(Above) Photo credit: CBS 60 Minutes
(Above) Photo credit: CBS 60 Minutes
Has Julian Assange gone overboard with the latest WikiLeaks‘ dump of over 200,000 Sony documents and emails on its website this week?
“This archive shows the inner workings of an influential multinational corporation. It is newsworthy and at the centre of a geo-political conflict. It belongs in the public domain. WikiLeaks will ensure it stays there,” Assange explains in his press statement.
Sony’s lawyer David Boies was certainly not impressed and he has sent letters to media outlets urging them not to make use of the data, according to a Bloomberg report.
Here’s an interesting experiment (below) on where did those stolen data go after a data breach.
The list of those 22 countries where the (fake) sensitive data were accessed is noteworthy, especially if one falls under your jurisdiction – mine in the list…
What happens to data after a breach?
Posted on 07 April 2015.
Bitglass undertook an experiment geared towards understanding what happens to sensitive data once it has been stolen. In the experiment, stolen data traveled the globe, landing in five different continents and 22 countries within two weeks.
Overall, the data was viewed more than 1,000 times and downloaded 47 times; some activity had connections to crime syndicates in Nigeria and Russia.
Threat researcher programmatically synthesized 1,568 fake names, social security numbers, credit card numbers, addresses and phone numbers that were saved in an Excel spreadsheet. The spreadsheet was then transmitted through the Bitglass proxy, which automatically watermarked the file.
Each time the file is opened, the persistent watermark, which survives copy, paste and other file manipulations, “calls home” to record view information such as IP address, geographic location and device type. Finally, the spreadsheet was posted anonymously to cyber-crime marketplaces on the Dark Web.
The experiment offers insight into how stolen records from data breaches are shared, bought and then sold on the black market. During the experiment, crime syndicates in Nigeria and Russia emerged via clusters of closely-related activity. Traffic patterns indicate the fake data was shared among members of the syndicates to vet its validity and subsequently shared elsewhere on the Dark Web, beyond the original drop sites.
In 2014, 783 data breaches were reported, which represents a 27.5 percent spike over the previous year. Data breaches continue to spike in 2015 – as of March 20, 174 breaches, affecting nearly 100 million customer records were reported. While many are suffering from data-breach fatigue, this experiment sheds light on how cybercriminals interact with pilfered data and thus helps enterprises understand why visibility is critical when it comes to limiting the damage of breaches.
The falsified data was placed on Dropbox as well as on seven Dark Web sites believed to be frequented by cybercriminals. The result of the experiment found that within 12 days the data was:
– Accessed from five continents – North America, Asia, Europe, Africa and South America
– Accessed from 22 countries – United States, Brazil, Belgium, Nigeria, Hong Kong, Spain, Germany, the United Kingdom, France, Sweden, Finland, the Maldives, New Zealand, Canada, Norway, the Russian Federation, the Netherlands, the Czech Republic, Denmark, Italy, Turkey
– Accessed most often from Nigeria, Russia and Brazil
– Viewed 1,081 times, with 47 unique downloads.
Here’s the video clip of Edward Snowden’s latest public appearance (via video conference) on 14 February 2015 at the The Davis Levin First Amendment Conference, to a sold-out audience at the Hawaii Convention Center in Honolulu.
Previous speakers at this event include Daniel Ellsberg, Kenneth Starr, US Supreme Court Justice Antonin Scalia, Ralph Reed, Nadine Strossen and Jay Sekulow.
The decision by Russian President Vladimir Putin to leave the G20 summit in Brisbane, Australia prematurely earlier this week, following a cold reception by other world leaders for his incursion into Ukraine, hit the global headlines but Putin, who bailed himself out on sleep deprivation grounds, might actually be laughing on his flight back to Moscow: his recognition of the rapidly deteriorating relations with the West and fear of being surrounded by enemies have probably justified his decision to beef up Russia’s espionage operations.
But it was probably for the same reason – the increased efforts in intelligence gathering – and its consequences that also prompted Putin to rush back to the Krelim.
According to the Russian Foreign Ministry earlier this week, Poland “made such an unfriendly and incomprehensible step” to expel some of its diplomats and subsequently:
Russia undertook adequate response measures. Several Polish diplomats have left the territory of our country for the activities not compatible with their status.
The Russian media reported last weekend that Moscow has deported former Latvian parliamentarian Aleksejs Holostovs after its intelligence agency, the Federal Security Service (FSB), alleged Holostovs of spying for both Latvia and America’s Central Intelligence Agency (CIA).
Germany’s Der Spiegel magazine also reported last weekend that a female diplomat at the German embassy in Moscow was expelled after a Russian diplomat working in Bonn was forced to leave amid media reports the latter was a spy.
There could be more to come following these sudden frenzies on the deportations of suspected Russian spies, and Russia’s (usual) tit-for-tat response, much reminiscent of the Cold War era.
And speaking of the Cold War, here’s a nice wrap up (below) from The Moscow Times about 6 spies who have defined that era.
One lasting impression I had on Robert Hanssen (below) – a former US Federal Bureau of Investigation agent who spied for Soviet and Russian intelligence services against the United States for 22 years from 1979 to 2001 – was the book Spy: The Inside Story of How FBI’s Robert Hanssen Betrayed America which described Hanssen’s initial reaction when he was eventually caught:
“What took you so long?!”
Six Spies Who Defined the Cold War Era
The Moscow Times Nov. 17 2014 21:54
1. Aldrich Ames
Plagued by drinking problems and a propensity toward extramarital affairs, Ames was lured into spying for the Soviet Union by the promise of money. Over the course of nine years, he received $4.6 million for revealing at least eight CIA sources. He was arrested in 1994 and sentenced to life imprisonment.
Also motivated by the siren’s song of money, Hanssen worked for both the Soviet Union and Russia. He was suspected of acting as a double agent on a number of occasions, but was only arrested in 2001 while dropping off a garbage bag full of information in a park near Washington D.C. The failure to identify him for several decades was described by the U.S. Justice Department as “possibly the worst intelligence disaster in U.S. history.” Hanssen was sentenced to life imprisonment.
Both Hanssen and Ames reportedly exposed Polyakov’s work as a CIA agent. A Soviet major general and a high-ranking GRU military intelligence officer, Polyakov served as a CIA informant for 25 years, ultimately becoming one of the best sources for the agency, providing information on the growing rift between the Soviet Union and China. He was arrested by the KGB in 1986, sentenced to death and executed in 1988. According to CIA officers who worked with him, he provided the information out of principle, not for money.
4. Kim Philby
Philby was the most successful member of the Cambridge Five, a group of British spies who — driven by their socialist beliefs — defected to the Soviet Union. Philby was MI-6’s director for counter-espionage operations. In particular, he was responsible for fighting Soviet subversion activities in Western Europe. After arousing suspicion that he might be a defector, Philby was dismissed from his post and from MI-6 overall in 1956. He fled to the Soviet Union in 1963, where he lived until his death from heart failure in Moscow in 1988.
After growing disenchanted with the KGB and the Soviet Union, Gordievsky, a KGB colonel, became a longtime high-ranking spy for MI-6. In 1982, he was promoted to manage Soviet espionage in Britain as a resident in the London Embassy. He was called back to Moscow on suspicion of working for a foreign power, but the British managed to smuggle him out of the country. He has lived in England ever since.
Shevchenko was one of the highest-ranking Soviet officials to defect to the West. Working as undersecretary general of the United Nations, he became a CIA informant in 1975. Shevchenko was often referred to as a triple agent: While working as a Soviet diplomat at the UN, he was allegedly passing secrets to the U.S. In 1978 he fled to the U.S., dying of cirrhosis of the liver there in 1998.
The American whistleblower and most wanted fugitive Edward Snowden could receive Swiss asylum if he opts to travel to Switzerland to testify against the National Security Agency, according to Swiss newspaper SonntagsZeitung today.
The Swiss attorney general is apparently keen in Snowden’s testimony against the US intelligence agency and said to guarantee his safety, and not have him deported to the US, according to the Swiss paper based on a document they obtained: “What rules would apply if Edward Snowden is brought to Switzerland and the United States makes an extradition request”.
It will be interesting to know if there’s any other reasons why the Swiss government are keen to keep Snowden – the NSA stationed Snowden in Geneva for 3 years through 2010, deployed as undercover with diplomatic credentials.
Snowden was recently granted a three-year residence permit by the Russian authorities on August 1.
It was revealed that prior to the NATO Summit on September 4-5, German Chancellor Angela Merkel received a memo from a group of US intelligence veterans (with names disclosed) warning about the reliability of Ukrainian and US media claims regarding a Russian “invasion”.
According to the veterans from the Veteran Intelligence Professionals for Sanity (VIPS), the ” accusations of a major Russian “invasion” of Ukraine appear not to be supported by reliable intelligence. Rather, the “intelligence” seems to be of the same dubious, politically “fixed” kind used 12 years ago to “justify” the U.S.-led attack on Iraq”.
You can find the entire memo below.
From China with Love
It’s the one year anniversary of what is now known as the Snowden revelations, which appeared on June 5 and June 9 when The Guardian broke news of classified National Security Agency documents and Edward Snowden revealed himself in Hong Kong as the source of those leaks.
There is still much to decipher from the chronology of events in the aftermath and the sudden global awakening to the end of privacy. Among the impacts on the personal, business and political fronts, one interesting salient feature is the hypocritical rhetorical spats between the US and China in recent weeks, which could set the undertone for US-Sino relations for years to come.
Snowden said his biggest fear is that nothing would change following his bold decision a year ago.
You can find the entire column here.
In the increasingly pugnacious cyber espionage war, the US is not only admittedly losing out to countries like China and Russia but the real headline news is, the US is still at a loss on how to protect itself against the massive intellectual property threats on its very turf.
The chairman of the House Intelligence Committee Rep. Mike Rogers told audience at the Intelligence and National Security Alliance (INSA) cyber conference, held on 26 September in Washington DC, that the US is “running out of time” – US government officials have stated that no country engages in cyber espionage as systematically, thoroughly and broadly as China and the theft of critical intellectual property is billing up to US$1 trillion.
The Rogers-Ruppersberger Bill designed to stem the tide is facing resistance at the Senate.
This Bill proposed to offer business liability insurance cover to the business community. In return, the victimized companies would have to share their threat information with the government, who will in turn share that experience with the business world.
(What? Are you kidding me?! Okay, I hear you at the back row).
Need I say more? Find out more about it here.