35 Burst results for "GRU"
EU Discusses Russia Strategy as Tensions Grow in Ukraine
"European union's leading diplomats will hold a meeting today to discuss russia's alleged involvement in a deadly explosion in the czech republic in two thousand fourteen projects spelled eighteen russians over the weekend in response to what it called unequivocal evidence from check spies charts other security agencies moscow for its part has now enacted a tit-for-tat diplomatic responsible for more on this. I'm joined by benefits here in zurich security correspondent. Good afternoon. good not so. Let's go to to prague this. This is quite a drawn out. Investigation against one must assume Give going all the way back to two thousand fourteen. They must have a pretty compelling evidence and obviously waited this long to ensure. Obviously if you're gonna take moss go on you have your facts though. One one wonders whether that matter sometimes yes indeed quite. The story must be quite substantial as well. The evidence i as well as you say. It's an from six years ago in incident. That saw an ammunition depot blow up to people dying in the process and this this explosion occurred just wendy's goods. Were supposed to be unloaded and sent to bulgaria. Nam steeler. who in turn would provide it. Ukrainian army with These munition so check. Authorities now presented evidence of two men who had requested to visit the site and where checked in into nearby town of ostrava with fake. Id's photos linked to to russian intelligence and the investigative platform. Belling cat in russia has identified the two as members of gru the russian secret service and specific unit there. It's not torius for such incidents by the way said bulgarian straight. It was just a year later poisoned in sofia but he survived.
Frances ANSII warns of a longrunning Sandworm campaign
"French authorities specifically the information security agency. Ansi said yesterday that they determined a russian threat. Actor has been active against french targets from two thousand seventeen to twenty twenty ansi. Didn't flatly say which group was responsible but it did note. According to reuters that similar tactics techniques and procedures had been seen in use by sand worm also known as voodoo bear and operation belonging to russia's gru military intelligence service and see has also made a detailed technical report available. The attackers dropped back doors as web shells in their targets. The operation appears to have been another software supply chain attack with the attackers working their way in through century on products used for it monitoring and see didn't say how many victims there had been but the agency indicated that most of them were it service firms especially web hosting providers the similarity in targeting in approach to the so laura gate campaign in the us is obvious. Centurions customer profile is similar to that of solar wins the paris based firm lists more than six hundred customers worldwide including local and regional government agencies. There's no informed official conjecture about the goals of the campaign that exploited century on yet but wired quotes industry. Expert says observing that. Sandra has a track record of disruption and destruction and hasn't confined itself to simple data theft century on hadn't as of this morning posted any statement about the incident to its website wired says century on emailed it to say that it was too soon to say whether the campaign represented an ongoing threat or whether it had been stopped by the patches and upgrades century on regularly issues. Voodoo bear of them as fancy. Bears daughter is known for going after industrial control systems especially those associated with power generation and distribution. It's most well known. Tool is the black energy malware kit. The threat actor is widely believed to have been responsible for both two thousand eight distributed denial of service attacks against georgia and twenty fifteen action against a portion of ukraine's power grid to return to salora gate the investigation and mop-up of the very large and presumably very damaging cyber espionage campaign against us targets continues. Cbs sixty minutes this weekend. Featured the solar winds compromise and highlighted both the scope of the attack and the effort that went into conducting it microsoft president. Brad smith said quote. I think from a software engineering perspective. It's probably fair to say that this is the largest and most sophisticated attack. The world has ever seen quote. He added that microsoft believed at least a thousand engineers were involved in mounting the attack. How microsoft arrived at that figure is unclear. And while it's probably better to read a thousand as a lot and not as a rigorously supportable quantification of the human capital. Russian intelligence applied to the task. It is in any case. Allot a member of south. Korea's parliamentary intelligence committee told reuters that he'd been briefed on an attempt by north korean operators to breach pfizer and steal information on the company's covid nineteen vaccine development. Hey take king said that. The republic of north korea's national intelligence service briefed him on the attempted espionage and that the apparent motive was financial. Pyongyang is looking more to its criminal. Revenue stream not to public health in the dprk last week bloomberg renewed its reporting on an alleged chinese hardware back door allegedly found on super micro products. The report was greeted with more skepticism than such reports usually are since the earliest versions of the story published. Initially in two thousand eighteen generally went unconfirmed by organizations that would have been in a position to confirm them super micro issued a statement about the bloomberg story which says in part quote bloomberg story is a mismatch of disparate. An inaccurate allegations that date back many years. It draws far-fetched conclusions that once again. Don't withstand scrutiny. In fact the national security agency told bloomberg again last month that it stands by its two thousand eighteen comments and the agency said a bloomberg's new claims that it cannot confirm that this incident or the subsequent response actions described ever occurred despite bloomberg's allegations about supposed cyber or national security investigations that date back more than ten years super micro has never been contacted by the us government or by any of our partners or customers about these alleged investigations and quote to round out the familiar four of bad girl. Nation-states researchers at security firm anomaly report a static kitten citing. the threat. Group believed to be run by. Tehran has been targeting government agencies in the united arab emirates. Fishing them with the goal of installing screen connect remote access tools and the systems used by. Its emirati targets. The fish bait is usually an israeli themed geopolitical loor the emails masquerade is communications from kuwait's foreign ministry and the fish hook itself is similar to those used previously in operation quicksand. There's not much new to report about the oldsmar. Florida water utility sabotage attempt local authorities in oldsmar have grown increasingly tight lipped about the attack on the town's water system with the pinellas county sheriff discouraging any municipal officials from discussing what is as they say and ongoing investigation. Detectives are on the case they say. And the sheriff wants the public to understand that it was never in any danger.
U.S. charges Russian military hackers
"A story for you. May Two thousand seventeen voters in France went to the polls to elect a new French president just like in our election the before then Russian intelligence agencies in the Russian government played hard in the French election that year russian-owned websites pushing outlandish rumours about the centrist candidate Emmanuel macron. Those rumors were then processed into pieces Russian state media outlets. macron's rival was a far right candidate named Marine Le Pen she had inherited from her Holocaust denying Father Control of Francis Post. World War Two Fascist Party. So it was the neo-fascist party running against macron. Lapenne far-right neo-fascist campaign was explicitly bankrolled by a Russian state controlled bank. Marine Le Pen went to Moscow and met with Vladimir Putin at the Kremlin during the campaign. This was not subtle. But it was. Too much for Russia to pass up a divisive racist far right fascist candidate injecting chaos into the elections in a major. European. Democracy in twenty seventeen that's like catnip to Russia. Right? They want to undermine democracy everywhere. They will undermine Western countries in general however they can. But Russia's saved its boldest move for the eve of that French. Just two days before the vote. Russian. Hackers part of the same Russian military unit that had disseminated hacked democratic emails during the twenty, sixteen American election the before. They dumped tens of thousands of files, online, nine gigabytes of stolen emails and other information all hacked from Emmanuel Macron's campaign, and that might have become the dominant news story of the final weekend of that campaign. Before French voters went to the polls. It might have actually ended up upending that election if it were not for a quirk of French law, which imposes a media blackout on anything relating to the campaign for full day before voting starts all the way through until polls close on election day. That blackout period in French law precedes this whole scandal with Russia messing with the French election. But it ended up saving the day. The material that was hacked by Russian intelligence got posted online and France just hours before media blackout period began just minutes before the blackout began at midnight that night the macron campaign issued a statement warning that the hackers had inserted forged fake documents into the hack stolen material they pleaded with the media to not report on that junk. And the media didn't. They stuck to the rules. And in the end, Emmanuel macron beat the far-right neo-fascist Marine Le Pen by more than thirty points. And there's a couple of reasons for us be thinking about sort of relearning the story of that. Two thousand seventeen French election right now one is that the intelligence community is raising the alarm that Russian intelligence is executing an operation just like the one they did in France on us right now the supposedly Biden scandal that Rudy Giuliani has been shopping the scandal he. Managed to get printed in the New York Post which president trump has been gleefully promoting ever since including posing with a copy of that paper in the Oval Office that junk that Giuliani has been promoting is being actively investigated by federal investigators as potentially part of a hostile foreign influence operation illegally targeting our election and the intelligence community is investigating this Johnny on the spot. In part because they saw this coming in advance, this is in the New York Times last week quote, The Times reported last January the Ukrainian company were Hunter Biden was once on the Board respond had been hacked by the same Russian Intelligence Unit that hacked the Democratic National Committee in two thousand, sixteen last month US intelligence analysts contracted several people with knowledge of that hack. Asking them for further information because they picked up chatter that stolen burris, my emails would be leaked in the form of an October surprise among their chief concerns was that the burris material would be leaked alongside forged materials and it it's to hurt Biden's candidacy as Russian. Hackers did when they dumped real e mails alongside forgeries ahead of the French elections in two thousand seventeen. So that's what they did to Macron in two, thousand, seventeen they hacked all install all of this stuff from his campaign than they mixed it up with Ford stuffing dumped it right before the election. That's what the US intelligence community said. They believed was going to happen with Barista and sort of October surprise firm Rudy Giuliani. Thank right on time Rudy Giuliani shows up some emails from a mysterious source that are totally unverified and unverified able and only one Rupert Murdoch owned right wing tabloid will air that junk. Put it in their paper. So. That's one reason. The Russian operation in the two thousand, seventeen French election newly relevant to our lives right now, the Russians may be trying that exact same trick all over again except we don't have media blackout rules. The other reason that that two thousand seventeen Russian operation in France is newly relevant. Is that the guys who did it just got indicted by the US Justice Department today? Here they are the Russian military intelligence hackers who carried out that operation to interfere in the French election in two thousand seventeen the Justice Department says in the indictment today that these guys also launched major malware and hacking operations that shut down the power grid in Ukraine that hit the parliament in the nation of Georgia that chemical weapons investigators in the UK and Europe who were looking into the Russian poisoning of former Russian spy, Sergei scruple who was poisoned with a Russian nerve agent on British territory they say, they also orchestrated hacks that hit hospitals in companies. In the United States. They also organize tax that hit the two thousand eighteen winter Olympics quite a list. And? Although. One of the Russian hacker that was indicted today was previously indicted by Robert Muller in two thousand eighteen for his role in the hacking operation against the twenty sixteen election here in the US, today's indictment of these Russian hackers doesn't include any charges related to American election interference this year. That said the election. The American election is two weeks from tomorrow. It's hard to look today's indictment without trying to understand how it relates to our own election and what the Justice Department is trying to signal here. Is that the right way to look at this. Joining us now is Jeremy Bash. He served as chief of staff at the CIA and at the Defense Department under President Obama Jeremy Nice to see. Thanks for making time. It, Rachel. So, this is a lot. Going on the surprise announcement today from the Justice Department about the indictment of these Russian hackers when you look at this with your background in intelligence and your understanding of what Russia has done to target our democracy and others. What do you think is most important here for people to understand. Well I think was most important is that the GRU this Russian military organization that was responsible for the two thousand Sixteen Hacking Dump Operation Against the Democrats that was responsible for the two thousand seventeen election appearance in France as you noted, and is responsible for these militias cyber attacks globally including, against us, hospitals and. They are very active. They're very capable and they are in fact probably behind this this Russian. Intelligence operation at least a looks and appears to be Russian intelligence operation targeting the Biden campaign. Last. Week Andrew Weisman, who is part of the Miller investigation wrote in Law Fair about the decision that was made by bill bar earlier this year this spring to drop criminal charges against Russian companies that had participated in the attack on our election in two thousand sixteen and that didn't actually get a lot of attention when it happened in March I think in part because the country was overwhelmed by what was starting to happen to us in terms of covid why spent makes the case that before may have acted essentially improperly in dismissing those charges essentially signaling to Russia that the. US Criminal Law wouldn't be used against them as a tool if they wanted to interfere in the election this year I'm wondering if this might be a signal in the other direction, if this might be some sort of signal to brushback rush intelligence ahead of what appears to be their ongoing efforts to boost trump in his reelection effort. Hartono, racial. But what we do know is that there are mixed signals being sent by the US government here. Today we have the Justice Department indicting Russian hackers, but you've got the president of the United States welcoming condoning what looks apparently like a Russian intelligence operation targeting the Biden campaign remember Rachel that Rudy Giuliani. In Kiev, with Andrei Dirk Catch Ukrainian lawmaker who has been assessed by US intelligence and announced by our Treasury Department to be a Russian asset for the last decade. Giuliani goes to Kiev meets with Dir cash and he comes back and low these many months later, Giuliani surfaces up with these a very mysterious emails. So every Intelligence Professional Rachel that I've talked to the last twenty four hours says that this walks like a Russian intelligence disinformation campaign this talks like a Russian intelligence to information campaign. This is most likely Russian intelligence is permission campaign against the Biden team.
"gru" Discussed on Liberaleren Podcast
"Delta muscle tone has also some some list or promote my balcony and everything on the store for the wing and he has also has shoulder-length of Eternal 2nd Scott on the the Facebook page. Louis Vuitton Health Systems estimate of the shift between North Moscoso. You can ago someone who go to get off tomorrow what thank you doing although we laugh at pay also host all this argument. Are you off Daya for sure fit you into some place on it? Okay for a dog? Scarpered Iran or something. He added Walter defaulting default as America in Texas and they have topped patterns at scallion, press men. Do I remove the university learning it you can get somebody ahold this in with me. I'm not been on the tour for the Tom bombing the park also assure you but does not feeling confident for for somebody live or absolutely others. Well the equipment and color or ten months so cute or not till first reproduce until they get some media box one photo text ya or on top of the toxins size engine grown. They're also looking into the second month or like normally if you're not then they are properly in intact and left off. Marketing. So obvious cabin also again the Empire get bombed by the phone number of University this is there something getting this is Demi forget it can hello. Hong Kong condominium of hills of Auto mobiles telephone. No, for example body been a logger Felix, mobile telephone talked about or Grand Theft Auto pay for the hangout and you have to break the law like media focuses. Again, the higher posters just out of reading and a vegetable long time, or more than most specialty off. Lego not even 10 ahead absurd absurd the summer so we still tend not to get get work and exponents a headspin with two Among Us not many knew more than bonding or for the mend it on in Avatar. Lasonia First Choice in trying the heart. I mean person and I thank you. But the time to do some pain decent stored bark or somebody for Shack at the result in the system and wanting them and check on version home. Is Lewis dead? I used to get all this lady top off oil cool. Mail. Also the device off. So my Southern computer on avoiding them. Then the folks running or going to say also comes on super table Palm turn off the fisher king talking on the top choice to handle also understand I mean I think we missed the pool and of Pune and sex krunga. So you and start over then. Let me double check. All the the yoga Tagalog among system would only hold so it's a little bit harder sure when we start the tan ciktim month for the color this stuff in the castle also show me presents. So heck would they can do you hope the solid impact of the voice tells them they offered me just so you loaded the gold or poor victims poor chip removal a automatic and it never wage. Socks little bit firstly 4 at Optimist on the Dilemma awesome. Also, it could be discreet actual and let me ask my mom over literal total milked all the polymer. I looked who lived in Toronto.
Russian hackers targeting U.S. campaigns, Microsoft says
"Has made a big announcement saying hackers working for the countries of Russia. China and Iran have recently escalated their attacks on people and organizations involved in the upcoming US presidential election. There was a time when maybe it would be our own government that would be the one to warn us about things like this but. Just like with the coronavirus I guess it's tech companies these days who have all the data who have all of the power and have I, guess the remaining competency to keep us all informed on useful information like this quoting NBC News Microsoft's Vice. President of customer security and Trust Tom, burt wrote in a blog post published Thursday that the company's cybersecurity experts had recently seen an uptick in hackers targeting campaigns quote in recent weeks Microsoft has detected attacks targeting. People in organizations involved in the upcoming presidential election burt wrote while hackers from all three countries have been spotted targeting people tied to Joe Biden and President Donald Trump's campaigns Russia's military intelligence agency. The GRU remains the biggest threat said John Hill quist the director of intelligence analysis at mandate solutions a cybersecurity company quote we remain most concerned by Russian military intelligence who we believe poses the greatest threat to the democratic process
Navalny’s team sees Kremlin behind attack
"Activists in. Russia. Say They will not be silenced despise the apparent poisoning, their most prominence leader Alexey navalny he collapsed after drinking a cup of tea an airport cafe while campaigning in Siberia. If he was poisoned, it's the latest in a series of attacks on Kremlin critics. Journalists both inside and outside the country and European leaders are threatening a robust response. Our Moscow correspondent Lucy Taylor reports at the budget logger staying. Agents ability. To Christ his four million Youtube followers Alexei navalny has the loudest voice speaking out against the Kremlin Russia. Deborah wound. He exposes corruption and embezzlement and rallies crowds of young protesters in Russia's cities another newsletter rob discussed they didn't really. In this video a few weeks ago he tells them to believe in themselves and the power to change the country. But for now, at least that voice is silent. Nevada. Collapsed screaming on a plane and Siberia. His team immediately blamed a cup of tea. He drank in an airport cafe. The only thing he had to eat drink that day you. Russian doctors in the city of oems said, there was no trace of toxins move in. I can say for sure oxo Bates and barbiturates of not being found the research is going on, but those agents not in Nevada his body. This was the chief doctor, the hospital Alexander Murkowski. Already, working diagnoses. The main one we leaned towards most his carbohydrate balanced disorder meaning metabolic disorder. It might have been caused by a rapid drop of blood sugar in a plane which caused him to pass out. Novon. These family insisted he was airlifted to Germany to doctors. They trusted to be independent, and by contrast the team Berlin Scherzer's hospital say that's s syndicate that he was poisoned. They say they found evidence if Colin stays inhibitors which affect the nervous system and could cause long-term deal. The German government has kept Navalny unto tight. Watch. This is the Foreign Minister Heiko Mas. Differ. Suspicion is not that Mr Navalny poisoned himself, but there's someone poisoned misdemeanor felony and there are unfortunately one or two examples of such poisonings in recent. Russian. History it was clear that after his arrival security measures had to be put into place, we are dealing with the patient to likely the targets of a poison attack. So the pressure is building on Russia to investigate what happened. The Kremlin says, it's offended by claims of a cover up and says, there's no need for an investigation until it's conclusively proven poison was involved but analysts abroad say the case follows a pattern of attacks on critics including the Salisbury poisoning of the former spy, Sergei scruple in twenty. I share ran gap from the Jackson Institute for Global Affairs Gail University. The fact that this may be poisoning. This is a part of a pattern that the Russian government has engaged and you all know this just from the nerve Asian. That was used in this cripple poisoning, other Russian spies, both in Britain and elsewhere been poisoned. It's a really that's not something that one that is a common way of attacking someone so I think there's sort of a signature here that suggests that this is a Russian government, probably a GRU intelligence operation. The Russian government denies any involvement in Alexei navalny illness saying the accusations can't be taken seriously and it denies that there is any trend of attacks on anti-government figures. Russia's State Duma is looking into whether they're foreign links to the attack on. Novelli. But his friends say is the third time that he's been poisoned in Russia. This is his friends surgery of it is very important to remember. It's not the first attack on Nevada using chemical agents. He was attacked in two thousand seventeen. The video cameras actually identify the man who executed the attack. This man was not investigated interrogated or prosecuted. The second time was attacked last summer. When he was detained in. Moscow. Prison and was actually administered within the prison within the prison cell. So it was also very easy to investigate. It was not investigated as well. which kind of tells you how the Kremlin treats people who Tacna Botany Moose Women Somewhere Bolshoi. Kremlin says it doesn't want Nevada illness to damage ties with Western countries. Assist supporters prepare to fight regional elections without navalny. The case could have wider geopolitical consequences. The United States said it would endorse the European Union led investigation and German Chancellor Angela Merkel said those responsible should be held to account. See. Taylor d-w Moscow.
"gru" Discussed on Risky Business
"So I absolutely am an enthusiast for a couple of reasons. The first reason is that I'm responsible for detection at work and Emma Oh, man, it's tough. They're really good at evasion and when from Binary Defense, along with team Comrie and James Shank, both of whom are friends of mine shots greets old school style to them to Crypto. Lemus. was able to find where the persistence was being capped within the registry. So that's when the machine power cycles essentially how IMO TAT was maintaining its ability to stay on that machine and James Basically found that if you go in there and you make some changes to those registry entries, it will cause a buffer overflow. So he was able to get together with some other researchers distribute that through the and for about six months I think they were able to. Understand How they kind of keep. Imo. Tat off a machine especially, if it power cycled, that's something that's really probably not gonNA work at scale enterprise is not going to say, Hey, let's run this power shell script to protect everybody from However, it's an excellent point of of research to be able to know that that works the gang you keep changing. It keeps evolving it keeps getting better keeps finding out if it's being detected everybody that does this research has a team that watches it change all day long it watches enough to find out how we're detecting. It you Matab makes changes. We have to make the changes and so James Clan was able to find a way that it can sort of defeat that persistence. It's a bug in our and that's a pretty cool thing to find. Now, here's the story that actually wound up leading a newsletter this week the Sans Institute actually managed to get one of their employees as one of its employees managed to get their inbox earned by militias like as you are. APP Right. So in the newsletter this week Brett wrote it off as like, Hey, everyone's talking about this. Lennox, malware. It's very sexy. It's very cool but like while you're talking about. malware getting earned by this dumb Microsoft thing where they're charging you megabucks for the tools you need to actually mitigate what is essentially. Designed, and I think that is an excellent point I mean, what do we have? What hyped organizations have of protecting uses against these our based attacks even people who train blue team is an organization that trains blue team is gets hose. This way man it's it's a pretty solid point right? You would expect fans have stuff together and you know this kind of a war fishing people are not used to spotting it. It's really effective. We use it on engagements because it works well, and it gets you you need to go so. Brits, Brits Tyke in the Front of Newsletter Harvey was totally on board with him and you know limits colonel gets like that's my jam. But if I wanNA shell someone these days, I. Do it with the kernel mode. There was a little bit of an inaccuracy in the newsletter said that you need a five to be able to get access to the Microsoft cloud security tools or whatever am. That's not actually true. You can get it as a standard still like quite expensive. You can get it as part of a five as well. It's. Basically, even the person who pointed out that we got it wrong was at pains to tell us. It wasn't our fault given how can you use and Microsoft licensing tranches but I don't think look even if we got some of the details around the actual precise licensing costs..
"gru" Discussed on Risky Business
", the first thing we're going to talk about this wake is An FBI doc seeing some gi you malware God, , I love Twenty Twenty <hes> specifically they. . Like. . A Lennox Malware toolkit this pretty fun angles here but let me start off with you Adam. . What did you make of I? ? Mean you know you you'll links your guy right out of the three of us. . What did you think of the? ? Document that Honestly. . It's a beautiful thing. . It really warms my heart to see this really old school technique of. . Trad, , Lennox route kits, , kernel mode, , Lennox road kits with all the classic bells and whistles written finest. . Tank. . Great Engineering. . It's just a beautiful thing and the NSA's documentation of it is honestly probably better than what the Russians have like really in depth right job reversing it well, , written up our. . Yeah. . Really enjoyed it like I'm I'm Jelly I want a copy of this so that I can use it looks like a nice piece of tooling and twenty years ago me really would like this. . It's good. . Yeah I mean I. . I kept having flashbacks to to talks from like Kiwi Con Circa ten years ago. . Like a fin buyers well, , and yeah, , it was just. . Sort of that's classic beautiful technique share. . It is there enough useful stuff in this thing that someone like yourself who actually works in a role that's that's. . Way tightly sort of information try to make it actionable like was this a useful document or do you get the impression that it's just neon Jagna a bit of a middle finger at Russia. . No. So . I think it is useful. . We love attribution from a from a law enforcement agency for state-sponsored you just can't beat it because it allows us to do is we can kind of correlate and you can at the very least put a little bit to rest and attribution and say look if there's an. . If there's a press release if the NSA the FBI say that it's this group in the Intel community were all just going to kind of agree that this is the group that it is and you can get away from the hundreds of different names all hang on hang on. . What you're saying is the primary benefit here is you get to settle all of the clustering arguments that happened in threat research a slacks exactly, , and I, , think you and I have talked a little bit about what a mess that is with people like Joe Slowec it's it's. . Crazy how difficult that is the main reason for that is that everybody that does intelligence has access to a different source of data and so you know you can kind of look at the FBI and the NSA and say, , okay, , they have access to all the data. . The best data may be dated. . They shouldn't even have access to and that kind of gives us a little bit of a reprieve and we can say, , okay, , they're probably right. . Let's move forward from here. . The indicators are are usually good when they come out in these kinds of releases. . But I wanted to ask, , Adam, , you were kind of saying I wish I had this. . So what do you think the chances are that this will be potentially spread around or that somebody could create something similar. . It's using tricks that have been used by the hacker scene for for a very long time I mean this kind of rocket is pretty old school. . What's Nice is having one that's. . Supportive a modern kernels, for , example, , because that's one thing that was always really fiddly it's about about maintaining this kind of tooling was you had to have kernel modules that were built against all versions of the next year we're going to run up against and that's the sort of thing that as a bedroom hacker, , you can do for a few red hats or a few seuss's debut or whatever. . But doing it against a bunch of stuff like that takes actual work. . You know getting hold of something like this. . You know that's weaponized and usable in the real world and has workable your malleable see through channels. . That kind of thing is I mean in this case, , I, , think it's just like Jason of the. . Web sockets or anyway. . But you know having something that's actually being used versus just kind of homebrew. . There was quite a bit gap in it. . They lost eighty percent of making a tool really genuinely useful is boring, right? , ? Yeah. . That's why I wanted just for the maintenance burden and guess the you aren't really selling support contracts are. . I mean that could be. . It could be a pivot at some point you never know. . But I I look. . I found a couple of things interesting here. . One is that you just mentioned that the to handle by Jason I've HDTV the govern the US government's released a bunch of Yarrow rules that help you detect the message format that the two uses sir rather than looking at like a destination addresses, , it's actually looking at at message format. . Of course, , I can change the message format but that was an interesting thing to do I thought. . The other thing is a both of you have spoken about. . Getting your hands on this thing no one has seen it. . I've even been asked around saying you know who's got sample because a couple of people I know one no one's GonNa, , which tells me that. . Abe may not, , really be out there in the wall much which begs the question why the hell did I get it from and I don't think they got it rolling incident response. . Let's just put it that way. . It looks like they have gone right into these these these. . Operators infrastructure and just pulled it straight from there like this. . This really does look like there's a bit of a psychological Operation Angle to this is in like we are all in your. .
NSA and FBI document GRU's Linux malware for them
"The first thing we're going to talk about this wake is An FBI doc seeing some gi you malware God, I love Twenty Twenty specifically they. Like. A Lennox Malware toolkit this pretty fun angles here but let me start off with you Adam. What did you make of I? Mean you know you you'll links your guy right out of the three of us. What did you think of the? Document that Honestly. It's a beautiful thing. It really warms my heart to see this really old school technique of. Trad, Lennox route kits, kernel mode, Lennox road kits with all the classic bells and whistles written finest. Tank. Great Engineering. It's just a beautiful thing and the NSA's documentation of it is honestly probably better than what the Russians have like really in depth right job reversing it well, written up our. Yeah. Really enjoyed it like I'm I'm Jelly I want a copy of this so that I can use it looks like a nice piece of tooling and twenty years ago me really would like this. It's good. Yeah I mean I. I kept having flashbacks to to talks from like Kiwi Con Circa ten years ago. Like a fin buyers well, and yeah, it was just. Sort of that's classic beautiful technique share. It is there enough useful stuff in this thing that someone like yourself who actually works in a role that's that's. Way tightly sort of information try to make it actionable like was this a useful document or do you get the impression that it's just neon Jagna a bit of a middle finger at Russia. No. So I think it is useful. We love attribution from a from a law enforcement agency for state-sponsored you just can't beat it because it allows us to do is we can kind of correlate and you can at the very least put a little bit to rest and attribution and say look if there's an. If there's a press release if the NSA the FBI say that it's this group in the Intel community were all just going to kind of agree that this is the group that it is and you can get away from the hundreds of different names all hang on hang on. What you're saying is the primary benefit here is you get to settle all of the clustering arguments that happened in threat research a slacks exactly, and I, think you and I have talked a little bit about what a mess that is with people like Joe Slowec it's it's. Crazy how difficult that is the main reason for that is that everybody that does intelligence has access to a different source of data and so you know you can kind of look at the FBI and the NSA and say, okay, they have access to all the data. The best data may be dated. They shouldn't even have access to and that kind of gives us a little bit of a reprieve and we can say, okay, they're probably right. Let's move forward from here. The indicators are are usually good when they come out in these kinds of releases. But I wanted to ask, Adam, you were kind of saying I wish I had this. So what do you think the chances are that this will be potentially spread around or that somebody could create something similar. It's using tricks that have been used by the hacker scene for for a very long time I mean this kind of rocket is pretty old school. What's Nice is having one that's. Supportive a modern kernels, for example, because that's one thing that was always really fiddly it's about about maintaining this kind of tooling was you had to have kernel modules that were built against all versions of the next year we're going to run up against and that's the sort of thing that as a bedroom hacker, you can do for a few red hats or a few seuss's debut or whatever. But doing it against a bunch of stuff like that takes actual work. You know getting hold of something like this. You know that's weaponized and usable in the real world and has workable your malleable see through channels. That kind of thing is I mean in this case, I, think it's just like Jason of the. Web sockets or anyway. But you know having something that's actually being used versus just kind of homebrew. There was quite a bit gap in it. They lost eighty percent of making a tool really genuinely useful is boring, right? Yeah. That's why I wanted just for the maintenance burden and guess the you aren't really selling support contracts are. I mean that could be. It could be a pivot at some point you never know. But I I look. I found a couple of things interesting here. One is that you just mentioned that the to handle by Jason I've HDTV the govern the US government's released a bunch of Yarrow rules that help you detect the message format that the two uses sir rather than looking at like a destination addresses, it's actually looking at at message format. Of course, I can change the message format but that was an interesting thing to do I thought. The other thing is a both of you have spoken about. Getting your hands on this thing no one has seen it. I've even been asked around saying you know who's got sample because a couple of people I know one no one's GonNa, which tells me that. Abe may not, really be out there in the wall much which begs the question why the hell did I get it from and I don't think they got it rolling incident response. Let's just put it that way. It looks like they have gone right into these these these. Operators infrastructure and just pulled it straight from there like this. This really does look like there's a bit of a psychological Operation Angle to this is in like we are all in your.
This Woodcutters no Railsplitter: NSA and FBI Release Report on a GRU Toolset
"The US NSA and be I. This morning released a report on drove rube malware a hitherto publicly unremarked strain deployed by twenty eight, which of course is fancy bear. Russia's generic. Military Intelligence Service. The report describes drove a rube as a Lennox malware tool set consisting of an implant coupled with a kernel module root kit, a file transfer and port forwarding tool and a command and control server. When deployed on a victim machine drove rube implant client provides the capability for direct communications with actor controlled see to infrastructure filed download and Upload Capabilities Execution of arbitrary commands as route and port forwarding of network traffic to other hosts on the network, all of which is well allot. McAfee CTO Steve Grubman commented an email that drove a rube is a Swiss army knife of capabilities that allows the attacker to perform many different functions such as stealing files and remote controlling the victim's computer. Drove a rube can be detected about the two agencies warned that like other advanced route kits, the malware take some pains to hide itself, and so it may be overlooked if you're not on the lookout for it. The alert recommends updating to Lennox Kernel three point seven or later, which will enable users to take full advantage of colonel signing enforcement. It also encourages administrators to configure systems. So they will only load modules that have a valid digital signature. An Essay and the bureau don't say what they think. Fancy bears objectives are with drove rube but they do scowl in the direction of the GRU's interest in election meddling fancy bears been there before still a Swiss army knife you can do a lot. So why is it called? Drove a rube. You're probably wondering the word means woodcutter would chopper or would splitter. In this case, it's the GRU's own name. That's what the hoods back at the aquarium call it. Nice. Touch that an essay you could Americanize. The name is rail splitter but honest Abe 's they're not. Another question, the alert is detailed and specific. You can get it from the NSA pressroom at NSA DOT GOV and it's a lively read that really put the G. Into Gru. Why release it the authors say in an accompanying fact, we're sharing this information with our customers and the public to counter the capabilities of the GRU GT SS an organization which continues to threaten the United States and its allies. We continuously seek to counter their ability to exploit our nation's critical networks and systems and quote. That seems right to us. It also seems likely that Fort Meade is leading the girls and boys over at the aquarium. No. That NSA sees right through them, wood chips and
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
"Everybody from the British. Ask this week's interview. Episode has any Greenberg senior writer at wired. He just SORTA book called Sand Worm New Era of cyber war in the hunt for the Kremlin's Miss, dangerous hackers, it is all about hacking group inside of the Russian government called San Worm. They were responsible for the most damaging cyber warfare attacks over the past year there behind not PECI. The hackers took out in the mayor shipping line hospitals across the U. K San has totally escalated. What we think of Cyber War, and he's book gets all into how they were discovered how they were flushed out the. The intricacies of these various hacks. It's super interesting. The book is a thrill ride. If you're looking for something that isn't the virus. This is like a thriller, a highly recommended. It was really fun to talk to her about the stuff. one thing I. WanNa know we're all at home so during this in every might hear some kids in the background. I asked you just be a little forgiving that we're all. We're all dealing with it and he was a great interview. Check Out Sandy Greenberg of sand worm, a new era of cyber war and the hunt for the Kremlin's most dangerous hack. Any Greenberg your senior writer at wired you're also the author of Sand Worm, new era of cyber war in the hunt for the Kremlin's most dangerous. Welcome glad to be here so even writing about cybersecurity frontier I think you just said two thousand six and writing about Cybersecurity, but this book sand worm as I was reading it. It seems like it's called the new era of cyber war. It seems like there's been a huge turn in sort of state-sponsored. Particularly Russians sponsored cyber attacks. How did you come onto that notion? How did you begin reading this book I'm I'm very curious how you see. See that turn happening well. In late twenty sixteen, my former colleague Kim Zetter she had been the one who really covered state sponsored hacking in cyber war stuff, but she left wired, and this was also at the time. When you know Russian hackers were meddling in the US election, they'd hacked the democratic. National Committee and the Democratic Congressional Campaign Committee and the Clinton Campaign, so my editors were really primes on face, mantra hacking all of a sudden, but what they? They really what they told me they wanted was a actually like a big takeover of the whole magazine. All about cyber war, but cyber war to me is different than those kinds of espionage election, meddling tactics so I went looking for no real cyber war story, which means to me like a actual disruptive cyber attacks, and as I looked around. It seemed like the place where that was really happening was in Ukraine not really in the US in fact maybe. Maybe what was happening in? Ukraine seemed to me like it was in some ways, the only real full blown cyber war that was actually occurring where Russian hackers were not just attacking the election which they had done, they tried this spoof the results of a presidential election, but they had also attacks media and destroyed their computers. They had attacked government agencies and tried to like destroy entire networks, and then they had turned off the power for the first time. In December of two thousand, fifteen, the the first actual blackout triggered by hackers, and just as I was look into this happened again the the effect, the seem hacker group caused a blackout this time in the capital of Kiev so I wince looking in Ukraine for this cyber war story that. Turned into a cover story for wired that kind of gave editors what they wanted, but then also kept unfolding This cyber war kept growing in scope and scale and. The original story written for wired was kind of about the fact that you could look to Ukraine to see the future of cyber war that will what was happening. There might soon spread to the rest of the world. And that is actually what happens to like just after we publish that cover story to same hackers released this climactic terrible cyber attack in Ukraine. Called Not Petiot that spread beyond Ukrainians became the worst cyberattack history cost ten billion dollars, so when that happened, that was when I saw that there was potential to do a book about this that it was not just a kind of case study about Ukraine or even kind of predictive story, but a an actual full story arc about this one group that had carried out the what I would say was not only the first. First Real Cyber War, but the worst cyberattack in history and the you know I wanted to capture the the Ark of that story in the effects, the real experience of cyber war. Yeah, so the group is called sand worm in this is just one of the the sort of opening arcs of the book is how they've come. They come to be named this because references and code walk people through just like it's so. relatable that like even these hackers are using using this language that leads them recalled Sandwich Tell people about it. So when I started to look into the origins of this group after that second blackout attack I I found that this this company called eyesight partners which have been acquired by fire I I, said partners was the first to find these hackers in twenty, fourteen, basically using fishing in kind of typical espionage tactics, plant malware in the networks of typical Russian hacking targets like groups across Eastern, Europe and NATO in a look like what they were doing was just kind of typical espionage. They were planning. This by wear calls lack energy buds will first of all they could see that they were rushing, because they had this server that they were using to administer some of these attacks and they. They left the server, so anybody could look at it in. There was a kind of Russian language to file for how to use black energy on the service, so these guys seem like they were rushing, but even more interesting in some ways. was that they to track each victim each instance of black energy? This malware has little campaign code in each campaign was a reference to the science fiction novel Dune and you know so like one of them was something about Iraq is, and then one of them is about the sutter cars, these like imperial soldiers in in that SCI FI universe so I said partners named this group sand worm, because well just because it's a cool. Name associated with doing, but it turned out to me. It became this very powerful because a sandwich miss this monster that lies beneath the surface, and occasionally arises from underground to do terribly destructive things. partners didn't know that at the time, they they soon afterward realized what sand. was doing was not just espionage, but they were actually doing reconnaissance for disruptive cyberattacks. They were also hacking power grids. They were planning black energy, not only in the European Eastern European targets in the US power grid networks as well. The Ultimately Syndrome was the first twenty fifteen to cross that line in use black energy as the first step in a multi step attack that led to a blackout. So this was not just espionage really was kind of like you know this monster that rises from under the ground to do terrible acts of mass destruction that came to pass so one of the things that comes up over in the book. Is this growing sense of dread from security researchers and analysts? Oh this is an imminent threat to the united. States just Ukraine, but like this is happening here and then there's a sense that the United States actually open the door to this kind of warfare with stuxnet. which was an attack on Iran? How how did those connect for you that it seemed like there's a new rule of engagement new set of rules of engagement for cyber warfare that actually the United States implicitly created with with stuxnet by attacking Iran. Yeah, I mean I tried to highlight. Clearly sand worm are the real bad guys in the story, they are the actual hacker group that did these terribly reckless destructive attacks that actually in some cases put people's lives at risk, the kind of in some parts of the story they actually shutdown medical record systems and I. Think may have cost people's lives with cyber attacks today they are the actual antagonist here, but I also want to highlight the ways that the US government is is partially responsible for the state of Cyber War, and there are a few ways that that's true. I The US! Open the Pandora's box of cyber war with stuxnet. This piece of now where that. That was used to destroy Iranian nuclear enrichment centrifuges that was the first piece of our that actually have caused that physical disruption destruction, and we now see Sandra doing the same thing in Ukraine. In in fact, in some ways around the world, also the the US hordes, these kind of zero day, secret hacking techniques, some of which were stolen and leaked and used by sand worm, but then I think the in fact, the biggest way that I tried to highlight that the US is responsible or complicit or negligent. Here is that we did not call allows what Santorum was doing in Ukraine and say to Russia. We know what you're doing. This is unacceptable. Nobody should be turning out the lights. Two civilians with cyber attacks. There wasn't a message like that I. mean the Obama White House sent a message to Russia over this kind of cyber hotline to say your election hacking is not okay. We see what you're doing and we want you to stop, but they said nothing about a tube blackout attacks in Ukraine, and that was kind of implicit signal to Russia. They could keep. Keep escalating, and even as all the cyber security, researchers and Ukrainians were warning that what was happening to Ukraine, would soon spread to the rest of the world, the US government ignore this both Obama, and then the trump administration until that prediction came to pass and a sand worm cyberattack did spread to the rest of the world, and it was too late, and we all suffered globally as a result, so let's talk about patch it. WAS CATASTROPHIC IN SCOPE, right? It took out the mayor shipping line, which is a massive business. It took out some hospitals in UK like it was huge in scope. I don't think people really put it all together. Talk about how it started and how big it grew. Yeah, so not too was kind of like big apotheosis sandwich, where all of these predictions of the terribly destructive things they were doing to the rest of the world came to pass but it did it started in Ukraine. They hijacked this. The the software updates of this accounting software called me doc that is basically used by everybody in Ukraine. The quicken turbo tax of Ukraine. If you do business in Ukraine, you have to have this installed, so sanborn hijack the updates of that news to push out this worm to thousands of victims mostly in Ukraine, but it was a worm, so it's spread the mmediately end quickly kind of carpet bombs. The entire Ukrainian Internet's every computer at spread to would encrypt permanently. You could not recover the computer, so it very quickly took down pretty much every. Every Ukrainian government agency twenty two banks multiple airports for hospitals in Ukraine that I. could count and in each of these cases. What is eight took them down. I mean it destroyed essentially all of their computers, which requires sometimes weeks or months to recover from, but then as you know, this is a worm that does not respect national borders. So even though it was, it seemed to be an attack intended to disrupt Ukraine. It immediately spread beyond Ukraine's borders. Borders to everybody who had this accounting software installed? That was doing business in Ukraine and some people who didn't so that includes Maersk. The world's largest shipping firm and Fedex and Mondelez, which owns cadbury, NABISCO and ranking manufacturing firm that makes tylenol in Merck. The Pharmaceutical Company in New Jersey on each of these companies lost hundreds of millions of dollars. The scale of this is kind of difficult to capture but I in the book I tried to. To I focused in part Maersk because it is just a good company to look at because you can. They had this gigantic global physical machine that is they have seventy six ports around the world that they own as well as these massive ships that have tens of thousands of shipping containers on them. And I told the story of how on this day seventeen of their terminals of were entirely paralyzed by this attack with ships arriving with just. Piles of containers on them. Nobody could unload. Nobody knew what was inside of nobody knew how to load or unload them with around the world of seventeen terminals, thousands of trucks, Semitrailers, carrying containers were lining up in Lyons miles long because the gates that were kind of checkpoints to check in the these trucks to drop something off or pick it up. They were paralyzed as well. This was a fiasco on a global scale is responsible for a fifth of the world's lable shipping capacity. They were truly just a rendered brain dead by this attack, but yeah displayed out at all of these different victims MERC had to borrow their own each vaccine from the Center for Disease Control because they're manufacturing. Manufacturing was disrupted by this, and it ultimately spread to a company called nuance, nate speech to text software. They have a service that does this for hospitals across the US to dozens of our possibly hundreds of American hospitals at this backlog of transcriptions to medical records that were lost because of this, and that resulted in patients, being do for surgeries or transfers, other hospitals in nobody knew their medical records were updated. I mean this was scale where hundreds of hospitals each of which has thousands of patients missing changes the medical records. We don't know what the effects of that work, but very well could've actually harmed people's health. Our lives I mean the scale of not petty is very difficult to. Get your mind around, but we do know that you know monetarily cost ten billion dollars, which is by far the biggest number we've ever seen, but it also had this this kind of harder to quantify toll on people's lives, so it it you know you read about it at length and wired. Obviously these companies go down of ripples in mainstream sort of general press, but I don't feel like people really not like Oh. This Russian group called San Worms sponsored by the Russian government. Unleash this attack in it caused this cascading effect of failure and disaster cost in that because we know what we can attribute it to the government, our government. I don't feel like that connection got made for people. What is the gap between other as a hack and Oh, this is actually a type of warfare engagement, because that that connection seems very tenuous. I think for a lot of people. Even as sort of the more general mainstream press covers this stuff. Yeah, you know. I don't think that that's is just like the nature of. Of Cyber War I think that was a failing that that lack of connection is a failing on our government's parts, and on you could say even on the part of some of these victims like these large companies I mean I at the time did not pitch it happened. I was fully on the trail of standard within days. I was talking to cyber security researchers who? Who had piece together? Some of the forensics to show the not petiot was Sandra that it was a Russian state-sponsored attack in yet none of those companies that I mentioned mercker Mondelez or Maersk or Fedex, or any of them wanted to say the Russia had done this to them and know governments were talking about either like the Ukrainian government was. They're always willing to point. Point the finger at Russia, but the US government was not, and you know that to me seemed to be just kind of I mean I felt like I was being gas. Let's at that point. I had watched Russia due to Ukraine for a long time at that point tonight. I sort of understood that NATO in the West. We had this kind of cruel logic that. Ukraine is not us. Russia can do what it likes to Ukraine because they're not NATO not e you. They are Russia's sphere of influence or something I think that that's very wrongheaded, but at least it made sense. You know to have that that viewpoints, but now this attack had spread from Ukraine to hit American soil American companies in many cases and yet still the US government was saying nothing I just thought this was bizarre and you know so i. For months I was like. Trying to get any of these companies to tell the story of of their experiences, not Peta I was trying to figure out why the US government wasn't talking about the fact that this was a Russian cyberattack and ultimately I. Think it was I. think it was kind of I know partly disorganization negligence. I think it may have something to do with the fact that the. The? Trump administration doesn't like talking about Russian hackers for obvious reasons, but eight months after it took eight months ultimately for the US government to finally say not that it was a was Russia it was the worst cyberattack in history, and then a month later. The White House impose consequences in put new sanctions on Russia and response, but it took nine months and more importantly it took. Multiple years this without was the first time this was twenty eighteen, and the Russian cyber war in Ukraine had started around the fall of Twenty fifteen, so that's just incredible span of negligence when the US government said nothing about these escalating unfolding. Acts, of Cyber Award that there should have been unacceptable from the very beginning I mean these are the kind of quintessential acts of state sponsored cyber attacks on civilians, trying out the lights. You know that's the kind of thing that I believe that the US government should have called out and drawn a red line across at the very beginning took ears, so I do think it was a big failing. Of of diplomacy, it just seemed like that part of the problem, and this is kind of an expression is it's so hard to describe like if the Russian government sent fighter jets to America and live their support. Okay, like everyone understood, you can see it. You can understand what happened there. In the you know, there's like a however many decades of movies about how to fight that war. This is a bunch of people in a room typing. Like it there's just an element of this where the dangerous Oh federal where the attack is invisible, and while the effects might be very very tangible, the causes are still sort of mysterious people so. My question is who is sandwich. What what do we know about them? Where do they work? What are they like? Do we have a sense of how this operation actually operates? In some ways the the biggest challenge of reporting this book, and I spent essentially the third act of the book, the last third of the reporting of the book, trying to answer the question of who is in worm, who are these people? Where are they located? What motivates them and I guess to partially spoil the ending here. They are a unit of the year you. They are a part of Russia's military intelligence agency, which is responsible for you know, this is not a coincidence. They are responsible for election meddling responsible for the attempted assassination of You. chemical weapons in the United Kingdom they're responsible for the downing of a seventeen as commercial passenger jet over Ukraine were three hundred innocent people died on the G. R.. You are this incredibly reckless callous out military intelligence agency, but they act like kind of almost just cut through mercenaries around the world. Doing Russia's bidding in ways that are very scary, so I threw essentially like a combination of excellent work of a bunch of security researchers who I was speaking to combined with some confirmation from US intelligence agencies, and then ultimately some other clues from the investigation of Robert Muller into meddling all these things combined created the trail that led to one group within the JERE. You that were you know I? Eventually had some names and faces even address of this this group, and all that was actually only finally fully confirms After the book came out Justin in recent months when the White House finally actually was the State Department's. End as well as the UK on Australian and other governments together finally said yes, sand worm is in fact that this unit of the year you so this theory that I developed in positive near the end of the book was finally basically confirmed by governments just in recent months. So one thing that strikes me at that is I, think of the Russian military things. Gru is being foreboding being obviously, they're very very good at this other a buttoned up in then they have like a incredible social media presence that kind of POPs up throughout the book that distracts from what doing. They set up Gucci for two point Oh when they were doing the DNC hacks that fed to wikileaks in the. That account insisted it was just guy. They set up the shadow brokers which was. I read. It is just like your some goof-balls like they wanted to seem a lot dumber and a lot smaller than they were. They were very effective at it to people I. Talk About those that strategy, and then I guess my question have is like a re better at seeing that strategy for what it is well. You make a really interesting point. The uses these false flags like throughout their recent history that we I should say we don't know that they were responsible for shadow brokers. In fact, nobody knows who shot a brokers. The shadow brokers truly are, and they are in some ways the biggest mystery in this whole story, this one group that hacked the NSA apparently and leaked a bunch of their zero day hacking techniques, or maybe they were even say insiders. We still don't know the answer to that question, but the other other incidents you mentioned. That are you are responsible for this Guja for two point zero fake hacktivists leaked a bunch of the Clinton documents. They're responsible for other false flags like they at one point to call themselves the Cyber Caliphate pretended to be Isis. They've a pretended to be like patriotic pro. Russian Ukrainians at some point they they're always like wearing different masks ends. They're very deceptive. in the a later chapter of the book, some of the biggest one of the biggest attacks they. They did was this attack on the twenty thousand Olympics where they not only wore a false mask, but they actually had layers of false flags where as cyber security researchers W. This melwert was used to destroy the entire back end of the two thousand eighteen winter Olympics. Just as the opening ceremony began, this was a catastrophic events. The aware had all of these fake clues made look like it was Chinese or North Korean or maybe Russian. Nobody could tell it was like. It was this kind of confusion bomb almost designed to to just make researchers throw up their hands. Give up on attributing mallards. Any particular actor was only through some amazing detective work by some of the analysts that I spoke to the able to cut through those false flags identify that sand was behind this essentially, but yeah, it's it is a one very real characteristic of the jury you that they are almost they seem to almost take pleasure or like be showing off their deception capabilities to and their evolving those capabilities they are getting more deceptive over time as fake gets more, destructive aggressive. Advertising content when I say Utopia what comes to mind? Birds Chirping lush natural beauty dialed up and vibrant technicolor. Is it within reach. Your world. World. explained. You are an essential part of the Pathak social body. Everybody in that place. Everybody happy now. While the peacock original series brave new world takes place in a scientific futuristic utopia. The concept is nothing new Sir Thomas more. I introduced the theory five hundred years ago, but we keep looking for that community identity stability of aldous. Huxley's Utopia and not finding it. Americans are the unhappiest they've been in decades and we're increasingly lonely. whereas in a utopia, everyone belongs to everyone else. In nineteen, forty-three, the psychologist Abraham Maslov developed a theory of Yoga. One that allows total self determination in basic terms. maslow's theory says that in a utopia we decide for ourselves what we need and how we're going to get it in Huxley's Utopia. Citizens always get what they want and don't want what they can't get. Sounds pretty good right then. Why can't we make it happen? For a Utopian Society, to work, we might need to disband some of the things we hold dearest marriage government privacy individualism, even family. See for yourself if a utopian world is as perfect as it seems watch, brave new world now streaming only on peacock. This is advertising content. Hey. This is bowes I'm a podcast or By, I, a Gamer Five G. is changing the gaming world in really unexpected exciting ways with the help of Samsung Five G. I'm getting a peek at how gaming is getting faster smoother and can even improve our lives well. Let's dish some secrets about the future gaming. Dr Jean Mechanical Direct Route Game Research and development at the Institute of the future. She's also a bestselling author game inventor. She's optimistic about gaming impact on us and our minds. The biggest thing that we've seen in research is that. We need to be able to game in the moment wherever we are. So, what happens when when you're playing when your favorite games is that it fires up than her logical pathways, it's kind of like having a of caffeine and a pet dog from your favorite coach, and you've just meditated for an hour. This emotional neurological power up is called the game transfer effect, and that effect is heightened when using five. Five G. The game transfer fact requires you to be totally immersed in the game, so you want to have the most amazing graphics and the most immersive audio and with five G. to do that anywhere anytime, be one of the first to harness the game transfer effect with Samsung Galaxy Five G. now available on Galaxy, S Twenty-five g and a seventy one five G. feels good to be I with Samsung. I love to play the game of like. Imagine the meeting and imagine that the one set of meeting which is like the actual hackers finding the vulnerabilities figuring out how to jump from Windows, eight computer to some sort of physical hardware controller that actually runs like that. That's a very hard problem in and of itself, and then the other meeting. They're like what we're GONNA do is claim to be a guy called Gucci for two point, Oh and like those are. Not Connected Right, but the way they throughout the book the way they execute East campaigns they're deeply connected, and that seems like not only just a new kind of warfare, and you kind of craft, but some just consistently seems to work in surprising ways like the tech press is GonNa. Be Like Gucci. I says this and we're. There's never that next step of also we think it's Russian government, and that seems like first of all I'm dying. I imagine the meeting right. I would love to be a fly on the wall of the meeting where they decide what their twitter name is going to be today. I'm very curious how they evolve those attacks in such a way that it just seems to be more and more effective time. Yeah, I mean. I also love to have been those meetings in. It's my one kind of regret in this book that I never actually got. Interviews, it's almost an impossible thing to do. They liked find defectors from the R., you or something. He will tell those stories at a knock it murdered I mean. It's kind of a possible, but but. In some cases? I think your earlier points. They almost seem kind of bumbling in these things they do them in a very improvisational way. for two point Oh seemed almost like it was a justice thing they invented on the spot, tried to cover up some of the the accidental ups like they had left russian-language formatting errors in the documents that they had leaked from the DNC, so they admitted this guy who appeared the next day and started. Talking about being a Romanian. Friends as motherboard Lorenza, Franceschi decry he started this conversation. Align with with Guja for two point, oh basically proved at the guy could not actually properly speak Romanian. BE Russian speaker. In fact, it was. It was almost comical at the same time. They're using very sophisticated hacking techniques doing destructive attacks on a massive scale, but they're also. They seem like they're kind of making it up as they go along. They do things that don't actually seem very kind of strategically smart. They kind of seem like they're trying to impress their boss for the day. Sometimes with just like some sometimes, it's just seems like the Jere. You wakes up in asks themselves. Like what can we blow up today? Rather than thinking like? How can we accomplish the greater strategic objectives of the Russian Federation? So they are fascinating in that way and very stringent colorful group. That's I think one of the biggest questions I have here is. We spend a lot of time trying to imagine what flat and Mirror Putin wants. You know when he grows up, but it. None of this seems targeted like what is the goal for Russia to disrupt the Winter Olympics right like. Is there a purpose to that? Is that just a strike fear? Is it just to? EXPAND THAT SUV influenced. Is it just to say we have the capability furious is there? has there ever really been the stated goal for this kind of cyber warfare? That one is particularly mystifying. I mean you can imagine why Russia would want to attack the Olympics. They were banned from the two thousand Eighteen Olympics doping, but then you would think that they might want to attack the Olympics and send a message maybe like eight deniable message a message that you know if you continue to ban us. We're GONNA. Continue to attack you like like any terrorists would do, but instead they attacked the winter. Olympics in this way, that really seemed like they were trying not to get caught, and instead like make it look like the was Russia North Korea? And then you have to like what is the point of that was? The could kind of. Sit there in Moscow and kind of like rub their hands together in gleefully. Watch this chaos unfolds. It almost really does seem like it was petty vindictive thing that they just for their own emotional needs wanted to make sure that nobody could enjoy the Olympics if they were not going to enjoy them I that was, but that one is i. think outlier in some ways for the most part you can kind of see. The Russia is advancing. The G. R. You that sand worm is advancing something that does generally make sense which is that. In Ukraine for instance, they're trying to make Ukraine look like a failed state. They're trying to make Ukrainians. Lose faith in their security. Services are trying to prevent investors globally from funneling money into Ukraine trying to create a kind of frozen conflict, as we say in Ukraine where there's this constant perpetual state of degradation. They're not trying to conquer the country, but they're trying to create a kind of permanent war in Ukraine and would cyber war. You can do that beyond the traditional front end. It is in some ways the same kind of tactic that they used in other places like the US which. which here we saw more than influence operation that they were hacking leaking organizations like democratic campaign organizations and anti doping organizations to kind of so confusion to embarrass on their targets. They're trying to influence like the international audiences opinion these people, but in Ukraine, it is in some ways, just a different kind of influence operation where they're trying to influence the world's view of Ukraine. Influence Ukrainians view of their themselves under government to make them feel like they are in a war zone even when their kid hundreds of miles from the actual fighting. That's happening on the eastern fronts in the eastern region of. Of Ukraine so in a book you you you go to Kiev. You spent time in Ukraine. Is there a sense in that country that while sometimes light goes out sometimes our TV stations. Their computers don't boot anymore. Because they got rewritten, the Hydros got Zeros like. Is there a sense that this is happening? Is there a sense the defy back is there does Microsoft deploy you know dozens of engineers to to help fight back. How does that play out on the ground there? Yeah, I mean to be fair. Ukrainians are very stoic about these things and regular. Ukrainian citizens were not bothered by you know. Know a short blackout. They didn't particularly care you know. This blackout was the first ever. Hacker induced blackout in history but Ukrainian cyber security. People were very unnerved by this end, people in these actual utilities were traumatized I mean these attacks were truly like relentless sins very kind of scary for the actual operators at the controls I mean in the first blackout attack. These poor operators Ukrainian control room in western Ukraine they were locked out of their computers, and they had to watch their own mouse cursor. Click through circuit breakers, turning off the power in front of them I. Mean They watched it happen? At these kind of Phantom hands to control of their mouse movements, so they took this very very seriously, but yet Ukrainians as a whole I mean they have seen a lot. They are going through an actual physical war. They've seen the seizure of Crimea and the invasion of the east of the country. You know the the date hits. A Ukrainian general was assassinated with a car bomb in the middle of Kiev, so they have a lot of problems, and I'm not sure that cyber war is one of the top of their minds, but not patio I. Did, actually reach Ukrainians normal. Ukrainian civilians to it. It shook them as well. I talked to two regular Ukrainians. who found that they couldn't swipe into the Kiev Metro. They couldn't use their credit card at the grocery store. All the ATM's were down The Postal Service was taken out for every computer that the postal service had was taken out for more than a month. I mean these things really did affect people's lives, but it kind of. A until that kind of climactic worm. Not Patio for I think for this to really reach home for Ukrainians. who have kind of seen so much. How do you fight back? I, mean I one of things that struck me as I was reading. The book is so many of the people you talked to people who are identifying the threat. They're actually private companies. Eyesight was the first even detect it. they are contractors to intelligence agencies the military in some cases, but they're not necessarily the government right like it's not necessarily Microsoft. Who has to issue the patches from the software not necessarily GE which makes simplicity, which is the big industrial controls talk about a lot. How does all that come together into a defense because that seems like harder problem of coordination? Yeah, I mean defense in Cyber. Security is in an eternal problem. It's incredibly complicated, and when you have a really sophisticated determined adversary, it know they will win eventually ends I. think that they're absolutely lessons for defense in this book about you know. Maybe you need to really really think about software updates for instance like the kind that were hijacked to a with this medoc accounting software. As a vector for terrible cyber-attacks. Imagine that like. Any of your insecure apps that have kind of updates can be become a a piece of Malware, really unique to signature networks need to think about patching on. There are just an endless kind of checklist of things to every organization needs to do to protect themselves so. In some ways that just like a Sisyphean task and I don't. I don't try to answer that question in the book because it's too big, and it's kind of boring as well, but what I do really hammer on is the thing that the government's really could've done here. which is to try to establish norms tried to control attackers through diplomacy through kind of disciplinary action through things like kind of Geneva Convention for Cyber War if. If you think about a kind of analogy to say like chemical weapons, we could just try to give everyone in the world a gas mask that they have to carry around with them at all times, or we could create a Geneva. Convention norm that chemical weapons should not be used in if they are than crime, and you get pulled in front of the Hague. Hague and we've done the ladder and I think that in some ways should be part of the the answer to cyber war as well we need to establish norms and make countries like Russia or like organizations like the G. Are you understand that there will be consequences for these kinds of attacks, even when the victim is not the US or NATO or the? The EU and I think we're only just starting to think about that. One of the questions I had as reading is it seems like a very clear red line for almost everyone you talk to is attacks on the power grid right? That is just unacceptable. You should not do it if you do it. You've crossed a line and there should be some consequence. Is, that clear to governments. Is that something that our government says? It's something that the says it has been established. It seems like it's it's the conventional wisdom wants to salvage, but I'm not unclear whether that is actually the line that exists. It definitely has not been established, and when I kind of did these I managed to get sort of interviews with the top cyber security officials in the Obama ends trump administration Jay Michael Daniel was the cyber. Cyber Coordinator for the administration was the kind of cyber coordinator boss in the The Homeland Security Adviser for trump and both of them when I asked him about like wiped. Why didn't you know to put it bluntly like? Why didn't you respond? When Russia caused blackouts in Ukraine? Both of them essentially said well. You know that's not actually the rule that we want to set. We want to be able to cause blackouts in our adversaries networks. In their power grids when we are in a war situation or when we believe it's in our national interest, so you know that's the thing about these cyber war capabilities. This is part of the problem that every country. Absolutely the US among them isn't really interested in controlling these weapons, because we in this kind of Lord of the rings fashion, we are drawn to them to like we want to maintain the ability to use those weapons ourselves and nobody wants to throw this ring in the fires, of Mount Doom. We all wanted maintain the ring and imagine that we can use it for good in out. So that's why neither administration called that Russia for doing this because they want that power to. Make the comparison to to nuclear weapons but Negotiated drawdown and treaties with Russia in the past we count warheads where aware that the United States stockpiles can destroy the world. Fifty Times over today maybe tomorrow one hundred hundred like what we have a sense of the the measure of force that we can. Put on the world when it comes to nuclear weapons, there's a sense that Oh, we should never use these right like we have them as a deterrent, but we've gained out that actually leads to his mutually assured destruction like there's an entire body of academics. There's entire body of researchers. Entire body is got scenario planning with that kind of weapon. Does that same thing exist for for cyber weapons. There are absolutely. Know community is of academics. Policymakers who are thinking about this stuff now, but I don't think it's kind of gotten through to actual government decision. that. There needs to be kind of cyber deterrence in how that would work. In in the comparison to nuclear weapons is like instructive, but not exactly helpful. In fact, it's kind of counter-productive because we cannot deter cyber-attacks with other cyber-attacks i. don't think that's GonNa work in part because we haven't even tried to establish it yet. There are no kind of rules or read lines, but then I think more importantly. Everybody thinks that they can get away with cyberattacks that they can. They're going to create a false flag. That's clever enough that that when they blow up a power grid, they can blame their neighbor instead, so they think they're. They're gonNA. Get Away with it, and that causes them to do it anyway. A not fear the kind of assured destruction so I think that the the right response, the way to to deter cyber attacks is not with the promise of a cyber attack in return. It's with all the other kind of tools we have, and they've been used sometimes, but but they were not in the case of Sand Werman. Those tools include like sanctions which came far too late in the story indictments of hackers. In some cases, we still haven't really seen syndrome. Hackers indicted for the things that they did in Ukraine or or even not petty. And then ultimately just kind of messaging like calling out naming and shaming bad actors, and that has happened to some degree with Sandra, but in some cases there have still been massive failures there there has still been no public attribution of the Sandwich attack on the twenty eighteen Olympics I mean. My Book has been out for months. I think show pretty clear evidence that syndrome is responsible for this attack. The very least it was Russia and yet the US and Korean War, These Olympics took place at UK, none of these governments have named Russia as having done that. That attack which almost just invites them to do it again whenever our next Olympics are going to be, I guess maybe not this year, but if you don't send that message than you're just essentially inviting Russia to try again so I think might my big question is what happens now? I mean right we you write about. The NSA has tailored access operations, which is their elite hacking group. We are obviously interested in maintaining some of these capabilities. We've come to a place where people are writing books about how it works. What is the next step? What is the next? does it just keep getting worse or does this kind of diplomacy you're talking about? Is that beginning to happen I? Think there is some little glimmers of hope about the diplomacy beginning to happen I mean this year in February I think it was the State Department's called out a sand worm attack on Georgia, where a worms hackers basically took down a ton of Georgian websites by attacking the hosting providers as well as a couple of TV's broadcasters in the US. State Department with a few other governments not. said this was sand. Worm named the unit of the GRU. That's is that was confirmation that I've been looking for for a long time, but they also made a point of saying that we're calling this out is unacceptable, even though Georgia. Georgia is not part of NATO or the U. so that's that's progress. That's essentially creating a new kind of rule. That's state-sponsored. Hackers can't do certain things, no matter who the victims and that's really important. Also, it was kind of interesting because federal officials like gave me a heads up about that announcement before happened, which they have very very rarely do and I think they were trying. To say was in we. We read your book and we. Got The message okay like Stop attacking us about this like we're trying. We're doing something different here I. Don't want flatter myself that I actually changed their policy, but it did seem interesting that they wanted to tell me personally about this so i. I think that like maybe our stance on this kind of diplomacy is evolving, and we're learning lessons, but at the same time we also see the attacks evolving to. To and their new innovations in these kinds of disruption happening, we've seen since some of these terrible Sandra attacks. You know other very scary things like this piece of our called Triton or crisis that was used to disabled safety systems in a oil refinery in Saudi Arabia on that was you know that could have caused an actual physical explosion of petrochemical facility? The the attacks are evolving to okay final last real question. Tell people where they can get your book. You can find all kinds of places by on indie Greenberg Dot net. Written another book as well previously, yes. That's right. I wrote a book about wikileaks. Cypher punks and things like that. That's right well. I'm a huge fan. It was an honor to talk to you. Thank you so much for coming on I know it's. It's a weird time to be talking about anything, but the coronavirus I was very happy to talk about something else, which is that it seems a little bit more in control Even if it is quite dangerous, a thank you for the time. I appreciate it. Yeah, I'm glad to provide people with a different kind of apocalypse as a distraction.
Camille Francois on Disinformation Campaigns
"How do foreign actors spread this information online and engage with us to sow chaos or simply spread their message? What have we learned from the campaign of Russian meddling into the two thousand sixteen presidential elections in the US and all we ready for? What's coming in two thousand twenty? Welcome to good code. A weekly podcast on ethics in our digital lives may mean is chain than the. I'm visiting journalist at Cornell Text Digital Life Initiative and I'm your host this week we talk with Kemi Hosoi. She's the chief innovation officer at Graphic and Network Analysis company that studies the spread and patterns of Information Online. She specializes in disinformation campaigns and media manipulation before joining graphic. She was the principal researcher. Google Jigsaw working on electro integrity and this information too. She's been in that space for very long time long before it was in the headlines. Every day I sat down with chemicals wave week ago minutes before her firm released a report called. Red Card which details a recent inoffensive campaign led by an Indian. Pr Firm on several issues including sucker after the two thousand sixteen elections the US Senate Select Committee on Intelligence. Gave graphic out all the data they had on the Russian disinformation efforts targeting the elections millions of posts linked in large part to the Internet research agency the air a patrol farm based instant fetish perk spent seven months studying these posts looking for what she calls the. Abc's of this information actors behavior and content. So I began by asking her to walk us through what that campaign looked like concretely. Just to be clear on something. I don't think we got older data. We had all the data that the Senate could obtain at that time. And I think it's really interesting that nobody to the state had the entire data of everything that happened. The really means that we still have blind spots on this campaign and how you know how it functioned in how targeted users Certainly take a step back. The Russian attempt to target. Us audiences doesn't start in two thousand sixteen. It starts two years earlier with a project called project. Lakhta those two I years between two thousand fourteen in two thousand sixteen really interesting to study because they show a lot of like bizarre experiments that the Russians doing to understand the Americans and to try to see like what are going to be hot button issues. A how can you create panic? How can you go through local media to do that? How can you manipulate local executives to create panic you see in those first two years? Two thousand fourteen in two thousand fifteen a series of again bizarre experiments cullman chemical is one that people tend to be familiar with where the Russian campaign traits to create a local panic saying that chemical plant has exploded of course none of that is true but they send SMS to elected officials? They go on youtube and create fake explosion videos and you know pretty quickly get dismissed as a hoax a year. After that around Thanksgiving they try to create a panic around Thanksgiving. Turkeys being poisoned with Manila. And so you know for two years is sort of like poke around and try different things in two thousand sixteen. Of course it's election year. That is campaign that I think we're all familiar with in so here at that stage. They have fairly developed fake personas rights fake accounts fake individuals fake news organizations and advocacy groups. And those are going to engage in social media to divide the country as much as possible. Sometimes they even tried to use social media to get people to take action. Off-line right so there's a famous case where in Texas. They try to organize to groups of protesters on opposing issues. And they try to sort of like have them be face to face protesting in the streets from one another on the same day at the same time in two thousand seventeen is interesting moment to where the platforms are catching up with security and are starting to take down but at their own different pace facebook as the first to move the identify that some of these groups are not real organizations but are actually run from Saint Petersburg and they start taking it down one by one and that creates a note bizarre situation where these trolls start using the platforms against one another. So in the case of a group that attract many closely that was called black matters. Us was a fake group. It got kicked out from facebook. I in the they sort of moved to twitter to complain about being taken down from facebook and then they starting buying Google ads. In order to redirect traffic from their new websites. Right to two thousand seventeen is very much a cat and mouse chase between the trolls into different platforms and in two thousand eighteen. We see yet a different face of that activity with the midterms. Where here? It's a lot of sort of method. Trolling writes a lot of like telling people that they're going to do something. That's really big in the large campaign when it isn't really exactly the case. Finally we've seen them again at play in two thousand nineteen with a campaign with really good operational security rights of so much harder to look at the accounts and to say. Oh those are the accounts of the IRA but remarkably similar in terms of divisive content. That we have come to know a same communities being targeted of course because they're focused on twenty twenty this time. They're talking about the candidates that they were not talking about in two thousand sixteen Remarkable remarkably consistent strategy in that set. That was taken down in October. Two Thousand Nineteen where so the actors were mostly coming from. Russia on troll farms their behavior. Basically the main trait was what these Very elaborate pursue Nazar. How would you describe their tactics at the time? Yeah it's a great question because I think in reality. They were much more than one actor right. So if you take an actor like for instance it really wasn't in a lot of people's radar and we tend to think like. Oh Iran can learn from Russia and followed along. That's not true. Iran's started using information operations to target American audiences as soon as two thousand nine. They were already a lot of actress. President Two Thousand Sixteen. We were honesty also just not looking for them within the Russian actor is you of course had the I- Rachel Farm. Which is what I just discussed but you also had Russian military intelligence also being active in the election an honesty pursuing very different strategies for the IRA. We saw these very sophisticated fake personas. Some of them were quite popular on lines of my my own favourite troll is Jenna Abrahams. She was presenting as a woman in her mid thirties and her big thing was to do like very funny and engaging jokes online a lot of pop culture commentary and sometimes some really bizarre sort of political and racist commentary. She had built a huge audience to the point that she had often been cited in mainstream media. So that's for the IRA side the story right. So you create very sophisticated personas. Some of them are going to be very successful. And then you sort of used them to divide Americans to sort of like increase chaos in society. That's a bit of different strategy than we've seen from actors like the GRU Russia military intelligence seemed to have been more involved in the hacking and leaking operations right so hiking politicians obtaining material and in creating these campaigns about the release of the material of emails for instance so now fast forward to today. So you brought us through a little bit. What happened in the year before the year? Afterwards and since men in terms of volume has online deception. Faded has it grown. Is it just same? Same Old. Tim will offer Said's very hard to track. But I think it's fair to say that it's changed a lot. Sophisticated actors are getting better in many ways at hiding traces but in many ways investigators in platforms and reporters also getting better at finding these deceptive campaigns. So all the foreign actress side is an interesting cat and mouse game with. I think it's more type of government actors being involved being a little bit better at it every time and growing community of people who are here to expose them in who are sort of like catching up with these techniques. The thing that's also interesting is the growth of a Disney vacation for higher market marketing firms. That are now sort of selling fake profiles in creating fake organizations on behalf of their customers.
"gru" Discussed on Trailer Junkies Podcast
"I'll go with Yes she did it on purpose. Interesting Yeah see not not Nazis bad. I Guess Yeah. Find OUT COME ELECTION DAY. I should say that. Oh my God you have to leave it in two more I. This is me to holy chicken. No yeah that was another one on the trainer so typical Morgan spur-line documentary typical mortgage spurlock. Gotcha documentary yeah like you know informative have but you know it's typical like. I'm just going to show up and then like hey I'm gonNA create like a chicken farm and then I'm just going to open up a chicken. You know. Yeah you know. It's just a typical mortgage spurlock. That's all I gotta say. Oh my God. That's my through a review typical mortgage BIRLA see. You're doing it. Yeah Yeah and then the last one El Camino breaking bad story. Okay you watch that. Yeah we watched that one too so I don't know two hours to tell me he goes to a last. I mean it was okay. I don't know I. It was depressing. You know I mean to say that this guy is on the Lam and his parents and there's whatever murders are going on and he finds the money in the fridge in. Oh but that's a great. That's a great. That's a great sequence. I'm not saying it with Reagan and just saying like overall though man like if that's someone's life like how depressing but to me it was closure closure from the story that happened because they left his they. They closed Walter White but they left pink men hanging. Exactly it's like. They had to come back to say okay. Here's how we're going to close out your character because your character was so profound in the show right and the other characters had a spinoff. Yeah exactly so. I think it's I think it's it's it's what I WANNA do. It was a sweet little spot that just let us have another couple of hours with him and and to see his Dana Mall to see his ending. You know I'll tell you though. Yeah tell me from the previous footage from.
"gru" Discussed on The CyberWire
"Review found. They hardly questioned. Why nap was necessary. Rather than a simpler reporting method though internal correspondent shows that DNC staffers were privy to discussions about the testing and rollout of the Technology Democratic National Committee representatives have consistently maintained that their only role was to ensure the cybersecurity of shadowing software and on the reliability side to create a backup system to double check the delegate math from the APP as a precaution. In case there was a hack if nothing else. The incident probably should teach everyone that security and reliability aren't necessarily the same thing assuming that Iowa reporter APP was as secure as such things can be the fact that it was unlikely to be hacked doesn't mean that it could be counted on to work as advertised. Which of course it didn't in what? Nikkei reads as a warning against attempting to meddle with the Tokyo Olympics. Japan's government has attributed the Softbank breach to Russia's Gru Prime Minister Abe government has sought improved relations with Moscow but the foreign ministry's attribution of the incident two Russian military intelligence suggests that Tokyo remains particularly sensitive to potential threats to the Olympic Games. The Games have been rushing target. Since the two thousand eighteen winter Olympics in South Korea animists against the World Anti doping authorities strictures against Russian teams. Seems to have provoked Moscow with motive enough to hack. Finally we return to the odd case of the Public Safety Hacker Madness poster the West Midlands police issued in the UK. The one that was immediately repudiated last week by the National Crime Agency the West Midlands. Police say they didn't do it. They tell you. Here's the tweet on the subject. The poster produced by a third party was created as an aide memoire to assist teachers with safeguarding and schools. It was taken from wider information on cyber tools. Which could be used to commit cyberattacks but equally have a legitimate purpose l? Okay so they SORTA did it. But let all who've never created an aide memoire cast the first stone.
"gru" Discussed on Radio Free Nashville
"It's the sections titled the GRU that's the intelligence unit inside the, the Russian government GRU's transfers stolen material to WikiLeaks. Well, the GR you in a Wicky league sought to hide their communications, which has limited, the office's ability to collect all of the communications between them, thus although it is clear that the stolen DNC infidels, the documents were transferred from the G R you to WikiLeaks, and then a bunch of the rest of the pages, blacked out by Bill bar page forty six the office was able to identify when the GRU operating through its personas Gustav for two point. Oh and DC leaks transferred, some of the stolen documents to WikiLeaks through online, archives set up by the GRU Assange had access to the internet from the Ecuadorian embassy in London England. And then there's a paragraph blocked out by Bill bar on July fourteen twenty sixteen year. You officers used. Gustav for two point oh, Email account to send WikiLeaks in Email, bearing the subject, big archive and the message, a new attempt the Email contained an encrypted attachment with the name w k DNC link. One dot text GP g using the goose for two point. Oh Twitter account G. Are you officer set WikiLeaks encrypted file and instructions on how to open it on July? Eighteenth twenty sixteen WikiLeaks confirmed in direct message to the goose for two point. Oh account that it had quote the one gig or so archive end quote. That would make a release of the soul documents quote this week on July twenty second twenty sixteen WikiLeaks released over twenty thousand emails and other documents stolen from the DNC computer networks. The democratic national convention began three days later similar communications occurred between WikiLeaks and the G R. You operated persons DC leaks, September's, fifteen twenty sixteen DC. We leaks wrote to WikiLeaks either, I'm from DC leaks. How could we discuss? Submission related issues and try to reach out to you, you're secured chat. But getting no response. I've got something that might interest, you won't be disappointed. I promise the WikiLeaks account re responded. Hi, there without further elaboration, the DC leaks account did not respond immediately that same day. The Twitter account goose for to send DC leaks direct message, which is the first known contact between the personas during subsequent communications page forty seven for two point. Oh, persona informed DC leaks that WikiLeaks is trying to contact DC leaks arrange for a way to speak through encrypted emails and analysis of the meta data collected from the WikiLeaks site revealed that the stolen pedestrian Email show, a credential, creation date of September nineteen twenty sixteen based on information about Assange is computer, and it's possible operating system. This date may be when the Jere you stage, the stolen pedestrian emails for transfer to WikiLeaks, as JR you had previously done in July twenty sixteen for the. NC emails, the WikiLeaks site also released PDF's and other documents taken from Desta the were attachments to emails in his account, those these documents had a creation date of October. Second twenty sixteen which appears to be the day. The attachments were separately staged by WikiLeaks on its site, beginning, September twenty twenty sixteen WikiLeaks DC leaks resumed communications at a brief exchange on September twenty second twenty sixteen DC leaks Email account, the DC leaks project. gmaiLcom Senator Email to a WikiLeaks account with the subject submission and the message. Hi, from DC leaks. The, you know, contained a PGP encrypted message with a file name Wicky underscore mail that t- x t GP next sons is blacked out by Bill bar. The Email however bears, a number of similarities to the July fourteen twenty sixteen Email in which Jere you officers used Gustav for two point. Oh, persona to give WikiLeaks access to the archive of DNC files on September. Twenty-second twenty sixteen. The same day of DC leaks, Email to WikiLeaks the Twitter account at DC leaks at a single message to at WikiLeaks with a string of characters the rest of that paragraph is blacked out by Bill bar. The office cannot rule out that stolen documents were transferred to WikiLeaks through intermediaries, who visited during the summer of two thousand sixteen for example, public reporting identified Andrew Muller Meghan as a WikiLeaks associated who may have a sister with the transfer of these stolen documents to WikiLeaks. And then the rest of page forty seven is redacted by Bill bar. Page forty eight first paragraph is redacted by Bill bar on October seven twenty sixteen WikiLeaks released the first Email stolen from the pedestrian Email account in total WikiLeaks released thirty three trudges stolen emails between October seven twenty sixteen and November seven twenty sixteen. The releases included private speeches, given by Clinton internal communications between pedestrian other high-ranking members of the Clinton campaign in court. Respondents related to the Clinton foundation in total WikiLeaks released over fifty thousand documents stolen from protesters personal Email account, the last time, Email released from pedaza cow was dated March twenty one twenty sixteen two days after but received a spear phishing Email sent by the R, U D, WikiLeaks statement dissembling about the source of stolen materials as reports attributing, the DNC, and d triple c hacks to the Russian government emerged, WikiLeaks Assange bay several public statements apparently designed to obscure the source of the materials that WikiLeaks was releasing the file transfer evident evidence described above and other information uncovered during the investigation does credit WikiLeaks claims about the source of the material that have posed beginning in the summer of two thousand sixteen Assange and WikiLeaks made a number of statements about Seth rich a former GNC staff member, who is killed in July twenty sixteen.
"gru" Discussed on Radio Free Nashville
"The GRU searched one compromise d triple c computer for files containing search terms that included Hillary DNC crews and Trump on April twenty fifth twenty sixteen GRU, you collected and compress PDF Microsoft documents from folders on the d triple C's shared file server repaint pertain to the twenty sixteen election, the GR, you appears to have compressed exfiltrated over seventy gigabytes of data from this file server. Did you are? You also stole documents from the DNC network shortly after gaining access on April twenty second twenty sixteen you to copying files from the DNC network, GRU controlled computers, stolen documents include the DNC's opposition research into candidate Trump between. Approximately may twenty five twenty sixteen in June. I twenty sixteen cheer you officers. Accessed the DNC's mail server from GRU controlled computer, least inside the United States all the footnotes, by the way, the bottom third of the page redacted during these connections. Twenty six one fifty sixty five officers appear to have stolen thousands of emails and attachments, which were later released by WikiLeaks in July of twenty sixteen item. Be dissemination of the hacked materials, the GRU's operations extended beyond stealing materials and included releasing documents stolen from the Clinton campaign and its supporters the GRU carried out the anonymous released through to fictitious online personas that it created DC leaks and goose for two point. Oh in later through the organization. Wikileaks one Wicky DC leaks. The GRU began planning the release it releases at least as early as April.
"gru" Discussed on C-SPAN Radio
"Fifteen twenty sixteen GRU officers using the persona Kusa for two point. Oh, created a WordPress blog in the hours, leading up the launch of the WordPress, blog GRU officers logged into a Moscow based server used and managed by unit seven four four five five and search for a number of specific words and phrases. In English, including some hundred sheets aluminum and worldwide known approximately two hours after the last of those searches Gustav for two point. Oh, published its first post attributing, the DNC server hack to alone, Romanian hacker, and using several of the unique English words and phrases that the GRU officers had searched for that day that same day June. Fifteen twenty sixteen GRU also used the goose her two point. Oh, WordPress blog to begin releasing to the public documents stolen from the DNC and d triple c computer networks the goose for two point. Oh, persona, ultimately released thousands of documents stolen from the DNC, and Detroit and a series of blog posts between June fifteen twenty sixteen and over eighteen twenty sixteen released documents included opposition research, performed by the DNC including a memorandum analyzing potential criticisms of candidate Trump internal policy documents such as recommendations on how to address political. Sensitive issues analysis specific congressional races. And fundraising documents releases were organized around the medic issues, such as specific states EJ, Florida and Pennsylvania that were perceived as competitive in the twenty sixteen US presidential election beginning in late June twenty sixteen. The GRU also use the for two point. Oh, persona to release documents directly to reporters, and other interested individuals specifically on June twenty seven twenty sixteen who's for two point. Oh, sent an Email to the news outlet, the smoking gun offering to provide exclusive access to some leaked e mails linked to Hillary Clinton staff. The GRU later sent the reporter password and linked to a locked portion of the DC leaks dot com. Website that contained an archive of Email stolen by unit two six one six five from Clinton campaign. Volunteer in March twenty sixteen that the goose for two point. Oh, persona provided reporters access to a restricted portion of the. See light leaks website, tends to indicate that both personas were operated by the same or closely related group of people the you continued its release efforts through for two point oh into August. Twenty sixteen. For example, on August fifteen twenty sixteen the gosta for two point. Oh, persona. Santa Canada, for the US, congress documents related to the candidate's opponent on August twenty second twenty sixteen the for two point. Oh, persona. Transferred. Approximately two point five gigabytes of Florida related data stolen from the digital see to US blogger can covering Florida politics on October twenty second twenty sixteen the goods for two point. Oh, persona. Senate US reported documents stolen from the d triple c pertaining to the black lives matter, MO movement. The GRU was also in contact through the goose for two point. Oh, persona with redacted a former Trump campaign member further reductions in early August. Twenty sixteen. Redacted Twitter suspension of the super two point. Oh, Twitter account after it was reinstated. GRU officers posing goose for two point. Oh, wrote redacted the private message. Thank you for reading back. Do you find anything interesting in the dockside posted on August seventeen twenty sixteen the GR you added, please tell me if I can help you anyhow, it would be a great pleasure to me on September nine twenty sixteen GRU again posting gruesome for two point. Oh referred to a stolen, d triple c document posted online and asked redacted. What do you think of the info on the turnout models for the Democrats entire presedential campaign? Redacted responded pretty standard. The investigation did not identify evidence of other communications between redacted and Gustav for two point out, number three, the use of WikiLeaks in order to expand its interference in the twenty sixteen US presidential election. The GR units transferred. Many of the documents they stole from the DNC, and the chairman of the Clinton campaign to WikiLeaks, GRU officers, use both the DC leaks inclusive for two point. Oh, personas to communicate with WikiLeaks through Twitter, private messaging and through encrypted channels, including possibly through WikiLeaks, private communication system section a Wiki leaks expressed opposition toward the Clinton campaign, Wiki leaks. Particularly its founder Julian Assange privately expressed opposition to candidate Clinton well before the first release of stolen documents. In November, twenty fifteen Assange wrote two, other members and associates of WikiLeaks, that we believe it would be much better for GOP to win Dem's, plus Media, Plus liberals would then form a block to rein in their worst, qualities with Hillary, and charged GOP will be pushing for her worst follies, Dem's Media, Plus Neo liberals will be mute. She's a bright, well-connected sadistic sociopath in March twenty sixteen WikiLeaks released a searchable. Archive proximity thirty thousand Clinton emails that had been obtained through freedom of information act, litigation while designing the archive one WikiLeaks member explained the reason for building the archive to another associate. We want this repository to become the place to search for background on Hilary's plotting at the State Department during two thousand nine to two thousand thirteen firstly because it's useful will annoy Hillary. But second because we want to be seen to be a resource player in the US election because it may encourage people to send us even more important links Section V WikiLeaks first contact with USA for two point. Oh, when DC leaks shortly after the first.
"gru" Discussed on Radio Free Nashville
"This is the Tom Hartman program. We're reading from the Muller report, this is a page thirty eight the intrusions into the d triple c and DNC networks, part. B implantation of mala wear on d triple c and DNC networks. They're talking about these units of the GRU you the Russian version of the CIA unit two six one six five implanted on the d triple c and DNC networks. Two types of customized Mel were no in his ex agent and ex tunnel. Nimick cats, a credential, harvesting tool, and are a our ESE tool used in these intrusions to compile and compress material for exfiltration. Ex agent was a multifunction hacking tool that allowed it unit two six one six five to log key, strokes, take screen shots, and yeah. There are other data about the infected computers, CG filed directories not rating systems X tunnel was a hacking tool that created an encrypted connection between the, the victim d triple c slash DNC computers and GRU control computers outside the D triple C, N, DNC networks. That was capable of large scale data transfers G. Are you off their officers than used x tunnel to exfiltrated stolen data from the victims computers, a bunch of the stuff in the footnotes, by the way, I'm page thirty eight is deleted or redacted, page, thirty nine to operate ex agent next tunnel on the DNC and d triple c networks units to six one six five officers set up a group of computers outside those networks, to compete to communicate with the implanted. Mel where the first set of GRU controlled computers, known, at by the G R U as middle servers set and related messages to and from Mel wear on the DNC triple c networks, the middle servers, intern relaid messages to his second set of GRU controlled computers labeled internally, by the G R you, as the AMS panel. The panel redacted served as a nerve center through which Jere, you officers, monitored and directed the malware is operation on the DNC slash d triple.
"gru" Discussed on Don't Worry About The Government
"Advisers and DNC employees GRU officers stole tens of thousands of emails from spearfishing victims, including various Clinton campaign related communications. And we'll have more on those a little bit. Later. So look there's some debate about how serious to take the internet research agencies interference in our electoral system. But I hope by the end of this episode, you'll conclude as I have that only a rank amateur to cyber warfare in any of the concepts involved in hacking would take the GR you, which is Russian state government hacking operations lightly. This is not some three hundred pound man sitting on his bed. I keep going to that metaphor. Because the reason why Trump using that visual is so effective is visceral. We can picture this person. We know who this guy is. And it's way way wrong. This is systematize these organizations have names like unit two six on six five. They're not even namely, the bone squadron or something cool. This is mechanical and what you'll. See here later on. We're about to kinda gal between page thirty seven and page. Forty four here is this is systematic. I wanna get into just how systematic this is by no later than April twelve twenty sixteen the GR you had gained access to the d triple c computer networks using credentials stolen from AD. Triple seem who had been successfully Spearfish the week before approximately six days after the first hacking into the D triple C network on April eighteenth of twenty sixteen happy anniversary on the mole report release date GRU officers gained access to the DNC network via a virtual private network. A VPN connection between the d triple c in the DNC networks between April eighteenth of twenty sixteen and June eighth of 2016 unit. Two six one six five compromised more than thirty computers. On the DNC network, including the DNC mail server in shared the file server so one I mean like right here, and we'll get into Seth rich a little bit later on this episode. But this completely blows out of the water any related loan leaker sort of narrative because what the molar team has in concrete detail, and they're willing to showed in court if they need to is that this is systematic in this involved ping pong through VPN's. And all of these things is simply wouldn't do if you were Seth rich in. You're just the patriotic leaker trying to go to WikiLeaks. Let's get into methods unit. Two six one six five implanted on the triple C in DNC networks. Two types of customized malware known as ex-agent and ex tunnel. We're going to get technical here, which I think is really impressive and a credit to the molar team. There's some places where I disagree. Three with molars legal analysis, and we'll get to those a little later on. But one thing you can't argue against in. This report is similar the concrete detail that Moeller team showed up with exigent X tunnel. Mimi cats, I mean, we're going to get into some real technical shit here. Customized malware known as agent in exile mimicking that's a credential harvesting tool and a rare dot e XY a tool used in the intrusions to compile into compress materials for exfiltration ex agent was multifunction hacking tool that allowed you to six one five to log key strokes take screen shots and together other debt about the infected computer, the file directories the operating systems x tunnel was a hacking tool that created an encrypted connection between the victim. Computers in the d triple c and the DNC network and GRU controlled computers outside of the d triple c and DNC netw-. Folks that were capable of large scale data transfers, this is how they who've everything up GRU officers then used x tunnel to exfiltrated the stolen data from the victims computers. This is not a speculative theory..
The Mueller Report, Unpacked
"After nearly two years of investigation thousands of subpoenas hundreds of warrants and witness interviews, the special counsel confirmed that the Russian government sponsored efforts to a legally interfere with the two thousand sixteen presidential election. But did not find that the Trump campaign or other Americans colluded in those efforts, that's US attorney general William bar on Thursday. He released a redacted version of the long anticipated report from US special counsel, Robert Muller, the FTC managing editor Peter Spiegel talks with F T U S national editor Ed loose about Melissa's findings, and they'll dive into everything from what counts is obstruction to what the report means for Democrats in two thousand twenty. So Ed if you can't couple sentences you've been covering politics for longer than we'd like to admit, what do you think of the significance of this report that came out today? I think it's a hugely significant. This not really been quite such build up to any report. And this is a town of pretty hyped up new cycles. Washington DC does not really been quite such a build up that I can imagine no quite such spilling in advance. William by the tardy general at indicated that this essentially exonerates Trump of collusion with Russia and obstruction of Justice and details in the report provide very different conclusions. So this is highly contentious, it's not the end of the Mueller investigation. It's really m we're really now in the of it in congress is going to pick it up. So it the temperatures just gonna keep rising in my opinion. Let me take those two separate bits of their port and divided up. Because you mentioned the two main ports actually two separate volumes of this four hundred fifty page report one on the quote, unquote, collusion with Russia and the other one on structure of Justice start with with. Russia investigation because as you said it interesting in that, although the central prosecutor could not find evidence of collusion. It's pretty the Russians were trying to help Trump. And it's pretty clear that Trump people were happy to get the help from the Russians. What was your your take on on that bit of the report? Yeah, I mean from the very best page of volume one the buddy that deals with conspiracy. It says Russians attempt to influence the twenty sixteen election was sweeping and systematic. But it also says that the special counsel found extensive contact between the Trump campaign members of the Trump campaign and the Russian government eight concludes, and this is the piece that has been very much picked up on by William Byron others. It concludes insufficient evidence of criminal conspiracy between the Trump campaign and the Kremlin. But that's that's slightly different to how attorney general boss on it. Which was that? He was completely let off the hook of that child. Judge the details that this sort of I two hundred page volume of the mother of pool provides show what instead of commonsense use of the word canoe Zhan ole coordination a lot of evidence across the campaign. People weren't for Trump people related to Trump and Trump himself coordinating the dump of hacked emails with WikiLeaks and cooling upon Russian intelligence offices, the GRU at cetera to conduct the hacking up ration-. So either the headline is Trump's of the hook details that very very different to what the headline would suggest. When I was struck by the bit on WikiLeaks where they do talk about Trump himself getting briefed almost on a regular basis about wanting to know win. The dumps were coming what the communication strategy was going to be it's redacted. We assume as probably Roger stone is the man he's working with because we know in a simple criminal case that stone has been worked was working closely with WikiLeaks. I mean, it's pretty remarkable that a campaign was working that assiduously to get material that essentially being provided for by foreign government. This is what's extraordinary about the report, we often spa news news reports. The dramatic headline is not supported by the content. This is kind of the opposite. Dramatic headline is very much belied by the dramatic content. You have a foreign government that according to the report is offering to help the Trump campaign and actually helping the Trump campaign and the Trump campaign from the nominee downwards is reaching out. Sistani an I in a really sort of deep pattern of extensive contacts with thinly disguised proxies for the Russian government to to coordinate the release if this information damaging to the Clinton campaign. So he he's marched us up to the top of the hill, Robert mala, and I get surprised to say now much down. Again, what he's when he reached the top of the hill is congress over to you here hair or a lot of leads. Here is a lot of evidence. There is no criminally. So the provable case here, but there's a lot of things to work on. And that's essentially what he's saying in this report. And the Democrats have already today said that they would they would pick up the cudgel. And it's interesting as we go to the to the second the second volume, which is on the truck in of Justice. It's almost the same thing there. It is there is not necessarily a legal provable case. But the only reason he. Doesn't pursue it is because of legal technicalities. He makes very very clear in obstruction of Justice section that this is a matter. The belongs properly to the first branch of government in a very sort of passed through detailed reading of legal precedent, and the constitutional precedent there. He says this is Congress's determination. But it is criminally prosecute. There is a scene in the Oval Office where Trump us expletive and says this is the end of my presidency. And this struck me as not only a great bit of drama, but for all the public bravado that Donald Trump and said, you know, there's never been any collusion's been any nothing the minute. He finds out the MO has been appointed. He thinks it's all over, and it's really a striking public or private dichotomy there. And it's funny because mother is writing about what Trump said about Malas appointment. There's a funny tone toward of this of detachment Ma Benz over backwards in this case, many others to say doesn't -sarily beyond old. Doubt proved groped intent in this case, obstruction of Justice that he wanted to find I think for most ordinary people and probably a jury of what they used to cold twelve good men in drew saying my presence. He is finished as evidence that Trump thought mono- would uncover collusion. Some some kind of criminal behavior of the Trump campaign will let me wrap this up is this good for the Democrats are bad for the Democrats because there's been been an argument, particularly some of the presidential candidates who have said, look, we don't focus on Muller. We wanna focus on Trump Russia. We wanna focus on jobs. We want to focus on healthcare. We wanna focus on things that people talk about on the campaign trail. Yes, I think probably the most experienced operates in Washington is Nancy Pelosi the speaker of the house and she's being resisting pressure to start impeachment proceedings against the president because she understands that the public in very subtle Indians at pretty evenly split on this the most people in outside of. Shington have very little interest in this in the democratic presidential candidates. Find good very few questions have anything to do with Russia or matter there about you know. Kitchen table issues as they say and Pelosi knows this I fear. Job of holding back holding back with pressure. Resisting the pressure is gonna be more difficult now because this is not what William bas summarized it to be which was essentially an across the board. Exoneration of trumpets from that. And therefore, the heckles gonna be gonna be rising on the left. Understandably and up is gonna be a lot tougher than it was two days ago
"gru" Discussed on Bloomberg Radio New York
"Hager with world and national headlines. Lisa now, it's up to a dozen twelve packages with bomb like devices inside addressed to critics of President Trump. The FBI says it's recovered a package with democratic Senator Cory booker's address at a postal facility in Florida. The NYPD has ruled another suspicious package from a male building in hell's kitchen that one reportedly directed at former director of national intelligence James Clapper, ABC news now is reporting the police responding to yet another package at seventy second street in central park west if that is confirmed it would be thirteen just after three this morning. President Trump complained on. Twitter that CNN and others are blaming him for the mailings, Bloomberg Washington reporter, Kathleen hunter says it reminds her of how Hillary Clinton once said she would have spent three AM at the White House. It's called the three I'm call ad. And basically, the gist of it was, you know, who who do you want in the White House answering the call about a crisis at three in the morning. It made me think of that, you know. And here we are at a time years later, you know, ten years after that we're here, and we have the president, you know, tweeting himself and three in the morning moments ago. The president tweeted again that this bomb stuff as he put it is slowing Republican momentum in early voting at the polls. He told Republicans to go out and vote in that tweet the Russian military intelligence agency known as the GRU is taking another hit a new report out today. Details misbehavior sloppiness and bad bureaucratic decisions that a lot of Russian crime reporter to expose multiple alleged GRU agents. Sergei of says he wants to expose the problems in organization that has veered away from traditional spying in his view. GRU agents are used of poisoning a former. Spy with nerve agent in England and trying to hack the US presidential election. Global news twenty four hours a day on air and it tick tock on Twitter powered by more than twenty seven hundred journalists and analysts in more than one hundred twenty countries. This is Bloomberg. It only takes time is running out only three northern white rhinos left in the world. But together, we can turn things around you all support to the San Diego zoo wildlife conservancy helps support groundbreaking solutions like Al frozen zoo, which stores the genetic material.
New blow to GRU: More Russian military spies exposed
Nathan Kim, GRU Spy and Nerve Agent discussed on Bloomberg Markets
"Headlines. Nathan kim. Thanks Justice department has charged seven Russian military intelligence officers with hacking anti-doping agencies. Federal prosecutors say. GRU spy agency targeted its victims because they had publicly supported bans on Russian, athletes and international competition. They also say the Russians targeted a Pennsylvania based nuclear energy company as well as the UN's chemical weapons watchdog while it was looking into the nerve agent attack in England on a
Poisoning suspect is highly decorated Russian colonel, investigative group says
"The British investigative group. Belling cat says it has identified one of the two suspects in the poisoning of an ex Russian spy as a highly decorated Colonel of the Russian military intelligence agency, GRU Belen cat said Wednesday that the suspect whose passport name was Roussillon Bushehr off is in fact, Colonel Anatoly Chipita Britain has charged him and another suspect Alexander Petrov with trying to kill Russia next. Spicer gay strip ball and his daughter Yulia Soviet-designed nerve agent, Novi Chuck and the city of Salisbury on March fourth Russia has fiercely denied any involvement in the
UK investigative group: Spy poisoning suspect is GRU colonel
"An online investigative groups as it has uncovered the real identity of one of the Russian intelligence officers links to the souls Breton of agent poisoning of a former Russian spy and his daughter the man Rousselin Bashirov and his colleague told Russian television. They're going to Salisbury to visit its cathedral Gordon career reports. Investigators had said they thought resembled sheriff was a pseudonym for an undercover officer from the GRU Russian military intelligence. Now, the Belen cat investigative team say they've identified the man as Colonel Anatoly Chipita British officials will not comment on the ongoing investigation will let the BBC understands. There is no dispute about the identification a picture of Chipita from a two thousand and three passport file looks like a younger version of the man he used the identity risk Bashir of when visiting the UK
Under fire Danske Bank faces fresh money laundering inquiry
"Power of these tech companies. Now you bring up the fact that they're becoming a media company. And of course we had AT and t. Time Warner merger which included CNN and of what the judge said in his ruling was looking at the outsized power of these companies in the digital advertising space. You see that response, but is regulation. The right strategy are finds the right strategy is any of that going to make a difference when you consider how large the market capitalization of these four or five companies are. So when you have a company like Google with one hundred billion dollars in cash and you find five billion dollars, what you're actively telling Google to do is to continue to break the law. If you had a parking meter in front of your house, that cost one hundred dollars an hour, but the ticket was twenty five cents. You would continue to break the law and that's what we've been telling these companies to do with fines. That might sound large dollar terms, but in terms of impact aren't that large, you ask what we should do. I believe regulation has unintended consequences. I think GDP are has actually emboli. And strengthen these companies position. I believe that the future to oxygen eight, the marketplace is to break these guys up. I think antitrust action is the way to go that there is a real risk of that. Now, I know that the US attorney general Jeff Sessions having a meeting with states attorneys generals next week to discuss this very topic restarting to hear that word, antitrust rebates starting to hear the word monopoly associated with some of these companies. Is that a growing regulatory risk for these mega tech companies? Could you actually see them getting broken up? I used to think there was no way because Amazon is eighty eight fulltime lobbyists in DC. We in the US I would say suffer a little bit from what I call this gross idolatry of innovators and billionaires. We see them as our heroes, but I do think there is a movement of foot now, whether it happens out of DC, I would say most likely, no. I think the pushback is gonna come out of Brussels and possibly a red state. We're an attorney general in that state's he's at the brightest blue line path. The governor's mansion is to make an argument against these tech. Companies to quite frankly probably haven't been good. Have they been going for California? Yes, New York s? Has it been good for Kansas? What's happened to the ad agencies? The retailers, the businesses in those states. I think a lot of these red states have decided, you know, big tech it. We've been net losers here, so I don't think it's going to come out at DC at might the DOJ should absolutely do its job. The call to restrain. The acquisition of this company was read in comparison to the power of these other companies. So I actually do believe there's there is a non zero probability now that the DOJ or the FTC or a state AG Michael after these companies and accused him of anticompetitive behavior and propose antitrust and breaking up as a solution. It's an interesting paradox because you have Amazon yet to announce the second location for its headquarters, and you have, you know, local mayors and governors of morning Amazon at the same time. You see it coming under increasing potential enemy trust scrutiny and other bad headlines following it as well. Do you. You see public opinion changing at all toward the power of these big tough tech companies. While at the same time, we're also dependent on the warm is absolutely turned two years ago. The only argument was is more Christ. Like we're going to be the next president among their see is really the weaponization of the Facebook platform by the GRU of the Russian government changed everything. And now. Oh, citizens. Citizens have are starting to feel a lot more wary about these firms, but you brought up an interesting point the competition to be the host of the next age. Q. and regulation are linked Stephanie because the next headquarters for Amazon will be Washington DC, the metro area, and the reason why, and it was always going to be DC is one the basis have a home there, and CEO gets to pick with a company. Second headquarters are going to be. And so the only thing standing in between Amazon, Amazon's valuation of one trillion in two trillion is regulation, and no one is going to regulate the individual. The throws out the first pitch at the two thousand nineteen opening game of the Washington nationals which will be Jeff Bezos. This competition was a Reuss to transfer wealth from fire departments and school departments to this shareholders of Amazon. It was always going to be DC. This has been a terrible abuse of the Commonwealth. And how many lobbyists does Amazon have in DC right now. Last check Eighty-eight fulltime lobbyists in DC, Scott Galloway. We're gonna have to see if you're right on that. It's going to be embarrassing of announce big Indianapolis. Well, DC could certainly use the jobs, Scott. Thank you so much. Thank you. Let's turn to Europe and the massive money laundering case that shaking the financial world is he? Oh, of Dansk of Bank is out a new report from the firm details. It's employee's failure to conduct basic due diligence on customers and managers, failure to heed warning signs. The tentacles of the investigation and the alleged wrongdoing are spreading regulators in the United States, Denmark and Estonia, or all probing, dansko bank's operations and the probes center on the banks, tiny subsidiary in Stony a- lax controls. They're allowed through more than two hundred thirty billion dollars. They came from thousands of suspicious customers outside Estonia and that dollar amount is nearly twice what was previously reported. The Bank is alleged to have become a conduit for money coming from Russia and former Soviet states. The allegations are linked with fraud cases exposed by Bill. Browder anti-us former lawyer Sergei Magnitsky who was murdered in a Russian prison. Bill Browder himself was kicked out of Russia. He has since filed several criminal complaints over dansko banks. Behavior Bill is the CEO of Hermitage
"gru" Discussed on The Lawfare Podcast
"And what's happened as we've gotten deeper and deeper into it is just that there's this kind of fractional of criminal activity frankly, that you see with Manafort that. I mean, there's a an enormous amount of stuff with Flynn that the press got into that. The special counsel didn't actually put into court documents. There's just there's an with Alex vendor swan, who was sentenced in recent months who worked on the Scott report unto Michenko that you know could have been something that was very significant seems to. Not just be a kind of weird dead end that this this story is so layered and complicated and almost unintelligible at the moment that I think my my hesitancy to say, you know, maybe Manafort really is does have. The answer is here is that the whole mess has just been so resistant to answers thus far. So that's a great basis on which to zoom out right and say, like, all right, where are we? Now on the one hand, Muller has an increasingly impressive record of bringing cases when forced to justify those cases justifying those cases and and garnering. Please when forced to go to trial, get getting convictions on the other hand as Quinta points out, not a lot of answers so far on the fundamental questions presidential collusion to the extent that that's even a question right? What it means. And also presidential obstruction of Justice. So Paul, where do you think we are on the big? I wanna push back on that characterization because I think that Muller's investigation has been a lot more successful. It's only uncertain if you think that the ultimate goal here was to understand President Trump's personal involvement and there were his campaign, but with the IRA in indictment regarding Russian to Fearance social media campaigns and with the GRU indictment involving Russia's clear efforts to violate the computer fraud and abuse act in hack into democratic. So I, I wanna push back a little bit on Quintas characterization that we really haven't learned anything in that this is too complex. That may be true if you're focuses lucidly on the nature of President Trump's relationship to the allegations of Russian interference, but it isn't true if firmly isn't true. If you're broadened the lens bit and you ask whether or not we know more now about what Russia did in the twenty sixteen elections than we did before Mr.. Muller started his investigation before he's starting the SEA about the only thing we had was the Icees conclusion, which was a conclusion without backup evidence that there was a that there that they were convinced that there was interference. Now, if you look at the indictment of the internet research agency in all of the people involved with it, we have a painfully clear exposition of the ways in which Russia a manipulated the social media environment in temp to influence the the election. And if you look at molars, indictment of the twelve GRU operatives military operatives, we have an equally clear in exposition of how they hacked into the DNC hack into the d. Tripolsky hacked into Hillary Clinton's campaign and took information of that and essentially weaponize it both release via WikiLeaks and also released via fake persona, DC and and Gustav for two point. Oh, who are not real people were the Russians pretending to be real people. So we've gone from a place where we had nothing more than the bold assertion of the icy which, frankly, I trusted, but others might not to a place where the forensic information and evidence is sufficiently great that there can be no doubt, none whatsoever in anybody's mind except possibly that of our president that Russia's systematically interfered with our investigation. I think that if we commissioned a nine eleven type commission to examine rushing into. Fearance in the election and tasked with writing a final report, their report will look very much like these indictment. Okay. So one one follow up on that. So if Bob Muller issues a statement tomorrow, saying. Got nothing useful from Paul. Manafort don't have enough to proceed against anybody else shutting down. Got nothing more to say goodbye. Your. You think Bob Muller investigation already a success?.
U.K. charges two Russians with attempted murder of spy, daughter
"And we're gonna start straight away with that announcement by prosecutors here in the UK, so they now have enough evidence to charge two men with the attempted murder of the former Russian spy Sergei scrapple and his daughter Yulia in Salisbury back in March and they've named the two men Russian nationals travelling from Moscow under the names Alexander Petrov and Roussillon share sheriff the police have also drawn a link to the poisoning with the nerve agent Novi chalk of a British couple one of whom died. Well, this is the head of UK terrorism operations Neil Bassey over the last six months, we've meticulously followed the evidence working closely with specialists forensic teams and scientists as we have investigated by the attack on Sergei newly ripple in Salisbury and the poisoning of doing Sturgis and Charlie rolling. Maybe clear, we have not doubt that these two incidents are connected. And they fall one investigation. We now have sufficient evidence to bring charges in relation to the attack on Sergei newies crippling souls, free and domestic and European arrest warrants have been issued and just to explain that Russia's constitution bars extradition of its nationals to another country. But under those warrants if the two men do travel to Europe, well, they could be detained shortly after that news conference by police and prosecutors the Prime Minister Theresa may feed in the house of Commons and insisted the UK government's intelligence had confirmed the two men's links to the Russian state. The government has concluded that the two individuals named by the police and CPS our officers from the Russian military intelligence service. Also known as the GRU the is a highly disciplined organization with a well established chain of command. So this was not a rogue operation. It was almost certainly also approved outside the GRU at a senior level of the Russian
Dozens shot across Chicago in spate of overnight violence
"Which Norman Lear produced and wrote Charlotte Rae in a documentary about the facts of life a spinoff of different. Strokes railroaded giant befall. And a rice sense of humor to both shows which helped revive the flagging fortunes of NBC at the time Charlotte raise last screen appearance. Was in the movie Ricky and the flash When she, was nearly ninety shortly before she was. Diagnosed with bone cancer net Libby NPR. News police in Chicago say at least forty people were shot there over the weekend at least four people died the Chicago Tribune, reports the largest single shooting came early Sunday, morning when gunmen fired on a group of people standing in a neighborhood Chicago police chief Fred Waller link most. Of the shootings to. Gang violence I'm korva Coleman NPR news in Washington Support. For NPR comes from tirerack offering a tire decision guide to help customers find tires that fit their car and, driving conditions with, a network of more than seven thousand independent installers tirerack. Dot com helping. Drivers find deliver install You're hearing morning edition. On k. q. e. d. public radio little later this morning on science will hear about the first pharmaceutical drug derived from marijuana which may soon be coming to drugstores near you it's a medication to reduce, seizures in. Epilepsy patients, a Berkeley teenager was the first patient to try the drug, after his. Mom went to extraordinary efforts and risked. Arrest to get it, for, him here, more on science during morning edition this morning at six twenty two. And again eight twenty two here on kqed public radio. After morning edition it's forum this is. Michael Krasny today on forum in our second hour Airbnb strategic advisor chip Conley joins us to discuss his new book wisdom at warp it's all about how to stay relevant in the workplace as you age join us for forum, it's nine to. Eleven here on public radio Hot and dry weather is forecast in the, Sacramento valley with smoke from wildfires affecting air quality. Today's forecast high in Sacramento is, ninety six degrees with very light to westerly. Breezes this afternoon in the bay area sunny warm day is forecast well hot and dry in the inland valleys of the bay area morning clouds along, the coast should burn off by noon today's highs. Will range from the mid and upper sixties at. The coast to the seventies and eighties around the bay eight upper eighties and low nineties bay area inland seven and a half minutes now past four o'clock morning edition from NPR news I'm David Greene in, Culver City. California and, Noel king in Washington DC good morning what exactly was the, nature of. A meeting between Donald Trump junior and. A Russian operative at, Trump, Tower in, two thousand sixteen the White House I said that meeting was about. Adoption policy but the president has described it in other. Ways and then yesterday he tweeted quote. This was a meeting to get information on An opponent he said in that same tweet that it was legal but he also. Said, that he knew nothing about it the president's, also been tweeting about his former, campaign, chairman Paul Manafort Manafort is back. In federal. Court this week he's on trial for Bank and tax fraud, his trial comes out of special counsel Robert Mueller's investigation into Russian interference Chuck Rosenberg. Is on the line with me now he's, a former federal federal prosecutor he worked in the. Eastern district of Virginia where manafort's, trial is taking place Mr. Rosenberg good morning Good morning well all right so. This isn't the first time that the, president has acknowledged that this meeting. Was affected Lee an attempt to get dirt. On Hillary Clinton President Trump of course. Was not at that meeting why do you think that President Trump is bringing. This back, up now See'ums mightily concerned about it and perhaps with good reason if, you look at the indictment that the Muller team lodged against the Russian military officials. From the GRU we know that in, March and April of two thousand sixteen so prior to the meeting and Trump Tower the g. are you already started to hack into the emails of, the Clinton campaign the Democratic National Committee and the, democratic congressional campaign, committee fast forward to that meeting I. Think, the operative question Noel is what did the US persons Trump, junior Manafort and others attending that. Meeting know, about what the Russians had already done and did? They joined. That, conspiracy even. After it began with the president has said said on Twitter that this meeting was quote totally, legal also though made an attempt or made. An effort, to to, say I didn't know anything. About it I mean could this particular meeting cause legal trouble for president Trump Quite. Possibly it certainly seems like it could cause legal trouble for the Americans who attended the meeting at the very least meeting with a. Hostile foreign power with the Russians should trigger counter intelligence concerns among any sort of savvy political. Person first thing you do is pick up the phone and call the. FBI they don't seem to have done that could cause legal trouble for the president quite possibly as. Well particularly if having heard about the meeting getting the readout from his son about what happened at the, meeting he tries to cover up the intent of the. Meaning he tells false stories about what the meeting was, four and as we know dictates a statement on Air. Force One, concealing the purpose of the. Meeting that's an obstruction of, Justice quite, possibly and it could land the president and others around him and quite a bit of. Trouble let's talk about one person who formerly was around the president who is potentially in quite a bit of trouble palm Manafort since we last talked to you the trial started the government is laid out some pretty powerful evidence for. The jury do you think prosecutors are in a strong position heading into week two or how. Would you characterize your position no I think that's exactly right I think. It's a strong physician and here's why these cases paper intensive document cases tax fraud and Bank fraud. Tender run according to script there's somewhat formulaic the government introduces income they introduce expenditures they put on accountants, to show that the accountants didn't know that Mr. Manafort. For instance had foreign Bank accounts or that he was, concealing income and then unwittingly these accountants help them prepare. Tax returns, that he files with the. IRS which understated income and, omit the, fact that he has control over these foreign Bank accounts all of that is formulaic and. All of that is precisely what's happening in a courtroom in the eastern district of Virginia manafort's case are testifying to These things yeah That's exactly right and so what I expect you'll see in the coming week is a little bit more. Of the same there'll be some summary witnesses from the FBI who will total up the amount of money in the Bank accounts and ultimately will tie those accounts to Mr. Manafort directly will show that he committed income from his. Income tax returns then I expect we'll hear. From, Mr., gates well. Yeah that is that is that is the big, question? This week right manafort's Paul, manafort's longtime deputy Rick gates expected to. Take the stand how does he fit into the? Prosecution, strategy here well criminals tend to. Run with criminals so Mr. gates. Isn't admitted criminal Mr. Manafort is. An accused criminal it shouldn't surprise the jury very much that these two guys plotted together conspired did much of the same thing tax fraud and Bank fraud to fat in. Their own waltz I think the government will put Mr. gates, on the stand they'll they'll have him. Admit To all his wrongdoing that's fairly typical to and then they'll take him step by step through. The indictment having him explain each of the. Things, that, he and. Mr. Manafort did together to cheat the IRS and, to? Fraud banks and just briefly, how do you see Mr. manafort's defense. Lawyers countering the government's case what's your strategy here? Well, they're gonna try and do two. Things one they'll try and say. That Mr. Manafort lack the intent. To defraud the IRS or the bank's perhaps if his income tax returns understated income they'll say it was an accident because he was a very busy man and second I. Think they'll try to pin as much of this on Mr., gates as they possibly can The real one at fault took Rosenberg, was a federal prosecutor in the eastern district of Virginia thanks so much Israel passed a law last month that continues to cause controversy the, nation state law defines Israel? As the, nation state of the Jewish, people critics say this? Law, discriminates against religious minorities like Muslims and. Christians. Who make up about a fifth of the Israeli population as NPR's Daniel estrin reports from Tel Aviv this law is sparking protests, from religious, group that's one of Israel's staunchest supporters the Druze religious minority in Israel. Held an, unprecedented protests this weekend thousands gathered in Tel Aviv's main square chanting the Hebrew word for quality She The you are religious group and shoot of, Islam their ethnic. Arabs but unlike most other Arab, citizens they've committed to serving in the Israeli, army they.
"gru" Discussed on 600 WREC
"Out of the country there was a cover up the DNC put pressure. On the local police to, drop it, to stop, looking into it we also know that the, his his server was accessed illegally from Pakistan so there is national security. Hillary's emails national security The DNC hacking which is just internal politics there's no national security and the fusion GPS which because Russia. Is involved it might be national security which one do they which one. Did they do the indictment on which, one did Which one did they solve Solve the toughest one yeah the toughest one that also has zero Democrats involved in the, possibility of doing anything bad Because it's the DNC hack? It's. The one that is all internal politics no national security and the Democrats were the victim It also like Pat said is the, hardest one to. Solve because this one involves WikiLeaks DC leaks dot, com and Gustav for now if you don't. Have time here to explain all of those but those are mysteries wrapped in an enigma Nobody knows who goose affir-? Was nobody knew who DC leaks were nobody, knows how the DNC servers got to WikiLeaks all kinds of. Speculation but how did all of it happen So here's this is quite interesting We just indicted I think sixteen GRU like the. KGB military version of the KGB we. Just indicted and somebody on this somebody who listen to the, show called yesterday and said Glen and we just. Going to take, the Democrats word? And I said you know what I. Don't know what the evidence. Was let me look into. It we. Started looking into it it's incredible Here's how they. Here's how they did it. The NSA Identified sixteen GRU okay now I don't know about. You but let's, just talk about this like. Mission impossible These? Agents are here and they're all undercover it's like mission impossible how do the? NSA identify these sixteen people we don't know or did, they identify more but only find it on this so. We have the g r you the KGB agents the NSA found. Them. And then they started monitoring them, they tracked them to a bitcoin wallet that's, like You know bit. Pay so okay I can see how the. NSA did that they. Go and they're following these guys and they? See that there's a large transfer from a Bank to a bitcoin wallet well? That's where it should stop because remember bitcoin is unhappy, cobble you cannot you, can't track those that's why drug. Cartels use them because you can't track. Them right Somehow or another the NSA Hacked it and they tracked the bitcoin expenditures to buy a. A VPN A VPN is I think it's a very private network And these are what. You have. To have to go onto the dark web you, can't you, can't just go. Onto the dark web with you know outlook or explorer you need to have a VPN me only reason why you'd have a VPN as you're going to. Do some various stuff. And VPN's also make you invisible you can't, track those so the NSA found the GRE you, guys they then tracked into a bit pay a. Wallet then they followed that money to buy..
"gru" Discussed on KQED Radio
"Separate domestic and foreign intelligence services complete with new names, the lesser known GRU. Founded a century ago, by Russian revolutionary Leon Trotsky just kept. Going under the same name Name in about a decade ago it seized an opportunity did you saw a niche for. Itself what, is it that they could do that other agencies in Russia we're. Not doing at the time and cyber was one of those Joseph fits innocous teaches at. Coastal Carolina university and specializes in spy agencies he spoke to NPR by Skype as, it was up today it's sort of the cutting edge of cyber espionage operations in the. Russian federation but the Russians do leave behind breadcrumbs here again, is the Atlantic council's nemo there's an ultimate between A motive professional. And hacking skill and Very poor publicity surrounding it he's referring to limited. Social media skills in poor English. Grammar it kept on talking about another Hillary Clinton's Abaco Speaker wouldn't do that you'd say. Such examples abound with Russian, trolls consider the effort to sow discord around NFL players taking. A knee before the national anthem at football, games the, trolls use the hashtag. Take the money instead of the more natural English expression take so some of the linguistic clues, were very very basic but very strong giveaway no one expects. Those twelve indicted GRU officers to see the inside of the US courtroom analysts say the Russian agency still appears. To be on the offensive they point to Sergei scrip all a. Former, GRU spy who, was, poisoned this spring in Britain. And barely survived according to the British press GRU operatives are. Considered the main suspects Greg Mary NPR news Washington.
"gru" Discussed on WNYC 93.9 FM
"Separate domestic and foreign, intelligence services complete with. New names the lesser, known GRU founded a century ago by. Russian revolutionary Leon Trotsky just kept going under the same name in about a decade ago, it seized an opportunity, you saw, a niche for itself what is it that they could do that other agencies in. Russia we're not doing at the time and cyber was one of. Those Joseph fits innocous teaches at coastal Carolina university and specializes in spy agencies. He spoke to NPR by sky as a result today it's sort of the cutting edge of cyber espionage operations. In the, Russian federation but the Russians do leave behind breadcrumbs here again is. The Atlantic council's nemo there's an ultimate Between Lot of professional and hacking skill and very poor publicity surrounding. It he's referring to limited social media skills in poor English. Grammar it kept on talking about another Hillary Clinton's backer English speaker wouldn't do that Backer of the retention such examples abound with Russian trolls. Consider the effort to sow discord around NFL, players taking, a knee before the. National anthem at football games the trolls use the hashtag take the money instead of the more natural English expression take a knee so some of the linguistic clues. Were very very basic but very strong giveaway no one expects those twelve indicted GRU officers to see the. Inside of the US courtroom and analysts say the Russian agency still. Appears, to be on, the offensive they point to Sergei scruple a former GRU spy who was. Poisoned this spring in Britain and barely survived according to the. British press GRU operatives are considered the main suspects Greg Mary NPR news Washington It's. All things considered on WNYC I'm Sean.
Trump lifts donor disclosure for some tax-exempt groups
"Our elections they did interfere elections it's really clear there should be no. Doubt about that it's also clear, that it didn't have a material effect on our elections but as a. Result of that we passed tough sanctions. On Russia so that we can hold them accountable I understand the desire and. The need to have good relations that that's perfectly reasonable but Russia is a menacing government that. Does not share interests and it does. Not share our values and I think. It should be made very very clear here's what we have already done. And here's what we. Could continue to do which is to put sanctions on. Russia are you just saw the indictments from the special counsel those GRU. Officers I've already seen the intelligence, they were the people that that conducted this suburb tack on our elections We'd, already put in place sanctions if. The financials if the foreign affairs committee. Or in the financial services committee and the Senate banking committee think that there, are other sanctions that we have not yet placed upon Russia. I'm more than, happy to consider those Russia did meddle with our elections not only did Russia meadow in our elections they're doing it around the world they did it to France they did it to Moldova they're, doing it to the Baltics Russia is trying to. Undermine, democracy itself to. De-legitimize, democracy so for some reason they can look good by comparison let's just be really clear about that and the point we're making here is we know the interfere with our elections and we. Have passed sanctions on Russia to hold them accountable and more importantly what we intend to do is to make sure that they don't get away, with it. Again and also to help our, allies to help those democracies those new and, older democracies in the world we're going. To be facing this kind of Russia again this Russia's, aggression again we. Need to make sure that. We can equip them with the tools they need to stop this from Opening their democracies on. The, Muller issue I've. Been, clear from day one he should be allowed to finish as investigation and carry out his work nothing's changed A, Senator Marco Rubio says he can guarantee the Russians will interfere with the next. Election and he's pushing legislation to impose tough sanctions if they do many lawmakers asking what. Happened behind closed doors during that two hour meeting with Vladimir Putin Mike Pompeo is set to testify next week. On that, President Trump tweeting just moments ago Russia's agreed to help with North Korea where. Relationships with us are very good in the process is moving along he says there's no rush the sanctions remain big benefits and exciting future for. North Korea at the end of the process of the. Trump administration's lifting requirements that some tax exempt groups disclosed the identities of donors to federal tax authorities the. Change, benefits groups that spend millions on political ads Republicans accused the IRS during the Obama administration of liberal bias and unfair targeting of conservative tax. Exempt groups now those groups figure. Among the organizations allowed to withhold their names of donors under the new. Policy announced Late Monday treasury officials portrayed the changes as. Important free speech and privacy protections but critics see it as opening the door to more dark money in political campaigns meanwhile unions from around the country are pouring money into Missouri ahead of a statewide. Vote that, could ban mandatory union fees at workplaces it comes just weeks after the supreme. Court issued a ruling that delta blow to public sector unions the group fighting a ballot measure that would make Missouri right to work state is. Outraged opponents by nearly six million dollars over the past. Four months a deadly wildfire near Yosemite national park is filled the area with smoke but it's not keeping. Tourists away from the popular destination despite the conditions tourists are still coming tourist dependent businesses are still open We've seen just a lot, of a lot of smoke the smell of smoke when we went back, to our hotel last night or. Close definitely small lakes Anything We've been planning on coming here for years and finally made it but little. Disappointed but like I, said we're here Here we actually. Have not seen. Any cancellations so which is great and it's not packing business come through forty-one restaurants. Is still open everything, still open That's important to get the message. Out the business Audio courtesy.
"gru" Discussed on WMAL 630AM
"Been done without a special counsel correct Yep Yep absolutely there was no need for a special counsel here and, in fact that is I think that attorney general or, deputy attorney general Rosenstein made that clear. In his remarks on Friday tells us that this case which, bore has now indicted with great fanfare is, no longer even Muller's case it's being transitioned to the Justice Department's? National security division and that the reason for that is obvious double, one there's no reason the Justice department couldn't have handled this case. In the first place that is there's no conflict of, interest which prevented the Justice department from doing this investigation and Secondly because the national security division is, the place in Justice that handles the counterintelligence work that. Isn't supposed to end up in criminal proceedings. In the first place it's a natural place for this indictment to be. Buried which is exactly what's going to happen. I want to press. On this because when Roseanne scenes spoke he's spoken in the. End The representation of the Muller special. Counsel investigation of the allegations of collusion at no point, in the indictment or and Mr. Rosensteins words did I, hear a link. Between the Trump campaign or President Trump then candidate Trump and these GRU officers, if Muller is bringing this isn't a link necessary for the logic of what. He's doing, wouldn't it be good if he were able to link these GRU officers with the allegation that myth sued knew about these purloined emails and spoke about it, with popadopoulos which we're told was the beginning of the, Russia gate investigation by the FBI doesn't. That all make a a neat case if Rosenstein could all, put that together for Andy Yeah well it would be good as a legal case it. Would be a disaster for the country because of what it would portend but you're quite right I mean the whole purpose the only purpose John that we needed a, special counsel for boys where there would have been a conflict of interest which would have involved the Trump. Justice department having to investigate the Trump administration members of the Trump administration and the basis, for conducting that exercise has been this narrative that there was collusion between the Trump people in Russia so if they had it of course they would try to prove, it they just don't have and he didn't try he didn't even explain how this this GRU office officers has anything to, do with Muller he didn't even try to explain Well no of course I mean he probably figured that you know look it takes it takes. Two. To, Tango and if you're going to prove Trump, collusion with Russia has to have been something to collude in in the first. Place so this is. The part, that explains what, it was that Russia was doing the only problem is the facts won't cooperate the fact that Muller has uncovered which really he hasn't uncovered this is stuff that we've known for years now yes we've known at least for years we've known about this yes right at what we know is that Russia conducted this operation and concealed it from. The Eddie Americans that they, came into, contact indeed they even concealed their. Identities from WikiLeaks so be the molar what. What Muller has indicted now on the logic of it even more strongly than ever suggested. There could have been no collusion We're speaking with. Andrew, McCarthy of the national review online. Thaddeus McCotter WJR the. Great, voice of the Great Lakes events are tumbling so quickly we can forget Peter Struck but no we'll return with Peter Struck and. The, demonstration that congress has no place to. Have an argument I'm John bachelor this is the John Batchelor show one zero five point nine FM and AM six thirty Washington's mall w. a. l. My, name is, Lawrence Sullivan.
"gru" Discussed on Skullduggery
"He's a former gru officer right so he was former gru but but but the wording of the filing says that the fbi assessment was in the pri tenth why to the dan would say before the russian view that wants an intelligence officer you're always intelligence officer right that's right i mean that's what they say she could us via took of nipah vied there's no such thing as a former intelligence off well particularly on point since we are now talking to a former intelligence office yes because i haven't come back too quickly to the cause i raise this before about targeting oligarchy and there was the cnn story that muller's investigators actually like stopped a we don't have to name but a russian oligarch coming into the united states and searched him and questioned him and so i just wanted wanted to know your reaction to that it seems like a pretty aggressive tactic on the part of muller maybe he's sending his own message and i think he's doing his information gathering work he's gathering the facts and the all oligarchy have a lot of money he's following the money's following the all the guards links whether to us citizens or the kremlin or both i wouldn't necessarily jump to the conclusion that the olive garden himself is a person of interest it may be the people with whom the oligarchy was in in contact back in russia and and muller may just feel like this is a good opportunity to to learn something about the spiderweb that that is russian russian interaction between the kremlin and wealthy russian business people but again i think the one thing about the special counsel i mean one thing you can say is certainly there's not any leaking going on for sure and so it's hard for us sometimes we have to speculate about the motive behind some of their moves but they've also been absolutely ruthless and i mean it's in the most positive way about collecting every fact they can and i think that's talking about muller or the russians start about molar special counsel and i think that that's a laudatory quality that's exactly what we want although i do have to wonder about about the grabbing of the electron ix i know that any.