CO 101: Battlefield Intelligence

BATTLEFIELD INTELLIGENCE: A PRIMER ON COLLECTION & EXPLOITATION

 

Extremely valuable primer on collecting intel in the field.

Stay Alert, Stay Armed and Stay Dangerous!

 

4GW: Russian Space Experiments puts U.S. on Alert

‘Secret Russian space experiments’ puts US on ALERT: Unprecedented programme sparks fears

 

“Russian Nesting Doll???”

This stuff is Straight out of a Clancy Novel.

 

Stay Alert, Stay Armed and Stay Dangerous!

Cyber-Warfare Update: iPhone Weaknesses Made Apparent by Israeli “Digital Arms” Company

FILE - In a Wednesday, Dec. 7, 2011, file photo, a person stands near the Apple logo at the company's store in Grand Central Terminal, in New York. There's a shadowy global industry devoted to unlocking phones and extracting their information. For digital forensics companies, success can mean big bucks in the form of government contracts. And the notoriety that could come with cracking an iPhone used by a purported terrorist could rocket them to cyber stardom. (AP Photo/Mark Lennihan, File)

Apple boosts iPhone security after Israeli spyware reveals startling weaknesses

(click on above link to be re-directed to source page)

 

Leave it to a bunch of retired Mossad Cyber-Spies to start up a “Digital Arms” Company and wreak havok on the most “secure phone on the planet”. The Silicon “Wadi” not Valley, Strikes Again!

 

Stay Alert, Stay Armed, Stay off the Phone and Stay Dangerous!

 

 

Espionage Files: Brit Spies Used URL Shortener to Honeypot Arab Spring Dissidents

Brit1

A shadowy unit of the British intelligence agency GCHQ tried to influence online activists during the 2009 Iranian presidential election protests and the 2011 democratic uprisings largely known as the Arab Spring, as new evidence gathered from documents leaked by Edward Snowden shows.

The GCHQ’s special unit, known as the Joint Threat Research Intelligence Group or JTRIG, was first revealed in 2014, when leaked top secret documents showed it tried to infiltrate and manipulate—using “dirty trick” tactics such as honeypots—online communities including those of Anonymous hacktivists, among others.

The group’s tactics against hacktivists have been previously reported, but its influence campaign in the Middle East has never been reported before. I was able to uncover it because I was myself targeted in the past, and was aware of a key detail, a URL shortening service, that was actually redacted in Snowden documents published in 2014.

THE HONEYPOT

A now-defunct free URL shortening service—lurl.me—was set up by GCHQ that enabled social media signals intelligence. Lurl.me was used on Twitter and other social media platforms for the dissemination of pro-revolution messages in the Middle East.

These messages were intended to attract people who were protesting against their government in order to manipulate them and collect intelligence that would help the agency further its aims around the world. The URL shortener made it easy to track them.

Read the Remainder at Motherboard

Espionage Files: How Putin Weaponized Wiki-Leaks

Putin1

Evidence suggests that a Russian intelligence group was the source of the most recent Wikileaks intel dump, which was aimed to influence the U.S. election.

Close your eyes and imagine that a hacking group backed by Russian President Vladimir Putin broke into the email system of a major U.S. political party. The group stole thousands of sensitive messages and then published them through an obliging third party in a way that was strategically timed to influence the United States presidential election. Now open your eyes, because that’s what just happened.

On Friday, Wikileaks published 20,000 emails stolen from the Democratic National Committee. They reveal, among other things,thuggish infighting, a push by a top DNC official to use Bernie Sanders’ religious convictions against him in the South, and attempts to strong-arm media outlets. In other words, they reveal the Washington campaign monster for what it is.

But leave aside the purported content of the Wikileaks data dump (to which numerous other outlets have devoted considerable attention) and consider the source. Considerable evidence shows that the Wikileaks dump was an orchestrated act by the Russian government, working through proxies, to undermine Hillary Clinton’s Presidential campaign.

“This has all the hallmarks of tradecraft. The only rationale to release such data from the Russian bulletproof host was to empower one candidate against another. The Cold War is alive and well,” Tom Kellermann, the CEO of Strategic Cyber Ventures told Defense One.

Here’s the timeline: On June 14, cybersecurity company CrowdStrike, under contract with the DNC, announced in a blog post that two separate Russian intelligence groups had gained access to the DNC network. One group, FANCY BEAR or APT 28, gained access in April. The other, COZY BEAR, (also called Cozy Duke and APT 29) first breached the network in the summer of 2015.

Cybersecurity company FireEye first discovered APT 29 in 2014 and was quick to point out a clear Kremlin connection. “We suspect the Russian government sponsors the group because of the organizations it targets and the data it steals. Additionally, APT29 appeared to cease operations on Russian holidays, and their work hours seem to align with the UTC +3 time zone, which contains cities such as Moscow and St. Petersburg,” they wrote in their report on the group. Other U.S. officials have said that the group looks like it has sponsorship from the Russian government due in large part to the level of sophistication behind the group’s attacks.

Read the Remainder at Defense One