Archiv: electronic / information technology warfare / espionage / sabotage / centers / commandos („cyber security / defense“ / etc)


14.10.2021 - 11:25 [ theGrayzone.com ]

Behind NATO’s ‘cognitive warfare’: ‘Battle for your brain’ waged by Western militaries

The US-led NATO military cartel has tested novel modes of hybrid warfare against its self-declared adversaries, including economic warfare, cyber warfare, information warfare, and psychological warfare.

Now, NATO is spinning out an entirely new kind of combat it has branded cognitive warfare. Described as the “weaponization of brain sciences,” the new method involves “hacking the individual” by exploiting “the vulnerabilities of the human brain” in order to implement more sophisticated “social engineering.”

05.10.2021 - 00:35 [ Middle East Monitor ]

After NSO Group, warning issued against second Israeli spyware firm

(October 4, 2021)

The July report by Citizen’s Lab and Microsoft found that Candiru had been used to spy on more than 100 human rights activists, regime opponents, journalists and scholars from countries such as Iran, Lebanon, Yemen, UK, Turkey and even Israel.

Revelations about Candiru make it the first time that fingers were being pointed at a second Israeli cyber-surveillance company, which is considered a competitor of the NSO Group. The notorious Israeli firm sparked a global scandal in July following the discovery that as many as 50,000 phones were targeted by its Pegasus spyware.

05.10.2021 - 00:24 [ Haaretz ]

Cellphone Hacking and Millions in Gulf Deals: Inner Workings of Top Secret Israeli Cyberattack Firm Revealed

(Sep. 7, 2020)

NSO’s specialty is hacking smartphones. Up till now, little was known about Candiru. TheMarker has revealed that the firm offers hacking tools used to break into computers and servers, and now, for the first time, has confirmed it also has technology for breaking into mobile devices.

05.10.2021 - 00:20 [ Forbes ]

Meet Candiru — The Mysterious Mercenaries Hacking Apple And Microsoft PCs For Profit

(Oct 3, 2019)

Israel is home to scores of hacker-for-hire businesses, but one of the most clandestine has been Candiru. With no website and few records available, it’s operated largely under the radar.

But now a researcher is claiming the elite Tel Aviv-based firm sold cyber weapons to the government of Uzbekistan, while industry sources tell Forbes the company is hacking both Microsoft Windows and Apple Macs for various nation states.

03.10.2021 - 16:39 [ Haaretz ]

Advanced Spyware From Israel’s Candiru Discovered on Russian, Turkish, Palestinian Computers

Spyware made by the Tel Aviv-based hacking tool company Candiru has been found on several computers in Europe and the Middle East, the cybersecurity company ESET reported.

In their September report, ESET wrote that according to research published by Citizen Lab and the Microsoft Threat Intelligence Center in July about Candiru’s DevilsTongue malware, it is „sold to third parties, which can abuse it to spy on various victims, including human rights defenders, dissidents, journalists, activists and politicians.“

24.09.2021 - 15:10 [ Election Fodder / Twitter ]

What do you make of this? THE CYBER POLYGON EVENT WILL HAPPEN JULY 9TH, 2021 If the drill goes live like Event 201 did, then we may see a massive false flag cyber attack in August / September.

(Jul 4, 2021)

Consider backing up all your data to cold storage

20.09.2021 - 23:32 [ Christiane Amanpour, @CNN Chief International Anchor / Twitter ]

Exclusive: @EU_Commission President @vonderleyen reacts to the AUKUS fallout. “One of our member states has been treated in a way that is not acceptable,” she tells me. “We want to know what happened and why.”

Full interview airs at 7pCET @CNNi
and tonight @PBS
(listings vary).

20.09.2021 - 17:31 [ Institution of Engineering and Technology - theiet.org ]

View from Washington: Aukus looms over AI and quantum

Then, some of the more notable consequences may be for the global research infrastructure, one that had become increasingly freewheeling since the fall of the Berlin Wall.

Some familiar voices are already proclaiming Aukus as evidence of the ‘Brexit dividend’. Never mind the facts that technological collaboration between the three members is already taking place through the Five Eyes intelligence alliance (with New Zealand and Canada, both not part of this agreement);

20.09.2021 - 16:52 [ Economist.com ]

The strategic reverberations of the AUKUS deal will be big and lasting: A profound geopolitical shift is happening

After news of the AUKUS deal emerged, a German official called for “coherence and unity” among Western powers, which he said would require “a lot of effort” to bring about. France has concluded that it will struggle for fair treatment in the face of the reflexes of Anglophone allies to club together (the trilateral deal comes on top of the “Five Eyes” intelligence-sharing alliance that involves the same three countries plus Canada and New Zealand).

20.09.2021 - 16:28 [ theConversation.com ]

Undersea internet cables connect Pacific islands to the world. But geopolitical tension is tugging at the wires

The laying of undersea internet cables has become entwined with geopolitics.

20.09.2021 - 16:01 [ CNN ]

The global internet is powered by vast undersea cables. But they’re vulnerable.

(July 26, 2019)

Clatterbuck, the Seacom CEO, was skeptical about how much use tapping an undersea cable would be, pointing to the huge amounts of data passing through it every second, creating a huge hayfield in which to look for needles.
„If you wanted to spy on people would you put a giant microphone over the US and spy on everyone?“

19.09.2021 - 14:25 [ World Economic Forum ]

This map shows how undersea cables move internet traffic around the world

(24 Nov 2016)

Some worry about more sinister attacks. “Russian submarines and spy ships are aggressively operating near the vital undersea cables that carry almost all global internet communications, raising concerns among some American military and intelligence officials that the Russians might be planning to attack those lines in times of tension or conflict,” explained a recent New York Times piece.

19.09.2021 - 14:13 [ Sydney Morning Herald ]

‘Deep and grave concerns’: French should have seen sub decision coming, PM says

Mr Dutton said the risk of the local power industry or internet banking being shut down by overseas actors was very real, arguing the agreement with Britain and America would boost Australia’s chances to retaliate.

19.09.2021 - 13:44 [ France 24 ]

PM Morrison rejects France’s accusation that Australia lied over cancelled submarine deal

„I think they would have had every reason to know that we had deep and grave concerns that the capability being delivered by the Attack Class submarine was not going to meet our strategic interests and we made very clear that we would be making a decision based on our strategic national interest,“ he told reporters in Sydney.

19.09.2021 - 13:25 [ Liz Truss / Telegraph.co.uk ]

Global Britain is planting its flag on the world stage

But freedoms need to be defended, so we are also building strong security ties around the world. That is why last week the Prime Minister announced, alongside our friends President Biden and Prime Minister Morrison, the creation of a new security partnership called AUKUS.

We will be working closer together to use a wide range of cutting-edge technologies, from nuclear-powered submarines at first and then looking at artificial intelligence and quantum computing.

19.09.2021 - 13:11 [ BBC ]

Aukus: French minister condemns US and Australia ‚lies‘ over security pact

The pact means Australia will become just the seventh nation in the world to operate nuclear-powered submarines. It will also see the allies share cyber capabilities, artificial intelligence and other undersea technologies.

11.09.2021 - 16:47 [ alumni.cornell.edu / web.archive.org ]

SPOTLIGHT ON: BARBARA RIGGS

(Frühjahr / spring 2006)

„Once the first plane hit, we implemented emergency evacuation plans for our field office located in World Trade Center #7. All these individuals were in the process of being evacuated when the second plane hit. While the Secret Service law enforcement personnel assisted NYPD and NYFD evacuate the towers, the administrative staff and temporary personnel were escorted to safety. Secret Service Special Officer Craig Miller was killed while assisting in the evacuation of one of the towers. Later that day, the USSS New York Field Office was lost as World Trade Center #7 collapsed.

Thru monitoring radar and activating an open line with the FAA, the Secret Service was able to receive real time information about other hijacked aircraft. We were tracking two hijacked aircraft as they approached Washington, D.C. and our assumption was that the White House was a target. While the White House was evacuated, the Secret Service prepared to defend the facility.“

11.09.2021 - 16:40 [ Michael C. Ruppert / Weebly.com ]

Crossing the Rubicon

(2004)

It has never been disputed that at all times Cheney was able to communicate with the Pentagon. Nor has it ever been disputed that the Secret Service was always in Cheney’s immediate presence. This is where the entire explanation of who knew what and when offered by the Kean Commission irretrievably falls apart. Below Clarke’s description of the unfolding of a key moment on the morning of 9/11 falls between two time-certain events. We can clearly place the time of this moment atapproximately 9:40 a.m., or one minute before the impact on the Pentagon.

„During the pause [as people in the White House Situation Roompaused to watch President Bush’s first televised remarks at 9:30 a.m.], I noticed that Brian Stafford, Director of the Secret Service, was now in the room. He pulled me aside ….

Stafford slipped me a note. “Radar shows aircraft headed this way.” Secret Service had a system that allowed them to see what FAA’s radar was seeing. “I’m going to empty out the complex.” He was ordering the evacuation of the White House.
Ralph Seigler stuck his head into the room, “There has been an explosion at the Pentagon parking lot, maybe a car bomb.” “

“Secret Service had a system that allowed them to see what FAA’s radar was seeing”?

11.09.2021 - 16:15 [ Federation of American Scientists - fas.org ]

CRITICAL FOUNDATIONS: PROTECTING AMERICA’S INFRASTRUCTURES – The Report of the President’s Commission on Critical Infrastructure Protection

(13.10.1997)

Existing Information Sharing Efforts

(…) We also found a great deal of information sharing already underway. Trade associations, consortia, and other groups exchange information among their members and, in some cases, directly with government. Many federal, state and local government agencies have existing relationships with infrastructure owners and operators. Within all the infrastructure sectors, at least some portions are subject to regulatory control by government agencies, and information is shared, albeit sometimes within carefully defined constraints. Several federal agencies provide information to infrastructure owners and operators. The FBI’s Awareness of National Security Issues and Response (ANSIR) program gives over 25,000 industry members information that provides threat and vulnerability insights. More narrowly focused programs are the Department of Transportation’s terrorist threat notification to the civil aviation industry and the National Security Agency’s INFOSEC Vulnerability Assessment Program, which provides information systems-related data to private sector partners. The Comptroller of the Currency operates another system providing advisories on information integrity and security risks to financial institutions.

(…)

The third and least predictable threat to the infrastructure comes from deliberate attack. Depending on their objectives, attackers may seek to steal, modify, or destroy data stored in information systems or moving over networks, or to degrade the operation of the systems and net-works themselves, denying service to their users. Attackers include national intelligence organizations, information warriors, terrorists, criminals, industrial competitors, hackers, and aggrieved or disloyal insiders. While insiders constitute the single largest known security threat to information and information systems, controlled testing indicates that large numbers of computer based attacks go undetected, and that the unknown component of the threat may exceed the known component by orders of magnitude.

(…)

The air traffic control system of the FAA is based on decades old technology. The replacement system, while doubtless more efficient, will be more vulnerable unless special security measures are incorporated.

(…)

The Commission recommends the Secretary of Transportation:

1) Fully evaluate actual and potential sources of interference to, and vulnerabilities of, GPS before a final decision is reached to eliminate all other radiovnavigation and aircraft landing guidance systems.

2) Sponsor a risk assessment for GPS-based systems used by the civilian sector, projected from now through the year 2010.

3) Base decisions regarding the proper federal navigation systems mix and the final architecture of the NAS on the results of that assessment. The DOT and FAA must develop a better understanding of interference and other vulnerabilities of GPS before a final decision is reached concerning the status of all other radionavigation and landing guidance systems. A federally sponsored thorough, integrated risk assessment would lay a sound foundation for decisions on future courses of action.

The National Airspace System

The Commission recommends the FAA act immediately to develop, establish, fund, and implement a comprehensive National Airspace System Security Program to protect the modernized NAS from information-based and other disruptions, intrusions and attack. Program implementation should be guided by the recommendations found in the Vulnerability Assessment of the NAS Architecture, prepared for the Commission. The Vulnerability Assessment included the following recommendations: (…)

3) The FAA should consider the implementation of full “trusted” hardware and software security capabilities for only the FAA’s most vulnerable future subsystems, since the software cost for embedded applications, together with full audit, tracking, and monitoring, may be too great if applied to all subsystems. Relaxation of the full capabilities, such as less rapid revalidation (e.g., a slower fifteen minutes down time) and less constant vigilance of data integrity, should be considered on a case-by-case basis for less critical subsystems, particularly in situations where existing air traffic control recovery procedures exist.

4) The FAA should conduct a comprehensive investment analysis of NAS INFOSEC in order to determine the degree of security protection that is needed

(…)

Transportation: A critical infrastructure characterized by the physical distribution system critical to supporting the national security and economic well-being of this nation, including the national airspace system, airlines and aircraft, and airports; roads and highways,trucking and personal vehicles; ports and waterways and the vessels operating thereon; mass transit, both rail and bus; pipelines, including natural gas, petroleum, and other hazardous materials; freight and long haul passenger rail; and delivery services.

07.09.2021 - 20:13 [ Haaretz ]

Germany’s ‘FBI’ Bought Israeli NSO’s Spyware Despite Knowledge of Rights Abuses, Report Says

It is unclear, however, what oversight was done on the actual usage and in what context the program was used, if at all.

The report, which is likely to cause a stir in Germany, adds that lawmakers are expected to be briefed about it later this week.

07.09.2021 - 20:05 [ Singapore News Live ]

Germany admits police used controversial Pegasus spyware, Europe News & Top Stories

The German government admitted on Tuesday (Sept 7) that its federal police service used controversial Israeli spyware known as Pegasus, parliamentary sources told AFP, drawing immediate criticism from rights groups.

04.09.2021 - 19:46 [ SecurityMagazine.com ]

Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

(February 6, 2020)

While both offer encryption of DNS data using the same TLS protocol, there are some very important differences:

– Protocol layering: while DoT is essentially DNS over TLS, DoH is in fact DNS over HTTP over TLS.
– Different port numbers: DoT traffic uses a dedicated port 853, and can thus be distinguished at the network layer. DoH uses port 443 (HTTPS) due to the protocol layering.
– Different capabilities: DoT is largely the same DNS as we know it, while DoH to an extent combines features of DNS and HTTP.

04.08.2021 - 08:48 [ Jerusalem Post ]

Bennett taps senior Mossad officer Hulata as national security adviser

(11.06.2021)

Hulata, 45, served as the head of the Mossad’s Department of Strategic and Political Planning and its Technology Department.

28.07.2021 - 12:35 [ Amnesty International ]

Joint open letter by civil society organizations and independent experts calling on states to implement an immediate moratorium on the sale, transfer and use of surveillance technology

The investigation has so far also identified at least 180 journalists in 20 countries who were selected for potential targeting with NSO spyware between 2016 to June 2021. Deeply concerning details that have emerged include evidence that family members of Saudi journalist Jamal Khashoggi were targeted with Pegasus software before and after his murder in Istanbul on 2 October 2018 by Saudi operatives,despite repeated denials from NSO Group that its products were used to target Khashoggi or his family members.

The revelations are only a tip of the iceberg.

27.07.2021 - 07:34 [ Haaretz ]

U.S. Lawmakers Call for Punitive Measures Against Israeli NSO Over Spyware Allegations

Finally, the four House Democrats call to „investigate and assess the possible targeting of American journalists, aid works, diplomats and others’ with NSO Group’s Pegasus spyware, determine whether America’s national security was harmed, and take steps to protect all Americans, including federal employees, from the threat posed by the growing mercenary spyware industry.“

21.07.2021 - 19:10 [ Axios.com ]

Scoop: Israel forms damage control team after NSO Pegasus spyware reports

Israeli Minister of Defense Benny Gantz spoke at the same conference and said Israel was „studying“ reports about the alleged use of the Pegasus software in violation of the terms of its export license.

“We approve the export of cyber products only to governments and only for lawful use in order to prevent crime and terrorism. Countries who purchase those systems must adhere to the conditions of use,“ Gantz said.

20.07.2021 - 19:13 [ Haaretz ]

The Pegasus Project | Where Netanyahu Went, NSO Followed: How Israel Pushed Cyberweapon Sales

Investigation of potential Pegasus targets reveals: From Hungary to India and even Saudi Arabia, this is how Israel became the cyber industry’s patron and pushed spyware sales across the world,

19.07.2021 - 18:07 [ CNBC ]

U.S., NATO and EU to blame China for cyberattack on Microsoft Exchange servers

A new joint effort by NATO members, the European Union, Australia, New Zealand and Japan will call out and confront the threat posed by Chinese state-sponsored cyberattacks.
The nations will share intelligence on cyberthreats and collaborate on network defenses and security, said a senior Biden administration official.
The group will publicly blame China’s Ministry of State Security for a massive cyberattack on Microsoft Exchange email servers earlier this year.

19.07.2021 - 18:02 [ sifi.com ]

‚Israeli spyware firm linked to fake Black Lives Matter, Amnesty websites‘

Using Internet scanning, a team of researchers from the University of Toronto’s Citizen Lab and tech giant Microsoft identified more than 750 websites linked to Candiru’s spyware infrastructure.

„We found many domains masquerading as advocacy organisations such as Amnesty International, the Black Lives Matter movement, as well as media companies and other civil-society themed entities,“ researcher Bill Marczak said in a statement.

19.07.2021 - 17:58 [ Microsoft ]

Fighting cyberweapons built by private businesses

(15.07.2021)

We believe Sourgum is an Israel-based private sector offensive actor or PSOA. Citizen Lab has identified the group as a company called Candiru. Sourgum generally sells cyberweapons that enable its customers, often government agencies around the world, to hack into their targets’ computers, phones, network infrastructure and internet-connected devices. These agencies then choose who to target and run the actual operations themselves.

19.07.2021 - 17:54 [ Reuters ]

Microsoft says Israeli group sold tools to hack Windows

(15.07.2021)

The hacking tool vendor, named Candiru, created and sold a software exploit that can penetrate Windows, one of many intelligence products sold by a secretive industry that finds flaws in common software platforms for their clients, said a report by Citizen Lab.

Technical analysis by security researchers details how Candiru’s hacking tool spread around the globe to numerous unnamed customers, where it was then used to target various civil society organizations, including a Saudi dissident group and a left-leaning Indonesian news outlet, the reports by Citizen Lab and Microsoft show.

19.07.2021 - 06:19 [ Organized Crime and Corruption Reporting Project / Twitter ]

iMessage, WhatsApp, and FaceTime are vulnerable to „zero-click exploits“ — bugs that allow hackers to commandeer a mobile phone even when the target does nothing to trigger the breach. #PegasusProject

19.07.2021 - 06:15 [ Bill Marczak / Twitter ]

(1) @AmnestyTech saw an iOS 14.6 device hacked with a zero-click iMessage exploit to install Pegasus. We at @citizenlab also saw 14.6 device hacked with a zero-click iMessage exploit to install Pegasus. All this indicates that NSO Group can break into the latest iPhones.

19.07.2021 - 04:40 [ Haaretz ]

NSO’s Pegasus: The Israeli Cyber Weapon Oppressive Regimes Used Against 180 Journalists

Forbidden Stories and Amnesty International had access to a leak of more than 50,000 records of phone numbers that NSO clients selected for surveillance. According to an analysis of these records by the group and its partners, more than 180 journalists were selected in 21 countries by at least 12 NSO clients.

10.07.2021 - 18:34 [ Kreml ]

Telephone conversation with US President Joseph Biden

(09.07.2021)

In the context of recent reports on a series of cyberattacks ostensibly made from Russian territory, Vladimir Putin noted that despite Russia’s willingness to curb criminal manifestations in the information space through a concerted effort, no inquiries on these issues have been received from US agencies in the last month. At the same time, considering the scale and seriousness of the challenges in this area, Russia and the US must maintain permanent, professional and non-politicised cooperation. This must be conducted through specialised information exchange channels between the authorised government agencies, through bilateral judicial mechanisms and while observing the provisions of international law.

10.07.2021 - 18:28 [ Weißes Haus ]

Readout of President Joseph R. Biden, Jr. Call with President Vladimir Putin of Russia

(09.07.2021)

President Biden also spoke with President Putin about the ongoing ransomware attacks by criminals based in Russia that have impacted the United States and other countries around the world. President Biden underscored the need for Russia to take action to disrupt ransomware groups operating in Russia and emphasized that he is committed to continued engagement on the broader threat posed by ransomware.

04.07.2021 - 20:54 [ Election Fodder / Twitter ]

What do you make of this? THE CYBER POLYGON EVENT WILL HAPPEN JULY 9TH, 2021 If the drill goes live like Event 201 did, then we may see a massive false flag cyber attack in August / September.

Consider backing up all your data to cold storage

04.07.2021 - 20:36 [ World Economic Forum / Weltwirtschaftsforum ]

Centre for Cybersecurity

Founding Partners:

Accenture, Fortinet, Palo Alto Networks, Salesforce, Saudi Aramco, Sberbank

Governments, International Organizations, Academia and Civil Society:

Carnegie Endowment for International Peace, Europol, FIDO Alliance, Global Cyber Alliance (GCA), International Telecommunications Union (ITU), INTERPOL, Israel National Cyber Directorate (INCD), Oman Information Technology Authority (ITA), Organization of American States (OAS), Republic of Korea National Information Resources Service (NIRS), Saudi Arabia National Cybersecurity Authority, Swiss Reporting and Analysis Centre for Information Assurance (MELANI), University of Oxford, UK National Cyber Security Centre (NCSC)

04.07.2021 - 20:24 [ World Economic Forum / Weltwirtschaftsforum ]

How to vaccinate your organization against a cyber pandemic

(01 Jul 2020)

Everyone interested in these issues can learn more by joining the Cyber Polygon live stream on 8 July, which will feature widely acclaimed experts from international organizations and global technology corporations, among others. The most recent types of threats and the latest cybersecurity trends will be highlighted, as well as best practices in preventing and mitigating the consequences of large-scale attacks.

01.07.2021 - 11:03 [ Haaretz ]

Israeli Charged in Global Hacker-for-hire Scheme Seeks Plea Deal

While the indictment does not identify the hackers by name, five people familiar with the case say that Azari is being charged in relation to New Delhi-based BellTroX InfoTech Services, which Reuters last year reported was behind a hacking campaign that targeted lawyers, government officials, businessmen, investors and activists around the world.

Azari is charged with conspiracy to commit hacking, wire fraud, and aggravated identity theft, court documents show.

01.07.2021 - 10:59 [ thePrint.in ]

Small IT firm in Delhi ran one of world’s ‘largest’ hacker-for-hire services: Reuters expose

(10.06.2021)

Citing an article in The Financial Times, which in turn cites the Citizen Lab report, Muddy Waters Research tweeted that a German payment processing company Wirecard was a client of BellTrox.

15.06.2021 - 17:21 [ Haaretz ]

The Mossad’s International Brigade in Iran

The Mossad uses foreign citizens for its operations in Iran and elsewhere. Israeli and international media outlets have reported this in the past. We can presume these people are well paid. Iranian spokespeople call them “mercenaries.” But when the head of the Mossad himself reveals this, he reinforces the false impression that Israel’s intelligence service, which has a global reputation as one of the best and most professional, is just a gang that acts like an outsourced crime organization.

15.06.2021 - 15:44 [ Cnet ]

IBM now has 18 quantum computers in its fleet of weird machines

(May 6, 2020)

Eighteen quantum computers might not sound like a lot. But given that each one is an unwieldy device chilled within a fraction of a degree above absolute zero and operated by Ph.D. researchers, it’s actually a pretty large fleet. In comparison, Google’s quantum computers lab near Santa Barbara, California, has only five machines, and Honeywell only has six quantum computers.

15.06.2021 - 15:20 [ Weltwirtschaftsforum / World Economic Forum ]

Quantum leap: why the next wave of computers will change the world

(29 Oct 2019)

To break a widely used RSA 2048-bit encryption, a classical computer with one trillion operations per second would need around 300 trillion years. This is such a long time that we all feel very safe.

A quantum computer using Shor’s algorithm could achieve the same feat in just 10 seconds, with a modest 1 million operations per second. That’s the power of quantum computers: 300 trillion years versus 10 seconds.

09.06.2021 - 17:01 [ Duo.com ]

Microsoft Fixes Publicly Known Flaws in Security Update

Overall, Microsoft’s May Patch Tuesday advisory addressed four critical flaws – all of which can allow for remote code execution – as well as 50 important-severity vulnerabilities and one moderate-severity bug.

05.06.2021 - 12:50 [ Wall Street Journal ]

FBI Director Compares Ransomware Challenge to 9/11

(04.06.2021)

Christopher Wray points to Russian hackers, calls for coordinated fight across U.S. society

05.06.2021 - 12:48 [ NBC News ]

‚They are hair on fire‘: Biden administration mulls cyberattacks against Russian hackers

(03.06.2021)

Although using the military to take action against criminals wouldn’t be without precedent, it’s controversial in legal circles, and any American cyber action against targets in Russia would risk retaliation.

16.05.2021 - 05:55 [ Haaretz ]

Israeli Army Deployed a Secret, Strategic Weapon Against Hamas – and Reaped Limited Benefits

The current casualty toll seems modest and a far cry from the numbers that were circulating in Israel about mass deaths in the tunnels. Netanyahu, who initially planned a big press conference, made do with a short and cautiously worded video. But not all his mouthpieces got the message in time: one of them tweeted about the genius maneuver led by him and the IDF chief, but quickly deleted it. Mainstream media took longer to get the message.

28.04.2021 - 23:37 [ Dave deCamp / Antiwar.com ]

Navy SEALs Shifting Focus Away From Counterterrorism to Face Russia and China

The 2018 National Defense Strategy outlined the US military’s shift away from counterterrorism towards so-called ‚great power competition‘

24.03.2021 - 16:51 [ AddictiveTips.com ]

How To Use DNSCrypt To Encrypt DNS Traffic On Linux

DNSCrypt is a local program that, when set up correctly on any Linux PC, can lock up all DNS traffic and ensure everything safely goes to the right place.

Most Linux distributions have DNSCrypt in their software sources, so installing it is a breeze. Open up a terminal and enter the commands that correspond to your Linux distribution.

24.03.2021 - 16:44 [ SimpleDNScrypt.org ]

Simple DNSCrypt

Simple DNSCrypt is a simple management tool to configure dscrypt-proxy on windows based systems.

24.03.2021 - 16:22 [ SecurityMagazine.com ]

Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

(February 6, 2020)

While both offer encryption of DNS data using the same TLS protocol, there are some very important differences:

– Protocol layering: while DoT is essentially DNS over TLS, DoH is in fact DNS over HTTP over TLS.
– Different port numbers: DoT traffic uses a dedicated port 853, and can thus be distinguished at the network layer. DoH uses port 443 (HTTPS) due to the protocol layering.
– Different capabilities: DoT is largely the same DNS as we know it, while DoH to an extent combines features of DNS and HTTP.

17.03.2021 - 01:41 [ theGuardian.com ]

Defence review: UK could use Trident to counter cyber-attack

Britain is prepared to launch nuclear weapons if the country was faced with an exceptionally destructive attack using cyber or other “emerging technologies”, according to the integrated defence review.

The stark statement marks a change from existing UK policy, which had been that Trident missiles could only be launched against another nuclear power, or potentially in response to extreme chemical or biological threats.

03.03.2021 - 13:06 [ macobserver.com ]

5 Encrypted DNS Services to Use on iOS and macOS

Short for Domain Name System, DNS is commonly referred to as the “phone book” of the internet. It helps connect web browsers with web servers by translating addresses like 104.26.0.124 into www.macobserver.com. Here are five encrypted DNS services that I recommend.

There are several different ways to use a DNS server. One is to manually go into network settings on each and configure the Wi-Fi. The second way is to download an app, and the third way is to go into your router settings and configure it there.

03.03.2021 - 12:56 [ SimpleDNScrypt.org ]

Simple DNSCrypt

Simple DNSCrypt is a simple management tool to configure dscrypt-proxy on windows based systems.

03.03.2021 - 12:45 [ addictivetips.com ]

How To Use DNSCrypt To Encrypt DNS Traffic On Linux

DNSCrypt is a local program that, when set up correctly on any Linux PC, can lock up all DNS traffic and ensure everything safely goes to the right place.

Most Linux distributions have DNSCrypt in their software sources, so installing it is a breeze. Open up a terminal and enter the commands that correspond to your Linux distribution.

01.03.2021 - 08:59 [ Haaretz ]

Israeli Cyber Czar Wants Access to Private Firms‘ Computers, Content

Igal Una, who heads the cyber directorate, is promoting the legislation and has the support of Prime Minister Benjamin Netanyahu.

The background to the legislative push is the string of cyberattacks against Israeli companies during the past year.

24.02.2021 - 11:35 [ Yahoo.com ]

SolarWinds, Microsoft, FireEye, CrowdStrike defend actions in major hack – U.S. Senate hearing

Lawmakers started the hearing by criticizing Amazon representatives, who they said were invited to testify and whose servers were used to launch the cyberattack, for declining to attend the hearing.

20.02.2021 - 06:54 [ connect.geant.org ]

Running your own DNS service? There may be changes ahead.

(22.01.2021)

As a consequence of this directive’s quite broad definition of DNS, every organisation or individual running their own DNS will have to comply by registering their DNS service with ENISA, the EU agency for Cyber Security. This applies not only to top level domain DNS, but also to universities, companies of all sizes and ICT-enthusiasts who run their own DNS service at home.

20.02.2021 - 06:20 [ jdsupra.com ]

New EU Cybersecurity Strategy: European Commission Accelerates Push for EU to Lead in Cybersecurity Regulation

(24.12.2020)

Broadening the extra-territorial effect already in place under the current regime, selected providers of digital infrastructure or digital services who do not have a European establishment, but offer services in the EU, will also fall under the scope of the proposed NIS 2 Directive (and, to that end, will have to designate a representative in the EU). This will affect DNS service providers, TLD name registries, cloud computing service providers, data centre service providers and content delivery network providers, as well as providers of online marketplaces, online search engines and social networking services platforms.

20.02.2021 - 06:06 [ ec.europa.eu ]

Proposal for directive on measures for high common level of cybersecurity across the Union

(16.12.2020)

The Commission proposal establishes a basic framework with responsible key actors on coordinated vulnerability disclosure for newly discovered vulnerabilities across the EU and creating an EU registry on that operated by the European Union Agency for Cybersecurity (ENISA).

20.02.2021 - 05:55 [ jdsupra.com ]

Meet the ECCC – the EU’s new cybersecurity competence center

(18.02.2021)

Cybersecurity and cyber-resilience has been an overarching priority of EU financial services policymakers and an area that the European Commission has been seeking to improve for all market participants in the EU’s Single Market. This issue has increased in priority in line with the exponential growth in cyber-incidents and threats, including throughout the COVID-19 pandemic.

18.02.2021 - 15:29 [ SeekingAlpha.com ]

SolarWinds breach launched from within the United States

Neuberger notably said the attack, which compromised „9 federal agencies and about 100 private companies,“ was launched from inside the United States.
SolarWinds shares are down 1.4%. Two security names closely tied to the hack, FireEye (FEYE -3.2%) and CrowdStrike (CRWD -2.5%), are also in the red.

18.02.2021 - 15:28 [ CNN ]

Biden administration says investigation into SolarWinds hack is likely to take „several months“

The US government’s probe into the devastating SolarWinds breach is likely to take „several months“ at least, according to the top White House cybersecurity official, speaking to reporters Wednesday in the Biden administration’s first public assessment of the gravity of the suspected Russian spying campaign.

30.01.2021 - 16:01 [ SimpleDNScrypt.org ]

Simple DNSCrypt

Simple DNSCrypt is a simple management tool to configure dscrypt-proxy on windows based systems.

30.01.2021 - 16:00 [ addictivetips.com ]

How To Use DNSCrypt To Encrypt DNS Traffic On Linux

DNSCrypt is a local program that, when set up correctly on any Linux PC, can lock up all DNS traffic and ensure everything safely goes to the right place.

Most Linux distributions have DNSCrypt in their software sources, so installing it is a breeze. Open up a terminal and enter the commands that correspond to your Linux distribution.

26.01.2021 - 17:17 [ globalriskinsights.com ]

UK Government Announces New National Cyber Force

(21.01.2021)

The four organisations will collaborate under one unified command for the first time. The Ministry of Defence’s official tagline for the NCF is, “A Defence and Intelligence Partnership”, to emphasize the fact that there is no other organization like it anywhere else on the globe, to date.

18.01.2021 - 16:09 [ addictivetips.com ]

How To Use DNSCrypt To Encrypt DNS Traffic On Linux

DNSCrypt is a local program that, when set up correctly on any Linux PC, can lock up all DNS traffic and ensure everything safely goes to the right place.

Most Linux distributions have DNSCrypt in their software sources, so installing it is a breeze. Open up a terminal and enter the commands that correspond to your Linux distribution.

18.01.2021 - 16:00 [ SimpleDNScrypt.org ]

Simple DNSCrypt

Simple DNSCrypt is a simple management tool to configure dscrypt-proxy on windows based systems.

18.01.2021 - 15:50 [ DNSprivacy.org ]

DoT servers

Oct 2020: The list below has been updated to retain only those servers that appear to still be actively maintained

18.01.2021 - 15:47 [ securitymagazine.com ]

Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

(06.02.2020)

Obviously, time will tell if DoT continues to prevail or whether DoH will start to gain ground. As mentioned at the beginning of the article there is a hot debate going on right now about the direction the Internet industry should take. Suffice to say that even nation state authorities are involved in the debate, which speaks to the level and importance of the discussion.

18.01.2021 - 15:41 [ ZDNET.com ]

NSA warns against using DoH inside enterprise networks

The NSA urges companies to host their own DoH resolvers and avoid sending DNS traffic to third-parties.

18.01.2021 - 15:40 [ National Security Agency / Pentagon ]

Adopting Encrypted DNS in Enterprise Environments

Use of the Internet relies on translating domain names (like “nsa.gov”) to Internet Protocoladdresses. This is the job of the Domain Name System (DNS). In the past, DNS lookups were generally unencrypted, since they have to be handled by the network to direct traffic to the right locations. DNSover Hypertext Transfer Protocol over Transport Layer Security (HTTPS), often referred to as DNS over HTTPS (DoH), encrypts DNS requests by using HTTPS to provide privacy, integrity, and “last mile” source authenticationwith a client’s DNS resolver. Itis useful to prevent eavesdropping and manipulationof DNStraffic.While DoH can help protectthe privacy of DNS requests and the integrity of responses, enterprises that use DoH will lose some of the control needed to govern DNS usage within their networksunless they allow only their chosen DoH resolver to be used.Enterprise DNS controlscan prevent numerous threat techniques used by cyber threat actors for initial access, command and control, and exfiltration.

04.01.2021 - 17:59 [ Wikispooks.com ]

Document:Senior spy appointed to lead UK’s joint biosecurity centre

(05.06.2020)

Clare Gardiner, head of cyber resilience and strategy at the UK National Cyber Security Centre — a branch of signals intelligence agency GCHQ — will become the centre’s first director-general, responsible for advising ministers on the “alert level” for the virus; which is similar to assessing the terror threat.

Ms Gardiner’s role at the NCSC involves advising businesses and public organisations on how to improve their cyber defences, and she will return to this post after her secondment at the centre. But her research background in epidemiology and medical statistics make her well-suited to the role, according to one person familiar with her appointment.

She will report to Dido Harding, who is in charge of the NHS test and trace service.

The decision to put a security official in charge is likely to cause consternation among public health experts, who have questioned whether the template of a terror analysis centre is appropriate for managing a viral pandemic,

04.01.2021 - 17:48 [ Nick Eardley / Twitter ]

NEW: Sources have told the BBC the Covid threat level – decided by the Joint Biosecurity Centre, which includes the UK’s four Chief Medical Officers – is being moved up to 5, the highest level. This is different from tiers

03.01.2021 - 09:50 [ Haaretz ]

From FireEye to Israel: Cyber Emergency Response Chief Warns ‘Everyone’s a Target‘

Though every country has some form of a CERT, the Israeli model, the directorate claims, is unique because not only does it offer help to private firms facing cyberattacks, it has units for different sectors – finance, energy, public security and government.

It also operates what it calls a “proactive” research center that seeks out vulnerabilities before they’re exploited and even has a hotline where anyone can call in to report a cyberattack.

03.01.2021 - 09:45 [ Haaretz ]

A Shady Israeli Intel Genius, His Cyber-spy Van and Million-dollar Deals

(31.12.2020)

Aliada, according to the suit, is a group of cyberweapon companies whose products are branded under the name Intellexa. In May 2019, it added, the group recruited Eran Beck, a former head of the Military Intelligence’s cyber department, as its director of development.

28.12.2020 - 11:47 [ Cyberscoop.com ]

ACLU sues FBI for information about its encryption-cracking skills

The FBI must be more transparent about its ability to break into people’s mobile devices, the American Civil Liberties Union says, and the group is suing for information about what the feds have in their toolkit.

The ACLU says the bureau should come clean about what its Electronic Device Analysis Unit (EDAU) is using “to unlock and decrypt information that is otherwise securely stored on cell phones.”

28.12.2020 - 11:45 [ theIntercept.com ]

Powerful Mobile Phone Surveillance Tool Operates in Obscurity Across the Country

(22.12.2020)

Until now, the Bartonville, Texas, company Hawk Analytics and its product CellHawk have largely escaped public scrutiny. CellHawk has been in wide use by law enforcement, helping police departments, the FBI, and private investigators around the United States convert information collected by cellular providers into maps of people’s locations, movements, and relationships. Police records obtained by The Intercept reveal a troublingly powerful surveillance tool operated in obscurity, with scant oversight.

28.12.2020 - 10:51 [ Caitlin Johnson ]

Secret, Invisible Evidence Of Russian Hacking Is Not Actually Evidence

Imagine if I really was claiming that the Chinese government is arming Antifa ninja warriors to kill patriotic Americans in the coming Biden Wars. How crazy would you have to be to believe what I was saying without my providing hard, verifiable evidence for my claims?

Now imagine further that this is something I’ve made false claims about many times in the past. If every few years I make a new claim about some naughty government arming Antifa super soldiers in a great communist uprising, which turns out later to have been bogus.

27.12.2020 - 06:35 [ Washington Post ]

How the Iowa caucuses came ‘crashing down,’ under the watchful eye of the DNC

(Feb. 16, 2020)

The DNC ordered and paid for a security audit of the software, which was completed by NCC Group, a Britain-based cybersecurity firm. Out of the review, which also involved threat assessment conducted with the national party as well as officials in Iowa and Nevada, came directions to guard the name of the vendor, and to take the software live as late as possible to prevent it from getting into the hands of hackers, according to multiple people who participated or had knowledge of the exercises.

27.12.2020 - 06:14 [ KCRG.com ]

County party chair thinks internal audit was too kind to Iowa Democratic Party

(Dec. 16, 2020)

After the caucus, the IDP hired a pair of Democratic lawyers: Nick Klinefeldt, who was a federal attorney appointed by President Barack Obama, and former Iowa Attorney General Bonnie Campbell. They were tasked with identifying and determining the cause of problems that occurred during the 2020 Iowa Caucuses, with the results of their investigation being released to the public on Saturday morning.

27.12.2020 - 06:10 [ Politico.com ]

Iowa autopsy report: DNC meddling led to caucus debacle

(12.12.2020)

The audit states the conversion tool had coding errors that spit out inaccurate numbers and caused confusion about the accuracy of the results, eventually leading to delays in reporting. But the state party’s app never malfunctioned nor was hacked, the report concludes.

27.12.2020 - 06:04 [ theIntercept.com ]

Investigator: DNC Was “Directly Involved” in Iowa Caucus App Development, Countering DNC Denial

(22.12.2020)

The DNC’s meddling, which included a last-minute demand that developers of the Shadow app create a special software that would allow the DNC real-time access to the raw numbers before they went public, didn’t sit well with Zogby.

“Why would [the DNC] need to see that?” Zogby said about the DNC’s insistence on access to the raw caucus results before they went public. “Why wouldn’t you trust the state party to make the determination?”

In the transcript from the closed-session meeting held by the state party, members suggested that the DNC’s goal was to strip Iowa of its prestigious first-in-the-nation status.

20.12.2020 - 09:30 [ theHill.com ]

Congress barrels toward veto clash with Trump

Trump’s threat to veto the National Defense Authorization Act (NDAA) could scramble Congress’s year-end schedule; lawmakers had been hoping to leave town once they pass a forthcoming deal to fund the government and provide year-end coronavirus relief.

But leaders are warning that if Trump vetoes the bill they are prepared to return to Washington to vote on trying to override.

19.12.2020 - 21:22 [ CNBC ]

Trump contradicts Pompeo, plays down alleged Russian role in cyberattack

Trump’s comments in the form of Twitter posts on Saturday went against comments his secretary of state made less than 24 hours earlier.
SolarWinds, the company at the center of the attack, has not yet blamed any one country.

19.12.2020 - 12:27 [ federalnewsnetwork.com ]

SolarWinds breach raises stakes for NDAA Trump still threatens to veto

Sen. Angus King (I-Maine) said the breach makes a clear case for the work of the Cyberspace Solarium Commission and the cyber provisions that made it into the annual defense policy bill passed by the House and Senate.

“This is the most important bill on cyber ever passed by Congress, and that’s why I’m really hoping that the president will either sign the bill or let it become law without a signature, because there is so much critically important material in the bill,” King said during an annual summit hosted by Defense One.

19.12.2020 - 12:24 [ Cyberspace Solarium Commission ]

Cyberspace Solarium Commission

The Cyberspace Solarium Commission (CSC) was established in the John S. McCain National Defense Authorization Act for Fiscal Year 2019 to „develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.“ The finished report was presented to the public on March 11, 2020.

Our Report

The Cyberspace Solarium Commission’s proposes a strategy of layered cyber deterrence. Our report consists of over 80 recommendations to implement the strategy. These recommendations are organized into 6 pillars:

– Reform the U.S. Government’s Structure and Organization for Cyberspace.

– Strengthen Norms and Non-Military Tools.

– Promote National Resilience.

Reshape the Cyber Ecosystem.

Operationalize Cybersecurity Collaboration with the Private Sector.

– Preserve and Employ the Military Instrument of National Power.

19.12.2020 - 10:35 [ CNN ]

Congressional backers cite cybersecurity provisions as they push Trump to sign defense bill

The massive defense bill that President Donald Trump is threatening to veto contains provisions for increased cybersecurity, which has taken on significantly more importance in the wake of a massive cyberattack on federal agencies at the hands of suspected Russian hackers.

The National Defense Authorization Act includes pay raises for America’s soldiers, modernizations for equipment and provisions to require more scrutiny before troops are withdrawn from Germany or Afghanistan.

19.12.2020 - 09:24 [ Fox News ]

After government hack, media mum on ex-cybersecurity chief highlighted for contradicting Trump’s fraud claims

„As I said in a news briefing, Election Day was ‘just another Tuesday on the Internet,’“ he wrote. „Normal sorts of scanning and probing were happening, but we did not see any successful attacks or damaging disruptions.“

Yet hackers were arms deep in a slew of federal agencies. The infiltration, believed to have been conducted by the Russians, appears to have compromised the Departments of Energy, State, Defense, Homeland Security, Treasury and Commerce. His name did not appear in CNN’s story about CISA and the hack published Thursday.

18.12.2020 - 21:38 [ geekwire.com ]

Microsoft unleashes ‘Death Star’ on SolarWinds hackers in extraordinary response to breach

In the end, this all reminds us how much power Microsoft has at its disposal. Between its control of the Windows operating system, its robust legal team, and its position in the industry, it has the power to change the world nearly overnight if it wants to. And when it chooses to train that power on an adversary, it really is the equivalent of the Death Star: able to completely destroy a planet in a single blast.

18.12.2020 - 21:36 [ domainnamewire.com ]

Domain name sinkholes and those funky domain registrations

(September 2018)

A sinkhole redirects or blocks traffic meant for a destination. They are used by the security community to stop botnet traffic, phishing and other bad activity.

There are many ways to create a sinkhole. An ISP can simply divert traffic from the IP address nameserver you see in Whois to another. A company (or the government) can also go through the courts to get control of a domain name and then change its nameservers.

18.12.2020 - 21:28 [ ZDNet.com ]

Microsoft and industry partners seize key domain used in SolarWinds hack

(15.12.2020)

According to analysis from security firm FireEye, the C&C domain would reply with a DNS response that contained a CNAME field with information on another domain from where the SUNBURST malware would obtain further instructions and additional payloads to execute on an infected company’s network.

18.12.2020 - 19:33 [ bleepingcomputer.com ]

FBI, CISA officially confirm US govt hacks after SolarWinds breach

(17.12.2020)

The compromise of multiple US federal networks following the SolarWinds breach was officially confirmed for the first time in a joint statement released earlier today by the FBI, DHS-CISA, and the Office of the Director of National Intelligence (ODNI).

„Over the course of the past several days, the FBI, CISA, and ODNI have become aware of a significant and ongoing cybersecurity campaign,“ the US intelligence agencies said …

18.12.2020 - 19:18 [ Forbes ]

DHS, DOJ And DOD Are All Customers Of SolarWinds Orion, The Source Of The Huge US Government Hack

Though it’s not clear whether it uses the Orion tool, the DHS’s own Cybersecurity and Infrastructure Security Agency (CISA) is a SolarWinds customer too, buying $45,000-worth of licenses in 2019. The U.S. Cyber Command also spent over $12,000 on SolarWinds tools in the same year.

SolarWinds, a publicly-listed Austin, Texas-based company with a value of over $6 billion, has its own customer list, though it doesn’t break down which products clients use. That list includes more than 425 of the Fortune 500, all major US telecoms providers, the top five U.S. accounting firms, hundreds of global universities, the NSA and the White House.

18.12.2020 - 19:09 [ SolarWinds.com ]

FAQ: Security Advisory

(18.12.2020)

In this case, it appears that the code was intended to be used in a targeted way as its exploitation requires manual intervention. We’ve been advised that the nature of this attack indicates that it may have been conducted by an outside nation state, but SolarWinds has not verified the identity of the attacker.

18.12.2020 - 18:43 [ theHill.com ]

Lawmakers ask whether massive hack amounted to act of war

Hackers believed to be part of a nation state have had access to federal networks since March after exploiting a vulnerability in updates to IT group SolarWinds’s Orion software. The hack has compromised the Treasury, State and Homeland Security departments and branches of the Pentagon, though it is expected to get worse. SolarWinds counts many more federal agencies as customers, along with the majority of U.S. Fortune 500 companies.

05.12.2020 - 15:15 [ Telegraph.co.uk ]

Of all the reporters Moscow’s spies could have chosen, why did they pretend to be me?

Somebody had decided to impersonate me. It would be two and a half years before I would learn that my identity had been stolen for a very sinister purpose, most likely by a Russian military intelligence officer and cyber criminal called Anatoliy Sergeyevich Kovalev (but we’ll get to him later).

05.12.2020 - 15:10 [ theGuardian.com ]

Chinese official’s ‚repugnant‘ tweet of Australia soldier likely amplified by fake accounts, experts say

Cyabra, an Israeli cybersecurity firm, said it was highly probable that an orchestrated campaign had promoted Zhao’s tweet.

Cyabra said it had found 57.5% of accounts that engaged with Zhao’s tweet were fake, and “evidence of a largely orchestrated disinformation campaign” to amplify its message. The firm did not give any details about who was behind the campaign.

Cyabra said it analysed 1,344 profiles and found a large number were created in November and used once, to retweet Zhao’s tweet.

29.11.2020 - 17:17 [ DailyMail.co.uk ]

As Iran puts executed nuclear chief’s body on display, how he was taken out: Power to the entire region was cut as gun and bomb attack blasted convoy before he was dragged from car and finished off… then the 12 assassins melted away

The gunmen with the hit squad opened fire on the cars, and an intense gunfight ensued, according to Sepah Cybery, a social media channel affiliated with the Islamic Revolutionary Guards Corps.

Ahwaze tweeted: ‚According to Iranian leaks, the leader of the assassination team took Fakhrizadeh out of his car and shot him and made sure he was killed.‘

The hit squad then vanished, having sustained no losses to their team, Ahwaze reported.

19.11.2020 - 17:58 [ DailyMail.co.uk ]

Boris Johnson vows to make UK the ‚foremost naval power in Europe‘ with £24bn MOD budget boost as No10 is forced to insist extra cash is not an attempt to impress Joe Biden and defence minister admits he ‚doesn’t know‘ where money is coming from

However, there are major question marks over how the additional spending will be paid for while Downing Street has also been forced to deny that the new money for the military is simply an attempt to impress US President-elect Joe Biden.

There is growing speculation that some of the money could come from the foreign aid budget, with Chancellor Rishi Sunak due to set out the Government’s one-year Spending Review next week.

19.11.2020 - 17:52 [ ITV.com ]

UK to set up ‚RAF Space Command capable of launching first rocket‘

The UK is setting up „RAF Space Command“, a wing of the Armed Forces which will be capable of launching Britain’s first rocket as early as 2022, the prime minister has announced.

Boris Johnson said a military investment of £16.5 billion will also fund the development of Artificial Intelligence and a National Cyber Force aimed at targeting terrorism, organised crime and hostile state activity.

13.11.2020 - 20:47 [ International Telecommunication Union / Internationale Fernmeldeunion ]

The ITU 2020 Global CyberDrill, September-November 2020

– Regional D​ialogues, 15 to 24 September 2020
– Webinar Sessions, 6 October to 24 November 2020
– Training Sessions, 13 October to 19 November 2020
– Scenario Based Exe​rcises​, 27 October to 5 November 2020​

13.11.2020 - 19:55 [ Bloomberg ]

Expensive, Glitchy Voting Machines Expose 2020 Hacking Risks

(November 8, 2019)

Cybersecurity experts are baffled by local election officials choosing the computerized voting machines. “It’s a mystery to me,” said Rich DeMillo, a Georgia Tech computer science professor and former Hewlett-Packard chief technology officer. “Does someone have 8 x 10 glossies? No one has been able to figure out the behavior of elections officials. It’s like they all drink the same Kool-Aid.”

13.11.2020 - 15:44 [ arstechnica.com ]

Crooks have acquired proprietary Diebold software to “jackpot” ATMs

(20.07.2020)

In previous jackpotting attacks, the attached devices, known in the industry as black boxes, usually invoked programming interfaces contained in the ATM operating system to funnel commands that ultimately reached the hardware component that dispenses cash. More recently, Diebold Nixdorf has observed a spate of black box attacks that incorporated parts of the company’s proprietary software.

13.11.2020 - 12:41 [ Lou Dobbs / Twitter ]

Dominion Voting Systems: Toronto based @dominionvoting was rejected by Texas Secretary of State in 2019 for major flaws in their software. Why was it used this election in 6 battleground states and 22 others?

#MAGA #AmericaFirst #Dobbs

13.11.2020 - 12:30 [ NYBooks.com ]

Who Owns Our Voting Machines?

(November 2020)

These “black boxes” have required both election officials and the public to take on faith that the machines are programmed to capture voter intent, not subvert it. When researchers have attempted to examine the computer code, they have been threatened with lawsuits by the election vendors. (…)

These include machines that can be reprogrammed remotely or in person by surreptitiously (and easily) inserting fraudulent media cards or thumb drives, as researchers have shown over and over again.

Meanwhile, despite claims to the contrary by election vendors, it’s been demonstrated that ballot scanners in precincts in the swing states of Wisconsin, Michigan, and Florida use wireless modems that connect to the Internet. (…)

These vulnerabilities—and others—inject doubt into the public’s perception of election integrity. That doubt is compounded by the fact that the three major election vendors in the United States—Election Systems and Software, Hart InterCivic, and Dominion—are owned by private equity. Together, they account for about 80 percent of all election equipment used in the United States.

23.09.2020 - 12:09 [ Wired ]

Army Yanks ‚Voice-To-Skull Devices‘ Site

(09.05.2009)

The Army’s very strange webpage on „Voice-to-Skull“ weapons has been removed. It was strange it was there, and it’s even stranger it’s gone.

23.09.2020 - 12:06 [ US Army / Federation of American Scientists ]

voice to skull devices

Nonlethal weapon which includes (1) a neuro-electromagnetic device which uses microwave transmission of sound into the skull of persons or animals by way of pulse-modulated microwave radiation; and (2) a silent sound device which can transmit sound into the skull of person or animals. NOTE: The sound modulation may be voice or audio subliminal messages. One application of V2K is use as an electronic scarecrow to frighten birds in the vicinity of airports.

23.09.2020 - 05:00 [ NCSC / Twitter ]

Foreign actors & cybercriminals likely to spread disinfo on 2020 election results, per @FBI , @CISAgov . They could create new websites, change existing ones, create or share social media content to spread false info to discredit process.

23.09.2020 - 04:38 [ International Telecommunication Union ]

The ITU 2020 Global CyberDrill, September-November 2020

The main objectives of this CyberDrill are as follows:

– Provide situational awareness to key public and private sector participants who lead their firms, organizations, or jurisdictions during a cyber disruption;- Bring the CERT/CIRT/CSIRT community together in a unified exercise to build global response and recovery capabilities;
– Test operational resiliency key concepts across CSIRT/CIRT/CERT community;
– Identify, exercise, and foster the improvement of processes, procedures, interactions and information sharing mechanisms that exist or should exist among CERTs/CSIRTs, SOCs, agencies, public bodies, and across regional organizations responsible for crisis management and regulatory bodies;
– Exercise coordination mechanisms, information sharing efforts, the development of shared situation awareness, and decision-making procedures of the cybersecurity community during cyber events; and,
– Raise awareness of other cyber exercise initiatives.​

23.09.2020 - 04:30 [ Nigerian Army Resource Centre / Twitter ]

Happening now at the Nigerian Army Resource Centre is CYBER drill by Organization Of Islamic Conference and Computer Emergency Response Team ( OIC CERT) . The Drill is aimed at intimating the ICT Department of the Center on the need to be Cyber security conscious.

23.09.2020 - 04:30 [ Oman News Center / Youtube ]

The Sultanate hosts the 8th Arab Regional & OIC-CERT Cyber Drill

The Sultanate hosts the 8th Arab Regional & OIC-CERT Cyber Drill
Report: Saleh bin Khalfan Al RahbiThe Sultanate hosts the 8th Arab Regional & OIC-CERT Cyber Drill
´

23.09.2020 - 04:16 [ mcit.gov.eg ]

Egypt Partakes in ITU 2020 Global CyberDrill- Arab Regional Dialogue

Egypt, represented by the Egyptian Computer Emergency Response Team (EG-CERT), is participating in the “CyberDrill 2020 – Arab Region Regional Dialogue: CIRTs and lessons learned from COVID-19 crisis,” organized by the International Telecommunication Union (ITU), online, on September 22.

The Global CyberDrill is a capacity building event which aims to enhance the communication and incident response capabilities of participating teams and promote collective efforts by national Computer Incident Response Teams (CIRTs) and Computer Security Incident Response Teams (CSIRTs).

11.09.2020 - 14:42 [ alumni.cornell.edu / web.archive.org ]

SPOTLIGHT ON: BARBARA RIGGS

(Frühjahr / spring 2006)

„Once the first plane hit, we implemented emergency evacuation plans for our field office located in World Trade Center #7. All these individuals were in the process of being evacuated when the second plane hit. While the Secret Service law enforcement personnel assisted NYPD and NYFD evacuate the towers, the administrative staff and temporary personnel were escorted to safety. Secret Service Special Officer Craig Miller was killed while assisting in the evacuation of one of the towers. Later that day, the USSS New York Field Office was lost as World Trade Center #7 collapsed.

Thru monitoring radar and activating an open line with the FAA, the Secret Service was able to receive real time information about other hijacked aircraft. We were tracking two hijacked aircraft as they approached Washington, D.C. and our assumption was that the White House was a target. While the White House was evacuated, the Secret Service prepared to defend the facility.“

11.09.2020 - 14:33 [ Michael C. Ruppert / Weebly.com ]

Crossing the Rubicon

(2004)

It has never been disputed that at all times Cheney was able to communicate with the Pentagon. Nor has it ever been disputed that the Secret Service was always in Cheney’s immediate presence. This is where the entire explanation of who knew what and when offered by the Kean Commission irretrievably falls apart. Below Clarke’s description of the unfolding of a key moment on the morning of 9/11 falls between two time-certain events. We can clearly place the time of this moment atapproximately 9:40 a.m., or one minute before the impact on the Pentagon.

„During the pause [as people in the White House Situation Roompaused to watch President Bush’s first televised remarks at 9:30 a.m.], I noticed that Brian Stafford, Director of the Secret Service, was now in the room. He pulled me aside ….

Stafford slipped me a note. “Radar shows aircraft headed this way.” Secret Service had a system that allowed them to see what FAA’s radar was seeing. “I’m going to empty out the complex.” He was ordering the evacuation of the White House.
Ralph Seigler stuck his head into the room, “There has been an explosion at the Pentagon parking lot, maybe a car bomb.” “

“Secret Service had a system that allowed them to see what FAA’s radar was seeing”?

11.09.2020 - 13:34 [ Federation of American Scientists - fas.org ]

CRITICAL FOUNDATIONS: PROTECTING AMERICA’S INFRASTRUCTURES – The Report of the President’s Commission on Critical Infrastructure Protection

(13.10.1997)

Existing Information Sharing Efforts

(…) We also found a great deal of information sharing already underway. Trade associations, consortia, and other groups exchange information among their members and, in some cases, directly with government. Many federal, state and local government agencies have existing relationships with infrastructure owners and operators. Within all the infrastructure sectors, at least some portions are subject to regulatory control by government agencies, and information is shared, albeit sometimes within carefully defined constraints. Several federal agencies provide information to infrastructure owners and operators. The FBI’s Awareness of National Security Issues and Response (ANSIR) program gives over 25,000 industry members information that provides threat and vulnerability insights. More narrowly focused programs are the Department of Transportation’s terrorist threat notification to the civil aviation industry and the National Security Agency’s INFOSEC Vulnerability Assessment Program, which provides information systems-related data to private sector partners. The Comptroller of the Currency operates another system providing advisories on information integrity and security risks to financial institutions.

(…)

The third and least predictable threat to the infrastructure comes from deliberate attack. Depending on their objectives, attackers may seek to steal, modify, or destroy data stored in information systems or moving over networks, or to degrade the operation of the systems and net-works themselves, denying service to their users. Attackers include national intelligence organizations, information warriors, terrorists, criminals, industrial competitors, hackers, and aggrieved or disloyal insiders. While insiders constitute the single largest known security threat to information and information systems, controlled testing indicates that large numbers of computer based attacks go undetected, and that the unknown component of the threat may exceed the known component by orders of magnitude.

(…)

The air traffic control system of the FAA is based on decades old technology. The replacement system, while doubtless more efficient, will be more vulnerable unless special security measures are incorporated.

(…)

The Commission recommends the Secretary of Transportation:

1) Fully evaluate actual and potential sources of interference to, and vulnerabilities of, GPS before a final decision is reached to eliminate all other radiovnavigation and aircraft landing guidance systems.

2) Sponsor a risk assessment for GPS-based systems used by the civilian sector, projected from now through the year 2010.

3) Base decisions regarding the proper federal navigation systems mix and the final architecture of the NAS on the results of that assessment. The DOT and FAA must develop a better understanding of interference and other vulnerabilities of GPS before a final decision is reached concerning the status of all other radionavigation and landing guidance systems. A federally sponsored thorough, integrated risk assessment would lay a sound foundation for decisions on future courses of action.

The National Airspace System

The Commission recommends the FAA act immediately to develop, establish, fund, and implement a comprehensive National Airspace System Security Program to protect the modernized NAS from information-based and other disruptions, intrusions and attack. Program implementation should be guided by the recommendations found in the Vulnerability Assessment of the NAS Architecture, prepared for the Commission. The Vulnerability Assessment included the following recommendations: (…)

3) The FAA should consider the implementation of full “trusted” hardware and software security capabilities for only the FAA’s most vulnerable future subsystems, since the software cost for embedded applications, together with full audit, tracking, and monitoring, may be too great if applied to all subsystems. Relaxation of the full capabilities, such as less rapid revalidation (e.g., a slower fifteen minutes down time) and less constant vigilance of data integrity, should be considered on a case-by-case basis for less critical subsystems, particularly in situations where existing air traffic control recovery procedures exist.

4) The FAA should conduct a comprehensive investment analysis of NAS INFOSEC in order to determine the degree of security protection that is needed

(…)

Transportation: A critical infrastructure characterized by the physical distribution system critical to supporting the national security and economic well-being of this nation, including the national airspace system, airlines and aircraft, and airports; roads and highways,trucking and personal vehicles; ports and waterways and the vessels operating thereon; mass transit, both rail and bus; pipelines, including natural gas, petroleum, and other hazardous materials; freight and long haul passenger rail; and delivery services.

03.09.2020 - 20:53 [ Haaretz ]

Cellphone Hacking and Millions in Gulf Deals: Inner Workings of Top Secret Israeli Cyberattack Firm Revealed

NSO’s specialty is hacking smartphones. Up till now, little was known about Candiru. TheMarker has revealed that the firm offers hacking tools used to break into computers and servers, and now, for the first time, has confirmed it also has technology for breaking into mobile devices.

According to a document signed by an unnamed vice president for Candiru, they also offer a “high-end cyber intelligence platform dedicated to infiltrate PC computers, networks, mobile handsets, by using explosions and disseminations operations.“

03.09.2020 - 06:45 [ Informationsstelle Militarisierung (IMI) ]

Gegen das digitale Wettrüsten: Rede beim Antikriegstag 2020 in Tübingen

Liebe Freundinnen und Freunde,

wir wissen mittlerweile, dass auch Forschung im Cyber Valley von den US-Geheimdiensten finanziert wird. Zwei Tübinger Unternehmen wurden dabei als „verbundene Startups“ angegeben, nach öffentlicher Berichterstattung aber schnell von der Homepage genommen. Dort findet sich aber bis heute das Startup eines ehemaligen MPI-Forschers, der nun in den USA am selben IARPA-Forschungsprojekt beteiligt ist, wie seine ehemaligen Kolleginnen am Max-Planck-Institut für biologische Kybernetik. Dieses Startup implementiert mit Anschubfinanzierung des Pentagons Software für Datenverarbeitung auf Servern von Amazon Web Services.

27.08.2020 - 23:16 [ Mint Press ]

Cyber Command Gets New Surveillance Powers Under Guise of Battling Election Meddling

Domestically, the potential targeting of American citizens as foreign actors or agents was moved forward by Bill Barr’s Justice Department in June, in response to the Minneapolis riots, Barr released a statement naming “Antifa and other similar groups” as possible targets of its 56 regional FBI Joint Terrorism Task Forces (JTTF) offices. In the same statement the top prosecutor invoked the National Guard, which would be “deployed on the streets to reestablish law and order” if necessary.

17.07.2020 - 09:52 [ Max Blumenthal / Twitter ]

The CIA can now target/attack media outfits, charities, etc based on paranoid suspicion of ties to designated enemies and little to no hard evidence. Presumably this means US-based organizations are fair game as well.

17.07.2020 - 09:50 [ Yahoo.com ]

Exclusive: Secret Trump order gives CIA more powers to launch cyberattacks

The secret authorization, known as a presidential finding, gives the spy agency more freedom in both the kinds of operations it conducts and who it targets, undoing many restrictions that had been in place under prior administrations. The finding allows the CIA to more easily authorize its own covert cyber operations, rather than requiring the agency to get approval from the White House.

16.07.2020 - 10:49 [ theHill.com ]

Twitter accounts of Obama, Biden, Musk and others compromised

The attack is likely the largest ever on Twitter’s security system and may have already cost users ten of thousands of dollars.

The accounts – which included other tech CEO’s including Amazon’s Jeff Bezos, celebrities such as Kanye West, and other political figures like former New York City Mayor Michael Bloomberg – posted similar messages offering to double bitcoin payments sent to an address during a set period of time.

11.07.2020 - 16:38 [ New York Times ]

Long-Planned and Bigger Than Thought: Strike on Iran’s Nuclear Program

In addition, some American and Israeli officials, and international security analysts, say that Iran may believe that President Trump will lose the November election and that his presumptive Democratic rival, Joseph R. Biden Jr., will want to resurrect some form of the negotiated settlement that the Obama administration reached with Tehran five years ago next week.

11.07.2020 - 16:33 [ Haaretz ]

Israel, U.S Developing Shared Strategy to Harm Iran’s Nuclear Facilities, Officials Tell NYT

The Times also said that U.S. Secretary of State Mike Pompeo maintains a close relationship with Mossad chief Yossi Cohen, making it unlikely that Pompeo was unaware of the plan to attack the Natanz nuclear facility – if it was indeed an Israeli-engineered operation.

04.07.2020 - 06:00 [ ORF ]

Reformpläne: Tanner will Cyberdefence aufrüsten

Im Fokus stünden nun Cyberangriffe, Katastrophen, Pandemien und Migrationskrisen.

19.06.2020 - 11:16 [ ABC.net.au ]

‚Cyber attacks‘ point to China’s spy agency, Ministry of State Security, as Huawei payback, say former Australian officials

In August 2018, the Australian Government banned Huawei and other companies from involvement in Australia’s 5G network.

The ABC spoke to two former Australian officials who confirmed that the Huawei ban sparked the malicious cyber campaign. Both spoke on condition of anonymity given the sensitive nature of the story.

10.06.2020 - 13:23 [ Cracked.com ]

5 Realities About The World’s Scariest Police Department

(19.06.2017)

5. The NYPD Now Has Offices All Over The World

Through the International Liaison Program, NYPD detectives are now stationed in 13 cities around the globe, from Paris to Amman to Sydney. If you’re surprised that New York City would have flatfoots permanently operating on the majority of Earth’s continents, you aren’t alone. When bombs went off in Bali in 2005, Indonesian police were understandably „astonished and irritated that the NYPD showed up.“

10.06.2020 - 12:39 [ Salon.com ]

Nine terrifying facts about America’s biggest police force

(28.09.2012)

When asked for details at a press conference, Mayor Bloomberg basically told reporters to fuck off, saying, „The NYPD has lots of capabilities that you don’t know about and you won’t know about.“

The New York Times has reported that the department’s Harbor unit has 6 submarine drones; four cost $75,000 and the two others cost $120,000, according to the Times. They are developing a portable radar that can see under clothes in order to search for weapons. Militaristic „Hercules teams,“ are deployed to random parts of the city armed with automatic weapons and body armor. Their explicitly stated role is to terrify people.

10.06.2020 - 11:49 [ NYPD - nyc.gov ]

NYPD: Intelligence and Counterterrorism

The Deputy Commissioner oversees both the Intelligence Bureau, which is responsible for intelligence collection and analysis; and the NYPD’s Counterterrorism Bureau operations, including the partnership with the FBI/NYPD Joint Terrorism Task Force, the first and largest of its kind in the nation.

New York City is home to more than 8 million people and hosts over 58 million visitors from all over the world annually. The Intelligence and Counterterrorism Bureaus provide some of the most highly trained and best equipped officers to patrol the city, collect and analyze data, and collaborate with partner agencies.

10.06.2020 - 11:41 [ NYPD - nyc.gov ]

NYPD: Counterterrorism

The CT Bureau reviews possible terrorist targets and develops innovative, forward-thinking policies and procedures to guard against attacks, training first responders and specialized units and developing intelligence capabilities for detecting and preventing terrorist attacks. The bureau coordinates with federal, state, and other law enforcement agencies in intelligence gathering and sharing, and plays an integral role in the FBI’s Joint Terrorist Task Force.

Critical Response Command (CRC) is one of the Department’s first lines of defense against a terrorist-related attack. A permanent cadre of hand-selected police officers devoted to counterterrorism, CRC members are trained to respond swiftly, with sufficient expertise and force, to the most highly organized and heavily armed attacks. All CRC team members are trained in special weapons and long-range guns, explosive trace detection, radiological and nuclear awareness, biological and chemical weapons awareness, and are equipped with the skills to detect an impending attack and utilize the best possible response to an emerging situation. The team conducts daily counterterrorism deployments to critical infrastructure sites throughout New York City, saturating strategic locations with a uniform presence to disrupt and deter terrorist planning and hostile surveillance operations.

(…)

Domain Awareness System (DAS) is a powerful counterterrorism and policing tool jointly developed and built by the NYPD and Microsoft. As a central platform, DAS is used to aggregate data from internal and external closed-circuit television cameras, license plate readers, and environmental sensors, as well as 911 calls and other NYPD databases. DAS uses an interactive dashboard interface to display real-time alerts whenever a 911 call is received or a sensor is triggered.

10.06.2020 - 11:22 [ NYPD - nyc.gov ]

NYPD: Information Technology

The Information Technology Bureau (ITB) plays an integral role in establishing the NYPD as one of the leading counterterrorism and crime-fighting forces in the nation, developing and implementing cutting-edge technology to support strategies, programs, and procedures that promote safety, efficiency, and effectiveness.

The bureau provides the department with state-of-the-art technological support, building a leading IT and telecommunications infrastructure. ITB comprises six divisions, each with its own specialized directive, which report directly to the Deputy Commissioner, Information Technology. The six divisions are:

25.05.2020 - 15:29 [ New York Times ]

By Air and Sea, Mercenaries Landed in Libya. But the Plan Went South.

The abortive mercenary expedition last summer was organized and financed by a network of secretive companies in the United Arab Emirates, according to a confidential report submitted to the United Nations Security Council in February. The companies are controlled or part-owned by Christiaan Durrant, an Australian businessman and former fighter pilot who is a close associate of Erik Prince, America’s most famous mercenary entrepreneur.

25.05.2020 - 15:12 [ Bloomberg ]

Western Team Went to Help Moscow’s Man in Libya, UN Finds

Opus and Lancaster 6 financed and directed an operation to provide Haftar’s forces with helicopters, drones and cyber capabilities through a complex web of shell companies, according to two diplomats who briefed Bloomberg on the contents of the UN Panel of Experts report shared with the Security Council’s sanctions committee in February. The diplomats also shared excerpts of the report with Bloomberg.

19.05.2020 - 18:10 [ i24News.tv ]

Report: Suspected Israeli cyberattack wreaks havoc at Iranian port

US officials believe that Israel was behind a „highly accurate“ recent cyberattack targeting Iran’s largest cargo port, the Washington Post reported Monday, adding that the attack caused way more damage than Tehran acknowledged.

On May 9, Iran’s Shahid Rajaee port supposedly came under a sustained cyberattack.

16.05.2020 - 23:40 [ Informationsstelle Miitarisierung (IMI) ]

Cyber Valley, MPI und US-Geheimdienste

Ein militärisch-forschungsindustrieller Komplex?

03.05.2020 - 23:44 [ The Hill ]

Military at the polls in the election? Only as a last resort in this country

What is their role? What cybersecurity expertise does the National Guard have that cannot be provided by civilians? What kind of access is the National Guard given to voter registration and voting systems in order to assist states and the Homeland Security Department?

27.04.2020 - 11:23 [ Haaretz ]

Israeli Government Is Invading Our Privacy Under the Guise of Battling Coronavirus

Two weeks ago, the council had already discussed the possibility of a popular revolt and how the government could prevent an uprising against the authorities. Among other things, it considered how the state “could forestall dangers that could lead to widespread social unrest” that might spark protests against the government and state institutions.

It turns out that soldiers and officers from one of Military Intelligence’s classified intelligence gathering units gathered data and analyzed it for the task force that the National Security Council appointed for this purpose.

01.04.2020 - 09:40 [ Haaretz ]

Too Big a Brother

Under the cover of the spreading coronavirus, the government is deepening its invasion of the lives of this country’s citizens. Defense Minister Naftali Bennett continues to use his temporary authority in order to promote plans that run roughshod over the right to privacy, while demolishing the distinction, so vital in a democracy, between the army and civil society.

01.04.2020 - 09:21 [ Kopenhagen Post ]

Denmark wary of foreign powers during pandemic

In co-operation with other Nordic intelligence services, the defence minister, Trine Bramsen, has warned that foreign powers are willing to use to the coronavirus crisis to cause damage to Denmark.

In an interview with Jyllands-Posten newspaper, Bramsen said that the pandemic makes Denmark more vulnerable, and there are already examples of negative-impact campaigns being aimed at the Danes.

30.03.2020 - 17:31 [ BBC ]

MI5: Ken McCallum appointed new boss

Currently deputy director general, he has worked there for nearly 25 years, a statement said. He succeeds Sir Andrew Parker, who retires in April after seven years.

23.03.2020 - 08:49 [ Pentagon ]

Northcom Commander Calls for 21st Century Tools to Defeat Current Threats

(11.03.2020)

The command will continue to partner with the U.S. defense and commercial industries a „to transform rapidly evolving scientific information into leading-edge digital age technology,“ he said.

The command is building a SHIELD — the Strategic Home and Integrated Ecosystem for Layered Defense — to defend the homeland.

„Our layered defense needs to establish awareness in all domains; from below the oceans to the highest levels of space, including the unseen cyber domain, which are all at risk,“ he said.

19.03.2020 - 07:31 [ Haaretz ]

LISTEN: Will Israel’s Cyber Spies Let Bibi Use Coronavirus to Kill Democracy?

Israel, paralyzed by the global COVID-19 crisis and by permanent political crisis, has passed a series of worrying measures to stem the spread of the virus. LISTEN FREE.

12.03.2020 - 15:09 [ Fiorella Isabel / Twitter ]

In case we didn’t see this look at these numbers. And the time stamp. This is reminiscent of 2016. If they can do this without any sort of accountability, guess what? They’ll keep doing it. It’s long been time to call for recounts and investigations. #ElectionIntegrity

Note also how at the bottom they go from 1,344,469 vote totals to 1,072,844. Which is obviously not possible. @MichiganDems you’ve been exposed.

12.03.2020 - 13:41 [ New York Times ]

Trial of Programmer Accused in C.I.A. Leak Ends in Hung Jury

Prosecutors were careful to avoid details about specific operations. During cross-examination, Ms. Shroff asked one C.I.A. witness: “Do you recall a time when the C.I.A. covertly tried to read Angela Merkel’s emails?” referring to the German chancellor.

The government objected, and the judge stopped the witness from answering.

16.02.2020 - 15:12 [ theIntercept.com ]

Mike Bloomberg in 2014: “We Should Hope” the NSA Is “Reading Every Email”

“Look, if you don’t want it to be in the public domain, don’t take that picture, don’t write it down. In this day and age, you’ve got to be pretty naive to believe that the NSA isn’t listening to everything and reading every email,” Bloomberg said. “And incidentally, given how dangerous the world is, we should hope they are, because this is really serious, what’s going on in the world.”

16.02.2020 - 14:14 [ John Panzer, Silicon Valley & California native / Twitter ]

“The DNC ordered and paid for a security audit of the software, which was completed by NCC Group, a Britain-based cybersecurity firm.

Out of the review, which also involved threat assessment conducted with the national party as well as officials in Iowa… … and Nevada, came directions to guard the name of the vendor, and to take the software live as late as possible to prevent it from getting into the hands of hackers, according to multiple people who participated or had knowledge of the exercises.”

16.02.2020 - 14:09 [ Washington Post ]

How the Iowa caucuses came ‘crashing down,’ under the watchful eye of the DNC

The DNC ordered and paid for a security audit of the software, which was completed by NCC Group, a Britain-based cybersecurity firm. Out of the review, which also involved threat assessment conducted with the national party as well as officials in Iowa and Nevada, came directions to guard the name of the vendor, and to take the software live as late as possible to prevent it from getting into the hands of hackers, according to multiple people who participated or had knowledge of the exercises.

11.02.2020 - 15:19 [ Washington Post ]

‘The intelligence coup of the century’: For decades, the CIA read the encrypted communications of allies and adversaries.

For more than half a century, governments all over the world trusted a single company to keep the communications of their spies, soldiers and diplomats secret.

The company, Crypto AG, got its first break with a contract to build code-making machines for U.S. troops during World War II. Flush with cash, it became a dominant maker of encryption devices for decades, navigating waves of technology from mechanical gears to electronic circuits and, finally, silicon chips and software.

05.02.2020 - 10:23 [ PJmedia.com ]

Hoo Boy: Hillary’s Campaign Manager Was Involved With That Disastrous Iowa Caucus App

As everyone knows by now, the Iowa caucuses on Monday were an unmitigated disaster, thanks to an app that malfunctioned, as the Iowa Democratic Party tells it. As it turns out, Robby Mook, Hillary’s 2016 campaign manager, was tasked with vetting the app that resulted in… well… no results on Monday night. You can’t make this stuff up.

04.02.2020 - 14:46 [ Marc Brammer / Twitter ]

The Democratic chair for Iowa, Troy Price, should resign immediately.

04.02.2020 - 14:26 [ Wikipedia ]

Troy Price

Troy Price is an American political strategist and LGBT rights advocate who has served as the Chair of the Iowa Democratic Party since his election in July 2017. Price worked in the administration of Iowa Governor Chet Culver, and later served as a press aide for Tom Vilsack.[2] Price served as Iowa Director for the Barack Obama 2012 presidential campaignand the Hillary Clinton 2016 presidential campaign.[3]

04.02.2020 - 14:23 [ Des Moines Register ]

Unprecedented cybersecurity measures being taken to safeguard Iowa caucus results

(03.02.2020)

Both parties in Iowa and their app and web development vendors partnered last fall with Harvard’s Defending Digital Democracy Project to develop strategies and systems to protect results and deal with any misinformation that’s reported on caucus night.

They worked with campaign experts Robby Mook and Matt Rhodes — as well as experts in cybersecurity, national security, technology and election administration — and simulated the different ways that things could go wrong on caucus night.

Mook, 2016 campaign manager for Hillary Clinton, and Rhodes, Mitt Romney’s 2012 campaign manager, helped develop a public-service video to alert campaigns to the warning signs of hacking and misinformation.

04.02.2020 - 14:22 [ NPR.org ]

Despite Election Security Fears, Iowa Caucuses Will Use New Smartphone App

(14.01.2020)

Iowa’s Democrats hope the new app lets the party get results out to the public quicker, says Troy Price, the chairman of the state party.

In an interview, Price declined to provide more details about which company or companies designed the app, or about what specific measures have been put in place to guarantee the system’s security.

But security is a priority, he says.

23.01.2020 - 10:24 [ Consortium News ]

Consortium News Sends Libel Notices to Canadian Signals Intelligence Agency and Major Television Network

Consortium News has sent libel notices to the Communications Security Establishment (CSE), Canada’s version of the U.S. National Security Agency, and to a major Canadian television network, Global News, for a report that said Consortium News was “part of a cyber-influence campaign directed by Russia.”

Based on a CSE leak of a secret document, Global News’ website said in a Dec. 10, 2019 article entitled, “‘Canadian eyes only’ intelligence reports say Canadian leaders attacked in cyber campaigns,” that Consortium News led this campaign.

20.01.2020 - 02:14 [ Fox 35 Orlando ]

Military exercise to jam some GPS signals in Florida

The Federal Aviation Authority (FAA) says that some GPS signals in Florida over the next few days will be jammed during military training exercises.

08.01.2020 - 12:52 [ Haaretz ]

How Israel Covers Up Corruption by Its Spies, Soldiers and Arms Dealers

Israel’s security apparatus and its over-collaborative judiciary would do well to look up, then commit to memory, the words of U.S. Supreme Court justice Louis Brandeis: „Publicity is justly commended as a remedy for social and industrial diseases. Sunlight is said to be the best of disinfectants.“

05.12.2019 - 05:49 [ Tagesschau ]

Ende des NATO-Gipfels: „Ein sehr erfolgreiches Treffen“

Erstmals wird in der Londoner Erklärung auch die aufstrebende Militärmacht China als zwar nicht aktuelle, aber mögliche neue Bedrohung erwähnt. Dies war US-Präsident Donald Trump mit Blick auf den Ausbau der Mobilfunknetze 5G wichtig.

04.12.2019 - 14:37 [ devdiscourse.com ]

Don’t take peace for granted, British PM Johnson tells NATO leaders

„History shows that peace cannot be taken for granted and even as we celebrate this anniversary we must ensure our deeds match our words,“ Johnson said. „We must never shy away from discussing new realities, particularly NATO’s response to emerging threats like hybrid warfare and disruptive technologies including space and cyber,“ he said.

22.11.2019 - 01:07 [ German Foreign Policy ]

Digitales Schlachtfeld (I)

Die Bundesregierung investiert mehr als eine Milliarde Euro in die Aufrüstung der deutschen Streitkräfte für die digitale Kriegführung. Der Löwenanteil in Höhe von 700 Millionen Euro fließt an die Bundeswehr-Informationstechnikgesellschaft BWI.

31.10.2019 - 21:05 [ Anadolu Agency ]

NATO tests electronic defenses in naval exercise

„The 6-day Naval Electro Magnetic Operations — or “NEMO” — trials will test how allied navies can defend themselves against anti-ship cruise and hypersonic missiles using state-of-the-art electronic defences,“ NATO said in a statement.

20.08.2019 - 18:22 [ Haaretz ]

Mysterious Israeli Businessman Behind Mega-deal to Supply Spy Planes to UAE

The fact that there are no diplomatic ties between Israel and the UAE and other Persian Gulf countries has not prevented the shared interests of the countries in the region to forge an extensive unofficial relationship, including in business, military and political spheres. In the case of Israel and the Gulf states, one main shared interest is their mutual enemy: Iran.

20.08.2019 - 18:18 [ Middle East Monitor ]

Israel businessman behind UAE spy plane deal

However, as Haaretz points out, “it is interesting to discover that Israel’s name is totally absent from the hundreds of thousands of words describing the transaction in detail. The only mention of the country is in one document originating in Switzerland that describes the structure of AGT. It mentions in German that Kochavi is an Israeli citizen.”

The Israeli daily also notes that this deal is not Kochavi’s first project on behalf of the UAE, pointing to the installation of thousands of cameras, sensors and license-plate readers in Abu Dhabi in a bid to turn the capital into a “smart city”.

12.07.2019 - 19:04 [ Bundesministerium des Innern, für Bau und Heimat ]

Zweitstandort der Bundesbehörde BSI entsteht in Freital

Das BSI in Freital wird darüber hinaus aber künftig auch Ausgangspunkt für eine enge Kooperation im Bereich der Cyberermittlungen werden. Sachsens Cybercrime Competence Center am Landeskriminalamt, wie auch andere Sicherheitsbehörden werden davon zusätzlich profitieren.“

02.07.2019 - 16:22 [ MDR ]

Neue Cyberagentur entsteht am Flughafen Leipzig/Halle

Die endgültige Absichtserklärung soll am Mittwoch am Flughafen Leipzig/Halle verkündet werden. Neben den Ministerpräsidenten von Sachsen-Anhalt, Reiner Haseloff, und von Sachsen, Michael Kretschmer, werden die Verteidigungsministerin Ursula von der Leyen und Bundesminister des Inneren, Horst Seehofer, dabei sein.

29.06.2019 - 19:14 [ Wikipedia ]

People’s Liberation Army Strategic Support Force

The People’s Liberation Army Strategic Support Force (PLASSF or SSF ; Chinese: 中国人民解放军战略支援部队) is the cyber-, space-, and electronic-warfare service branch of China’s People’s Liberation Army.[2][3] It was established in December 2015 as part of the first wave of the People’s Republic of China military reform.

28.06.2019 - 01:11 [ German Foreign Policy ]

Offensive Cyber-Kräfte

Ebenso wie die Unterscheidung zwischen defensiven und offensiven Maßnahmen der digitalen Kriegführung ist die Unterscheidung zwischen militärischen und zivilen „Cyber-Fähigkeiten“ für die deutsche Staatsführung offenbar längst obsolet. So heißt es bereits in der „Cyber-Sicherheitsstrategie“ der Bundesregierung aus dem Jahr 2016: „Die Verteidigungsfähigkeiten der Bundeswehr im Cyber-Raum sind … wesentlicher Teil der Cyber-Sicherheitsarchitektur. Sowohl die inhaltliche Übereinstimmung bei der technischen Umsetzung von Schutzmaßnahmen als auch die Nutzung und Mitgestaltung von Strukturen, Prozessen und Meldewesen der Cyber-Abwehr … zeigen die enge Abhängigkeit.“

24.06.2019 - 16:19 [ German Foreign Policy ]

Cyberkrieg am Golf

Während in Mittelost der erste umfassende Cyberkrieg zu entbrennen droht, sucht die Bundesregierung die Voraussetzungen für eigene Cyberangriffe zu schaffen. Im Mai wurde berichtet, Berlin werde schon bald nach der Europawahl die Legalisierung sogenannter Hackbacks in die Wege leiten; dabei handelt es sich um Cyberattacken auf Stellen im Ausland, denen vorgeworfen wird, ihrerseits Onlineüberfälle auf deutsche Ziele durchgeführt zu haben.[7] Kurz zuvor hatte der Abteilungsleiter Cyber- und Informationssicherheit im Bundesinnenministerium, Andreas Könen, verlangt, „im äußersten Fall“ müsse „zur Abwehr“ von Cyberattacken auch die „Abschaltung von Angreifersystemen“ möglich sein – und zwar „durch aktive Cyberabwehrmaßnahmen“.[8] Mit dem Begriff „aktive Abwehr“ werden gewöhnlich „Hackbacks“ umschrieben. Könen stellte seine Forderung explizit in einen Zusammenhang mit „militärischen“ Szenarien

23.06.2019 - 13:02 [ CNN ]

The Guardian says it was warned of cyber attacks by Saudi Arabia

(20.06.2019)

The Guardian says that it was warned earlier this year about efforts by a cybersecurity unit in Saudi Arabia to „hack“ its computer networks.
The British newspaper published an article on Wednesday that says it was alerted by a source in Riyadh that it was being targeted by the unit following the murder of journalist Jamal Khashoggi.

23.06.2019 - 12:52 [ Middle East Monitor ]

Saudi Arabia buys $300m spyware from Israel

(20.06.2019)

The sources stressed that the Saudi intelligence services have sought to obtain advanced spyware in order to trace the Kingdom’s citizens – both in the country and abroad – amidst increasing criticism of the Saudi royal family.

Saudi Arabia therefore reached out to the Israeli market and struck a deal worth $300m with representatives of Israeli firms, the sources said, adding that both sides met and reached the deal in UK capital London.

16.06.2019 - 13:47 [ Express.co.uk ]

Tensions erupt as US launch cyber attack on Russia but officials don’t tell Trump

The New York Times, the US has increased the number of cyber attacks on Russia’s grid. Moreover, two administration officials had told the newspaper that Donald Trump had not been briefed on the attacks.
Pentagon officials have also described the “broad hesitation” to tell Trump about the details of the operations against Russia.

16.06.2019 - 13:36 [ New York Times ]

U.S. Escalates Online Attacks on Russia’s Power Grid

(15.06.2019)

But in a public appearance on Tuesday, President Trump’s national security adviser, John R. Bolton, said the United States was now taking a broader view of potential digital targets as part of an effort “to say to Russia, or anybody else that’s engaged in cyberoperations against us, ‘You will pay a price.’”

Power grids have been a low-intensity battleground for years.

16.06.2019 - 13:31 [ Wall Street Journal ]

Bolton Says U.S. Is Expanding Offensive Cyber Operations

(11.06.2019)

The U.S. intends to expand offensive operations in cyberspace to counter digital economic espionage and other commercial hacks, White House national security adviser John Bolton said Tuesday, while also dismissing talk of a split with President Trump on North Korea and other hot spots.

23.05.2019 - 01:57 [ German Foreign Policy ]

Deutschland hackt zurück

Als vor rund zehn Jahren, so heißt es weiter, zum ersten Mal über Hackbacks diskutiert worden sei, da habe man in einem internen Vermerk noch lesen können: Die „völkerrechtliche Zulässigkeit grenzüberschreitender Abwehrmaßnahmen ist zweifelhaft“. Inzwischen seien derlei Sorgen bei der Bundesregierung in den Hintergrund getreten. Dabei habe eine Überprüfung gezeigt, „dass der deutsche Weg einer ausdrücklichen gesetzlichen Ermächtigung“ zu Hackbacks im Ausland „weltweit ziemlich einzigartig wäre“.

27.04.2019 - 19:08 [ Zero Hedge ]

Widespread Blackouts Strike Fort Bragg During Cyber-Attack Drill

And then, by the afternoon, the fort’s Facebook page published a meme that says „Don’t Worry It’s Just A..“MILITARY EXERCISE.““

04.04.2019 - 16:36 [ Sueddeutsche.de ]

Befugnisse des BND sollen ausgeweitet werden

Bislang durfte der BND nicht viel bezahlen. Die Vorgabe lautete, dass der Lohn für V-Leute („angebahnte und geführte Personen“ im BND-Jargon) nie so hoch sein durfte, dass er den größten Teil des Einkommens ausmacht. Der Grund: Wenn die Existenz eines Menschen davon abhängt, dass er dem Dienst immer wieder interessante Dinge zu erzählen weiß, dann wächst die Versuchung, irgendwann auch Geschichten zu erfinden. Das war eine Lehre aus dem NSU-Debakel. Nun soll diese Vorgabe gelockert werden. Der BND soll frei sein zu bezahlen, was er möchte.

04.04.2019 - 16:35 [ Ronen Steinke ‏/ Twitter ]

Der BND soll neue Befugnisse bekommen, für den Einsatz auch im Inland: Handys von Deutschen ausspähen, V-Leute vor der Staatsanwaltschaft schützen und der Polizei beispringen bei Onlinedurchsuchungen. Meine Analyse des Gesetzentwurfs ⁦@SZ⁩

04.04.2019 - 14:50 [ Netzpolitik.org ]

Doxing, Darknet, Datenlöschung: Neues IT-Sicherheitsgesetz soll ein Rundumschlag sein

Mit dem Gesetz reagiert das Innenministerium auch auf den Doxing-Vorfall aus dem Januar. Ein 20-Jähriger veröffentlichte damals eine große Menge persönlicher Daten über Politiker und Prominente. Die Empörung war groß, manche sprachen von einem „Angriff auf die Demokratie“ und forderten Konsequenzen bis hin zum Hack-Back – um die Daten auf Servern aus der Ferne löschen zu können.

(…)

Fast am Ende des Entwurfs behandelt das Innenministerium ein weiteres Thema: Wenn jemand verdächtigt wird, eine schwere Straftat oder eine Straftat „mittels Telekommunikation“ begangen zu haben, sollen Behörden dessen Accounts übernehmen können.

01.04.2019 - 06:21 [ Washington Post ]

An Israeli tech firm is selling spy software to dictators, betraying the country’s ideals

(5.12.2018)

Saudi dissident Omar Abdulaziz, who lives in Canada, has filed a lawsuit against an Israeli technology company called the NSO Group accusing it of providing the Saudi government with the surveillance software to spy on him and his friends — including Jamal Khashoggi. The program, known as Pegasus, not only allows the monitoring of all communications from a phone — all texts, all emails, all phone calls — but can also hijack a mobile phone’s microphone and camera to turn it into a surveillance device.

30.03.2019 - 09:12 [ theRegister.co.uk ]

Someone’s spreading an MBR-trashing copy of the Christchurch killer’s ‚manifesto‘ – and we’re OK with this, maybe?

Hacktivists are spreading booby-trapped copies of the New Zealand mass shooter’s Islamophobic rantings, in what is being described as an online „vigilante“ operation.

Security house Blue Hexagon claims it discovered a version of the killer’s manifesto doing the rounds online containing Windows malware that, when executed with the necessary privileges, reboots the system and leaves the user staring at an anti-racist message.

27.03.2019 - 02:40 [ Metro.co.uk ]

Petition to revoke Article 50 rejected after hitting 5,750,000 signatures

The Government has rejected a petition calling for Brexit to be stopped, which has gathered more than 5.75 million signatures.

27.03.2019 - 02:39 [ BBC ]

Why bots probably aren’t gaming the ‚Cancel Brexit‘ petition

The BBC spoke to three cyber-security experts about how likely it is that a number of the 3m signatures gathered so far are not genuine.

They all agreed that the petition’s email validation process would be a deterrent.

24.03.2019 - 09:51 [ New York Times ]

A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments

Before NSO helped the Saudi government track its adversaries outside the kingdom, and helped the Mexican government hunt drug kingpins, and earned hundreds of millions of dollars working for dozens of countries on six continents, the company consisted of two high school friends in northern Israel with one relatively mundane idea.

Using technology developed by graduates of Intelligence Unit 8200 — Israel’s equivalent of the N.S.A.— Shalev Hulio and Omri Lavie started a company in 2008 that allowed cellphone firms to gain remote access to their customers’ devices to perform maintenance.

Word spread to Western spy services, whose operatives spotted an opportunity.

23.03.2019 - 07:24 [ Guido Fawkes ]

‘Revoke Article 50’ Petition Creator Threatened May, Discussed How to Buy “Legal” Guns and Take Them to Commons

Remainers and Leavers alike have been getting a little too excited about the Revoke Article 50 Petition. Yes, you can sign it as many times as you like with made up email addresses and whatever name and country you care to put in. Yes, there are videos online explaining in detail how to use bots to hijack Parliamentary petitions – exactly what happened with the second referendum petition immediately after the referendum. Is it actually going to stop Brexit? No, that will be MPs…

23.03.2019 - 07:17 [ @NorthropGrumma1 / Twitter ]

Replying to @philiphaggis @JuliaHB1: Oh rite So just make millions of email addresses Simple

23.03.2019 - 07:11 [ Metro.co.uk ]

Is the revoke Article 50 petition being hijacked by bots? Unlikely, say experts

Over three million people have signed the petition to revoke Article 50 and cancel Brexit. But are they all real?

In recent years, automated programs known as bots have come to be used for artificially inflating Instagram follower counts, mining bitcoin or swaying online polls.

09.03.2019 - 11:56 [ Marco Rubio, US Senator ‏/ Twitter ]

Tonight the “Baghdad Bob” of #Caracas @jorgerpsuv revealed I caused the nationwide & ongoing electric power outage in #Venezuela. My apologies to people of Venezuela. I must have pressed the wrong thing on the “electronic attack” app I downloaded from Apple. My bad.

(7.3.2019)

09.03.2019 - 11:42 [ telesur ]

Venezuela Denounces US Participation in Electric Sabotage

(8.3.2019) They attacked the automated control of the Guri system that supplies the country with energy, Rodríguez said in his speech. This information was handled by US Senator Marco Rubio shortly after the aggression was executed as he let it be known on his Twitter posts.

‚How did Marco Rubio know that backup generators had failed? At that time, no one knew that,‘ the Bolivarian government official asked.

09.03.2019 - 11:37 [ Marco Rubio, US Senator ‏/ Twitter ]

ALERT: Reports of a complete power outage all across #Venezuela at this moment. 18 of 23 states & the capital district are currently facing complete blackouts. Main airport also without power & backup generators have failed. #MaduroRegime is a complete disaster.

(7.3.2019)

09.03.2019 - 11:34 [ Brad Cabana ‏/ Twitter ]

Venezuela makes an interesting case that Marco Rubio, US Senator, knew backup generators at the main power plant malfunctioned just minutes after the power went out. They claim only perpetuators could know that.. #Venezuela #cdnpoli #politics @UN

03.02.2019 - 00:54 [ Naval Today ]

NATO’s SNMG1 readies for exercise Dynamic Guard

Hosted by Norway, Dynamic Guard is a multi-national exercise, merged with Norwegian led exercise TG 19-1 and aimed at maintaining proficiency in maritime electronic warfare and anti-ship missile defense… SNMG1 is composed of the US flagship guided-missile destroyer USS Gravely (DDG107), the German Navy replenishment tanker FGS Spessart (A1442), and the Polish guided-missile frigate ORP General Kazmierz Pulaski (FrR 272).

28.01.2019 - 23:09 [ Trend.az ]

Investment in Israeli cyber exceeds $1 bln for first time in 2018

The country’s 450 active cybersecurity companies raised a total of $1.19 billion last year, constituting a 47% increase since 2017 and a fourth consecutive record-breaking year of investments. Since 2014, the sector has witnessed a five-fold increase in investments.

07.01.2019 - 16:48 [ Fefes Blog ]

Oh ach gucke mal! Der Datenreichtum ist ein toller Vorwand, um ein „Cyber-Abwehrzentrum plus“ aufzubauen, d.h. der offensiven Security noch mehr Geld zuzuschustern.

Denn die hat uns ja so richtig nachhaltig beschützt, diese ganze offensive Security!1!! Da muss man doch mehr Geld hin versenken!!1!

07.01.2019 - 06:17 [ Daniel Neun / Twitter ]

Markus Beckedahl (@netzpolitik), ZDF 19 Uhr, 06.01.2018, zur Datenaffäre (#Hackerangriff): „Hier ist der Staat gefragt mehr Geld zu investieren, die richtigen Programme zu starten“ (…unaussprechliche Flüche)

07.01.2019 - 05:32 [ tagesschau.de ]

Nach Cyberangriff: Wohnungsdurchsuchung in Heilbronn

Beamte des Bundeskriminalamtes (BKA) haben am Sonntag morgen die Wohnräume und den Hausmüll eines Mannes in Heilbronn durchsucht und technische Geräte beschlagnahmt. Dies bestätigten Sicherheitskreise dem ARD-Politikmagazin Kontraste und dem rbb-Inforadio.

Wie Kontraste erfuhr, handelt es sich bei dem Mann um den 19jährigen Jan Schürlein.

07.01.2019 - 05:30 [ Jan Schürlein ‏/ Twittter ]

Hier hat Nullr0uter (0rbit) die Vernichtung seines Computers angekündigt. Da so viele immer noch nach Belegen für meine Infos oder Aussagen fragen, hier mal einer. Behörden haben sich inzwischen auch gemeldet, keine weiteren Details dazu. #Hackerangriff #0rbit

(vor sieben Stunden)

07.01.2019 - 05:28 [ Jan Schürlein ‏/ Twitter ]

Viele fragen sich warum man den Behörden nicht „hilft“. Ich habe in den letzten Jahren nur negative Erfahrungen mit den Behörden gemacht und bisher hat es von Behördenseite aus auch absolut keiner für nötig gehalten mich, @dieserTomasz o.ä auch nur ansatzweise zu kontaktieren.

(5.1.2018)

07.01.2019 - 05:26 [ presseportal.de ]

NOZ: Daten-Angriff auf Politiker: Sondersitzung Innenausschuss voraussichtlich am Donnerstag

(4.1.2018) Nach dem Daten-Angriff auf Politiker soll sich der Innenausschuss des Bundestages voraussichtlich am kommenden Donnerstag (10. Januar) mit dem Thema befassen. Das Bundestags-Büro der Ausschuss-Vorsitzenden Andrea Lindholz (CSU) teilte am Freitag auf Anfrage der „Neuen Osnabrücker Zeitung“ mit, dass dieser Termin mit einer Sitzung um die Mittagszeit angedacht sei. Bei der Sondersitzung mit Vertretern von Sicherheitsbehörden werde es darum gehen, „nähere Informationen aus erster Hand über den Ermittlungsstand zu bekommen“. Nach Angaben der Vorsitzenden haben sowohl die Parteien der Großen Koalition als auch Grüne und FDP nahezu zeitgleich die Sondersitzung beantragt.

06.01.2019 - 11:22 [ Zeit.de ]

Datendiebstahl: SPD beklagt Durcheinander bei den Sicherheitsbehörden

Nach der Veröffentlichung privater Politikerdaten kommt es zu Kritik an der Reaktion der Behörden. SPD und Linke sehen Innenminister Horst Seehofer in der Verantwortung.

05.01.2019 - 19:40 [ Thomas Ney ‏/ Twitter ]

#Grüne Doppelmoral, wie man sie kennt: in Ba-Wü und Hessen #Staatstrojaner durchwinken, aber wenn man selbst mal betroffen ist die ganz große Welle machen. #Hackerangriff