A power company in the Midwest hired a group of white hat hackers known as RedTeam Security to test its defenses. We followed them around for 3 days, as they attempted to break into buildings and hack into its network, with the goal of gaining full access. And it was all much easier than you might think. Based on our experiences, it would seem that power companies need to step up their game in the fight against cyber attackers or it could be “lights out.”
— If you’ve ever wondered if your passwords have been involved in a data breach, there’s now an easy way to find out. A digital security expert in Australia just created a tool in the form of a quick online search that allows people to check whether any of their passwords have been some of the roughly 320 million already compromised thus far.
Troy Hunt, founder of Have I Been Pwned — the website through which the Pwned Passwords service is freely offered — said in a blog post introducing the new tool that the idea is about giving people the means to verify suspicions:
“The point of the web-based service is so that people who have been guilty of using sloppy passwords have a means of independent verification that it’s not one they should be using any more. Mind you, someone could actually have an exceptionally good password but if the website stored it in plain text then leaked it, that password has still been ‘burned.’”
The Have I Been Pwned site, launched in 2015, offers a similar service for email accounts and usernames, though it requires users to sort through individual data breaches. The Pwned Passwords feature, in contrast, allows people to search for their passwords directly.
Hunt said in his blog post that he hopes the tool will help raise awareness about the issue of online security:
“As well as people checking passwords they themselves may have used, I’m envisaging more tech-savvy people using this service to demonstrate a point to friends, relatives and co-workers: ‘you see, this password has been breached before, don’t use it’.”
While he notes on the Pwned Passwords page that users shouldn’t search for passwords they currently use, Hunt says that point should really be a no-brainer.
“It goes without saying (although I say it anyway on that page), but don’t enter a password you currently use into any third-party service like this!” he writes. “I don’t explicitly log them and I’m a trustworthy guy but yeah, don’t.”
For those who still choose to search for their current passwords, Hunt has also made the entire database available for download in three files totaling 5GB.
WikiLeaks has released a trove of data belong to the American intelligence agency CIA (Central Intelligence Agency) – The latest batch shows how CIA uses five different malware to target unsuspecting users.
These malware are called HammerLoss, Regin, HTTPBrowser, NfLog, and Gamker – The documents also show how CIA used Raytheon Blackbird Technologies, a contractor for the Remote Development Branch (RDB) of the CIA.
The nightmarish revelations from Julian Assange are from over, and the latest batch of documents after the release of Vault 7 has startling new information about the CIA’s ability of hacking and infiltrating its targets. The data includes reports from experts about the way various malware programs owned and used by the CIA are used and the way these programs function. In total, there are five files.
This new batch of files is dubbed as UCL/Raytheon and contains documents maintained by Raytheon Blackbird Technologies. The firm is a contractor for the Remote Development Branch (RDB) of the CIA and believed to be its Technology Scout.
Film Director Oliver Stone on Monday night started a fight about Israel with host Stephen Colbert, on the CBS “Late Show” that never made it to air, the NY Post Page Six reported. A source in the audience said the political brawl was “painful to watch.”
The Oscar-winning Stone appeared on the show to promote his latest documentary, “The Putin Interviews.” Stone was granted unprecedented access to both Putin’s professional and personal worlds, and interviewed the Russian leader more than a dozen times over the course of two years, most recently in February following the U.S. presidential elections.
After showing a clip in which Stone clearly accepted without a hint of criticism Putin’s statement that Russia, unlike the US, never interferes in other countries’ elections, Colbert harangued Stone on his pussyfooting around the tyrant from Moscow.
NSA contractor Reality Winner allegedly leaked documents showing that Russia probed U.S. election systems days before the 2016 presidential election.
How big a crisis is this?
Washington’s Blog asked Bill Binney, the NSA executive who created the agency’s mass surveillance program for digital information, who served as the senior technical director within the agency, who managed six thousand NSA employees, the 36-year NSA veteran widely regarded as a “legend” within the agency and the NSA’s best-ever analyst and code-breaker, who mapped out the Soviet command-and-control structure before anyone else knew how, and so predicted Soviet invasions before they happened (“in the 1970s, he decrypted the Soviet Union’s command system, which provided the US and its allies with real-time surveillance of all Soviet troop movements and Russian atomic weapons”).
Binney told us:
If you think about this article [the story by the Intercept], and assume it’s true, then hacking a few days before the election is a little late if they really wanted to influence the voting.
To me, this sounds more like fishing for information to find out as much as they could about the democratic party much like the Chinese did hacking the OPM [U.S. Office of Personnel Management] files. I’m sure the Chinese found more use for the data they got then the Russians did on the Democratic party because Hillary did not win.
The Intercept article cites an unnamed intelligence official who “cautioned against drawing too big a conclusion from the document because a single analysis is not necessarily definitive.” To that I would add, “even if it is all true as described.”
And I would also make some additional observations about what the report and Intercept article are suggesting. First and foremost would be the questions of scale and timing.
There is no evidence that the Russians, or whoever carried out the probes, were able to tamper with either the actual voting process or the tabulation of votes. Indeed, the NSA report dismisses any such possibility. Second, corrupting an election in a country as large as the United States with an electoral system that is largely decentralized would require much more than a probe of 122 local officials starting a week before the balloting. So there was clearly no intention to disrupt the election or to tilt it in a certain direction based on the evidence provided by the NSA report.
I would also note that there is no proof provided in the report to support the assertion that the GRU, Russian military-intelligence service, carried out the probes. Would a highly-sophisticated intelligence service behave so transparently in an operation that would certainly be regarded as highly sensitive? I think not. Cut-outs would have been used to misdirect anyone looking to determine the hand behind the hacks.
All of which is not to say the Russian government didn’t do it or order it done, but it seems to me that the revelations provided in the NSA report do not go very far beyond the kind of random probings that are part and parcel of foreign-intelligence operations as carried out by any sophisticated service. Did someone in Moscow think it might be useful to have some kind of idea of how to meddle with U.S. election technology if that type of info might prove useful down the road? Quite possibly. It should be noted that the U.S. National Security Agency illegally collects vast quantities of information on ordinary Americans but that does not necessarily imply intent to use it in a malicious way. It is a desirable capability and intelligence agencies are always working to expand their reach.
So was Russian intelligence probing U.S. electoral systems? Quite plausibly yes, and it should be a matter of concern for every American as it suggests a vulnerability in the electronics behind how we vote. But did Russia actually interfere with the election or seek to use the probing to elect a particular candidate? The answer is clearly no. The article and the document it is based on should serve as a wake-up call to those who are complacent about the security of our technologies. But on a political level, we are back to square one, with often hysterical allegations surfaced as part of the media and political storm we now refer to as Russiagate.
One of the most under-reported aspects of fired FBI Director James Comey’s much-ballyhooed testimony before the Senate Select Committee on Intelligence was the bombshell that much of the reporting on Team Trump and the White House by the disgusting “mainstream” media has been absolutely false.
As in, not even close to the truth.
One such report by The New York Times on February 14 claimed in the headline, “Trump Campaign Aides Had Repeated Contacts with Russian Intelligence.” It was nothing but fake news.
OK. You had mentioned before about some news stories and news accounts. Without having to go into all of the names and specific times and be able to dip into all of that. Have there been news accounts about the Russian investigation or collusion about the whole event or as you read the story you were wrong about how wrong they got the facts?
Comey replied: Yes, there have been many, many stories based on — well, lots of stuff but about Russia that are dead wrong.”
He added, after further questioning from Sen. James Risch (R-Idaho):
The challenge, and I’m not picking on reporters, about writing stories about classified information is the people talking about it often don’t really know what’s going on, and those of us who actually know what’s going on are not talking about it. And we don’t call the press to say, ‘Hey you got that thing wrong about this sensitive topic. We just have to leave it there.
Here is the relevant exchange:
So in other words, Comey said directly what so many of us in the alternative media have suspected for quite some time: Much of what’s being reported by the shrillest of anti-Trump media — the Times, the Washington Post, CNN — is completely bogus, planted by Deep State types to impugn, malign and undermine President Donald J. Trump and ruin his presidency. And this is why we have regularly urged our readers to take that other stuff with a grain of salt.
So much “anonymous” reporting has also been a problem, and while reporters are trained to jealously guard their sources, sensational items being reported about the Trump White House were coming far too often to be legitimate. Plus, there was definitely a political nature to the leaks — everything was negative about Trump and his administration, which was a huge tip-off.
“The assumption of the critics of the president, of his pursuers, you might say, is that somewhere along the line in the last year is the president had something to do with colluding with the Russians…to affect the election in some way. And yet what came apart this morning was that theory,” Matthews said on his network after Comey’s testimony aired.
There’s more. CNNhad to retract a story it published the day beforeComey’s testimony, in which the network claimed “sources” said the former FBI director would refute Trump’s claim he was told multiple times by Comey that he was not the subject of any FBI investigation.
“Comey is going to dispute the president if he’s asked about it by the senators,” said Gloria Borger, one of four reporters who claimed Comey would refute it. “He will say that he never assured Donald Trump that he was not under investigation, that that would have been improper for him to do so.”
Turns out that Comey did say during testimony he informed Trump on multiple actions that he was not the subject of any investigation.
He also informed Congress of same. Funny though how that tidbit of information was never leaked.
J.D. Heyes is a senior writer for NaturalNews.com and NewsTarget.com, as well as editor of The National Sentinel.
Unproven allegations by U.S. security agencies that the Russian government ‘hacked the U.S. presidential election’ are a classic case of the criminal hiding behind the cloak of the accuser.
Documents from the U.S. NSA (National Security Agency) unveiled by Edward Snowden show that whole countries, not just a number of sensitive computers, have been hacked by the NSA.
In the case of China, for example, it is hardly an exaggeration that a whole nation and its people have been hacked. Here’s a partial list of the illegal intrusions by the Washington-based spooks:
1. The undersea cable through winch internet data enters and leaves Hong Kong was physically cut into by the NSA, giving it access to all foreign communication of the city.
2. Hundreds of millions of Chinese people’s SMS text messages were stolen by the NSA from the system of China Mobile, the world’s largest mobile phone system
3. The phone of China’s then-president Hu Jing Tao was tapped and his conversations monitored.
4. China’s Tsiinghua university’s ”backbone system’ through which communication of important research labs throughout China passes was hacked. Some of those labs also perform sensitive military-related research.
5. The server computers manufactured by the leading Chinese company Huaweii – which are used in China and all over the world – were hacked by the NSA, allowing it to capture the large amounts of data passing through the servers wherever they are used.
Finally, the U.S. government, and the NSA, have never apologized nor stated that they will stop hacking China and its people.. It’s hard to take allegations of hacking against Russia, China, or others seriously when they emanate from such sources.