation</i>: “<a href="http://www.jamestown.org/programs/chinabrief/single/?tx_ttnews%5Btt_news%5D=44865&cHash=7c03bdb5b344ef6e014c8256a5326d71#.Vmxoh-MrK9Y">Three Scenarios for Understanding Changing PLA Activity in Cyberspace</a>”</div>
<div class="separator" style="clear: both;">
<br /></div>
<div class="separator" style="clear: both;">
This article is cross-posted from my article on <a href="https://medium.com/@jeffreycarr/who-has-the-chinese-government-arrested-for-hacking-opm-possibly-no-one-3b771abbd340#.fyhs2zmyu">Medium</a>.</div>
<div>
<br /></div>
<div>
<div>
<br /></div>
</div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-18918696270154213762015-10-21T12:22:00.001-07:002015-10-21T12:22:58.544-07:00How “Hat-tribution” on China Has Harmed U.S. National Policymaking<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />Back in the early 2000’s, cybersecurity researchers blamed every financial services attack on Russian or Eastern European hackers and every non-financial services attack on China. Every attack literally fell into one of those two buckets. U.S. Air Force officers in the 90’s were convinced that only the Chinese government was interested in stealing non-financial data like intellectual property. They were so positive that they gave China a code name — Advanced Persistent Threat (APT). Some of those Air Force officers later founded Mandiant and commercialized the name APT in a <a href="http://taosecurity.blogspot.com/2010/01/mandiant-m-trends-on-apt.html">white paper</a> that they released in 2010. In those years, APT was a “who”, not a “what”.<br /><br />After the Office of the National Counterintelligence Executive issued its <a href="http://www.ncsc.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf">report</a> in 2011 which named at least four nations that were responsible for intellectual property theft: China, Russia, France, and Israel; Mandiant began losing the battle for keeping APT as a code name for China and it quickly evolved into a generic description for how hackers attack a network.<br /><br />Mandiant made a fortune from its long-standing policy of blaming every network breach on Chinese hackers; a fact that didn’t go un-noticed by almost every other cybersecurity company. Between 2010 and 2015, any report that named China as the culprit caught the attention of corporate CEOs as well as major news outlets. In 2013, Mandiant issued its APT1 report. By the end of the year, it was acquired by FireEye for $1B.<br /><br />In 2014, Crowdstrike issued its own PLA report which identified by name an alleged PLA hacker based in large part upon a photo that showed a PLA officer’s hat. CrowdStrike executives called it “hat-tribution” and the PLA hacker group was named “<a href="http://blog.crowdstrike.com/hat-tribution-pla-unit-61486/">Putter Panda</a>”. <div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-yISjcvQEV_I/Vifkz-aSISI/AAAAAAAAB0w/C6IkRhgf4Sk/s1600/hattribution.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" src="http://3.bp.blogspot.com/-yISjcvQEV_I/Vifkz-aSISI/AAAAAAAAB0w/C6IkRhgf4Sk/s400/hattribution.png" width="356" /></a></div>
<br />That Crowdstrike considered a hat in a photo as evidence is a commentary on how badly private companies have handled intelligence collection and analysis. That, and a 10 year + history of mis-attributing every intellectual property attack that ever happened to the government of China has brought us to the inevitable end result — putting the White House in an uncomfortable diplomatic position with the Chinese government who may very well be keeping its word. Ironically, it’s Crowdstrike executive and co-founder Dmitri Alperovitch whose <a href="http://blog.crowdstrike.com/the-latest-on-chinese-affiliated-intrusions-into-commercial-companies/">blog post</a> brought this controversy about.<br /><blockquote class="tr_bq">
The very first intrusion conducted by China-affiliated actors after the joint Xi-Obama announcement at the White House took place the very next day — Saturday September 26th. We detected and stopped the actors, so no exfiltration of customer data actually took place, but the very fact that these attempts occurred highlights the need to remain vigilant despite the newly minted Cyber agreement.</blockquote>
<blockquote class="tr_bq">
</blockquote>
<blockquote class="tr_bq">
We are releasing below the timeline of intrusions into these commercial entities that we detected over the course of the last 30 days. It is important to note that this is not an exhaustive list of all the intrusions from Chinese-government affiliated actors we have detected during this time period; it is limited only to commercial entities that fit squarely within the hacking prohibitions covered under the Cyber agreement. The intrusion attempts are continuing to this day, with many of the China-affiliated actors persistently attempting to regain access to victim networks even in the face of repeated failures.</blockquote>
<blockquote class="tr_bq">
We assess with a high degree of confidence that these intrusions were undertaken by a variety of different Chinese actors, including<a href="http://blog.crowdstrike.com/deep-thought-chinese-targeting-national-security-think-tanks/">DEEP PANDA</a>, which CrowdStrike has tracked for many years breaking into national-security targets of strategic importance to China, as well as commercial industries such as Agriculture, Chemical, Financial, Healthcare, Insurance, Legal, Technology and many others.</blockquote>
<div>
<br /></div>
<div>
This company blog post combined Crowdstrike’s threat intelligence with a marketing pitch for its Falcon platform. The post speaks for itself, blaming China for ongoing cyber attacks after the Xi-Obama agreement. However, after AP, CBS, and the Washington Post picked up the story, Alperovitch attempted to walk back his post’s claims by <a href="http://foreignpolicy.com/2015/10/19/crowdstrike-we-are-not-stating-the-chinese-are-violating-the-cyber-agreement/">saying</a> “We are not stating anywhere that the Chinese are violating the agreement. It is not up to us to draw that conclusion.”<br /><br />A White House spokesman who spoke with <a href="http://foreignpolicy.com/2015/10/19/crowdstrike-we-are-not-stating-the-chinese-are-violating-the-cyber-agreement/">Foreign Policy</a> wouldn’t comment on the Crowdstrike blog post except to say “As a general matter, malicious cyber actors from a variety of nations find U.S. networks and companies attractive targets, and seek access to sensitive or proprietary information for a variety of purposes.”<br /><br />How many of those “malicious cyber actors from a variety of nations” use China to launch their attacks from? <br /><br />How many independent, non-state-affiliated Chinese hackers launch their own attacks for fun and profit?<br /><br />And how does Crowdstrike, Mandiant or any other company differentiate between those and actual Chinese government attacks? <br /><br />I’ve been challenging security intelligence companies to answer that question for years and have yet to hear a responsible answer from any of them.</div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-9031840977303029006.post-68557081624318019392015-10-13T06:20:00.000-07:002015-10-16T08:29:31.805-07:00Win A Free Trip To Suits and Spooks Paris!<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-cQBFrE887qo/Vh0ELWhETKI/AAAAAAAAB0Q/o7UfhCIBkac/s1600/paris.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="320" src="http://2.bp.blogspot.com/-cQBFrE887qo/Vh0ELWhETKI/AAAAAAAAB0Q/o7UfhCIBkac/s320/paris.jpg" width="214" /></a></div>
<span style="background-color: white; color: #222222; font-family: georgia, serif; font-size: 12.8px; line-height: normal; widows: 1;"><span style="font-size: 12.8px;"><b>UPDATE: </b>As of this morning (Oct 16th), we have only 2 tickets remaining for this promotion. Act fast to secure your chance to win a free trip to Paris Suits and Spooks.</span></span><br />
<span style="background-color: white; color: #222222; font-family: georgia, serif; font-size: 12.8px; line-height: normal; widows: 1;"><span style="font-size: 12.8px;"><b><br /></b></span></span>
<span style="background-color: white; color: #222222; font-family: georgia, serif; font-size: 12.8px; line-height: normal; widows: 1;"><span style="font-size: 12.8px;"><b>UPDATE:</b> As of the 15th, we have only 5 tickets remaining. This promotion will end at close of business omorrow, Friday Oct 16th.</span></span><br />
<span style="background-color: white; color: #222222; font-family: georgia, serif; font-size: 12.8px; line-height: normal; widows: 1;"><span style="font-size: 12.8px;">-----</span></span><br />
<span style="background-color: white; color: #222222; font-family: georgia, serif; font-size: 12.8px; line-height: normal; widows: 1;"><span style="font-size: 12.8px;"><br /></span></span>
<span style="background-color: white; color: #222222; font-family: georgia, serif; font-size: 12.8px; line-height: normal; widows: 1;"><span style="font-size: 12.8px;">For the next 48 hours, we will make ten tickets for <a href="http://suitsandspooks.com/">Suits and Spooks DC</a> (Feb 11-12, 2016) available for purchase at a huge discount- only $324. Our normal rate for October is $399 and effective </span><span style="font-size: 12.8px;">Nov 1</span><span style="font-size: 12.8px;"> it will go up to $499.</span></span><br />
<div style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.8px; line-height: normal; widows: 1;">
<span style="font-family: georgia, serif;"><br /></span></div>
<div style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.8px; line-height: normal; widows: 1;">
<span style="font-family: georgia, serif;">Even better, by taking advantage of this promotion, you'll enter our drawing to win roundtrip airfare (economy class from JFK or IAD) and one night hotel accommodations to our very first Paris Suits and Spooks event next March! <br style="font-size: 12.8px;" /><br style="font-size: 12.8px;" /><span style="font-size: 12.8px;">Your admission to Suits and Spooks DC is 100% refundable prior to </span><span style="font-size: 12.8px;">December 31, 2015</span><span style="font-size: 12.8px;">. It includes:</span></span><br />
<ul><span style="font-family: georgia, serif;">
<li style="margin-left: 15px;"><span style="font-size: 12.8px;">Our Aerospace block which will feature panels from two of the world's largest aerospace and defense companies,</span></li>
<li style="margin-left: 15px;"><span style="font-size: 12.8px;">Our Future Warfare block which will feature a panel of experts debating international law as it relates to cyber warfare,</span></li>
<li style="margin-left: 15px;"><span style="font-size: 12.8px;">Our Critical Infrastructure block that will explore vulnerabilities in transportation, communication, and utilities,</span></li>
<li style="margin-left: 15px;"><span style="font-size: 12.8px;">Our Financial Services block that will look into international investments in cyber security as well as challenges to global bankers.</span></li>
</span></ul>
<span style="font-family: georgia, serif;">
We'll pick the winner in a blind drawing on New Years Day. Airfare and hotel will be prepaid and may not be substituted for cash. If you have already registered for Suits and Spooks DC, your name will automatically be entered for the Paris drawing, but please share this email with any of your peers who you think would be interested.</span></div>
<div style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.8px; line-height: normal; widows: 1;">
<span style="font-family: georgia, serif;"><br /></span></div>
<div style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.8px; line-height: normal; widows: 1;">
<span style="font-family: georgia, serif;">Register now and save $75 on our already low rate, and earn a chance to win a trip to Paris Suits and Spooks in March 2016. </span></div>
<div style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.8px; line-height: normal; widows: 1;">
<span style="font-family: georgia, serif;"><br /></span></div>
<div style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.8px; line-height: normal; text-align: center; widows: 1;">
<span style="font-family: georgia, serif; font-size: medium;"><a href="http://suitsandspooks.com/" style="color: #1155cc;" target="_blank">REGISTER NOW</a></span></div>
<div style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.8px; line-height: normal; widows: 1;">
<span style="font-family: georgia, serif;"><br /></span></div>
<div style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 12.8px; line-height: normal; widows: 1;">
<span style="font-family: georgia, serif;">Good luck everyone!</span></div>
<div>
<span style="font-family: georgia, serif;"><br /></span></div>
</div>
Unknownnoreply@blogger.com0