Matthew Cole, Richard Esposito, Sam Biddle, Ryan Grim report: Russian military intelligence executed a cyberattack on at least one U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials just days before last November’s presidential election, according to a highly classified intelligence report obtained by The Intercept.
The top-secret National Security Agency document, which was provided anonymously to The Intercept and independently authenticated, analyzes intelligence very recently acquired by the agency about a months-long Russian intelligence cyber effort against elements of the U.S. election and voting infrastructure. The report, dated May 5, 2017, is the most detailed U.S. government account of Russian interference in the election that has yet come to light.
While the document provides a rare window into the NSA’s understanding of the mechanics of Russian hacking, it does not show the underlying “raw” intelligence on which the analysis is based. Read the rest of this entry »
After the Manchester bombing, liberals once again avoid the obvious—that Islamic terror in the West is an immigration problem.
Heather Mac Donald writes: Liberal ideology conceives of “safe spaces” in the context of alleged white patriarchy, but there was a real need for a “safe space” in Britain’s Manchester Arena on May 22, when 22-year-old terrorist Salman Abedi detonated his nail- and screw-filled suicide bomb after a concert by teen idol Ariana Grande. What was the “progressive” answer to yet another instance of Islamic terrorism in the West? Feckless calls for resisting hate, pledges of renewed diversity, and little else.
A rethinking of immigration policies is off the table. Nothing that an Islamic terrorist can do will ever shake the left-wing commitment to open borders—not mass sexual assaults, not the deliberate slaughter of gays, and not, as in Manchester last week, the killing of young girls. The real threat that radical Islam poses to feminism and gay rights must be disregarded in order to transform the West by Third World immigration. Defenders of the open-borders status quo inevitably claim that if a terrorist is a second-generation immigrant, like Abedi, immigration policy has nothing to do with his attack. (Abedi’s parents emigrated to Britain from Libya; his immediate family in Manchester lived in the world’s largest Libyan enclave outside Africa itself.) Media Matters ridiculed a comment about the Manchester bombing by Fox News host Ainsley Earhardt with the following headline: FOX NEWS HOST SUGGESTS ‘OPEN BORDERS’ ARE TO BLAME FOR MANCHESTER ATTACK CARRIED OUT BY BRITISH NATIVE.
Earhardt had asked how to prevent “what’s happening in Europe, with all these open borders, they’re not vetting, they’re opening their borders to families like this, and this is how they’re paid back in return.” Pace Media Matters, a second-generation Muslim immigrant with a zeal for suicide bombing is as much of an immigration issue as a first-generation immigrant with a terrorist bent. The fact that second-generation immigrants are not assimilating into Western culture makes immigration policy more, not less, of a pressing matter. It is absurd to suggest that Abedi picked up his terrorist leanings from reading William Shakespeare and William Wordsworth, rather than from the ideology of radical Islam that has been imported into Britain by mass immigration.
The Washington Post, too, editorialized that “defenders of vulnerable immigrants and asylum seekers, who in Britain as elsewhere in the West remain the targets of populist demagogues, could take some comfort from the fact that the assault apparently did not originate with those communities.” Well, where did the assault originate from—Buckingham Palace?
Since liberals and progressives will not allow a rethinking of open borders policy, perhaps they would support improved intelligence capacity so as to detect terror attacks in the planning stages? Nope. Read the rest of this entry »
The highly unusual practice of a Cabinet-level official physically running her own email would have given Clinton, the presumptive Democratic presidential candidate, impressive control over limiting access to her message archives
WASHINGTON (AP) – Jack Gillum and Ted Bridis report: The computer server that transmitted and received Hillary Clinton’s emails – on a private account she used exclusively for official business when she was secretary of state – traced back to an Internet service registered to her family’s home in Chappaqua, New York, according to Internet records reviewed by The Associated Press.
“In November 2012, without explanation, Clinton’s private email account was reconfigured to use Google’s servers as a backup in case her own personal email server failed, according to Internet records. That is significant because Clinton publicly supported Google’s accusations in June 2011 that China’s government had tried to break into the Google mail accounts of senior U.S. government officials.”
The highly unusual practice of a Cabinet-level official physically running her own email would have given Clinton, the presumptive Democratic presidential candidate, impressive control over limiting access to her message archives. It also would distinguish Clinton’s secretive email practices as far more sophisticated than some politicians, including Mitt Romney and Sarah Palin, who were caught conducting official business using free email services operated by Microsoft Corp. and Yahoo Inc.
Most Internet users rely on professional outside companies, such as Google Inc. or their own employers, for the behind-the-scenes complexities of managing their email communications. Government employees generally use servers run by federal agencies where they work.
“The AP has waited more than a year under the open records law for the State Department to turn over some emails covering Clinton’s tenure as the nation’s top diplomat, although the agency has never suggested that it didn’t possess all her emails.”
In most cases, individuals who operate their own email servers are technical experts or users so concerned about issues of privacy and surveillance they take matters into their own hands. It was not immediately clear exactly where Clinton ran that computer system.
“Operating her own server would have afforded Clinton additional legal opportunities to block government or private subpoenas in criminal, administrative or civil cases because her lawyers could object in court before being forced to turn over any emails.”
Clinton has not described her motivation for using a private email account – firstname.lastname@example.org, which traced back to her own private email server registered under an apparent pseudonym – for official State Department business.
Operating her own server would have afforded Clinton additional legal opportunities to block government or private subpoenas in criminal, administrative or civil cases because her lawyers could object in court before being forced to turn over any emails. And since the Secret Service was guarding Clinton’s home, an email server there would have been well protected from theft or a physical hacking.
“It was unclear whom Clinton hired to set up or maintain her private email server, which the AP traced to a mysterious identity, Eric Hoteham. That name does not appear in public records databases, campaign contribution records or Internet background searches.”
But homemade email servers are generally not as reliable, secure from hackers or protected from fires or floods as those in commercial data centers. Those professional facilities provide monitoring for viruses or hacking attempts, regulated temperatures, off-site backups, generators in case of power outages, fire-suppression systems and redundant communications lines.
Hillary email story about to metasticize..SHE RAN HER OWN SERVER. Looks VERY premeditated to thwart the law. http://t.co/Uo7zS8XLmb
— Paul Equale (@paulequale) March 4, 2015
A spokesman for Clinton did not respond to requests seeking comment from the AP on Tuesday. Clinton ignored the issue during a speech Tuesday night at the 30th anniversary gala of EMILY’s List, which works to elect Democratic women who support abortion rights.
It was unclear whom Clinton hired to set up or maintain her private email server, which the AP traced to a mysterious identity, Eric Hoteham. That name does not appear in public records databases, campaign contribution records or Internet background searches. Hoteham was listed as the customer at Clinton’s $1.7 million home on Old House Lane in Chappaqua in records registering the Internet address for her email server since August 2010. Read the rest of this entry »
Our computers have become too easy to use.
Joanna Stern writes: Right out of the box, they’re ready to go. No installing operating systems, no typing into a command-line prompt like in the old days. We don’t even have to hit save anymore.
Most weeks, I’m the first to celebrate this and to say I miss nothing about the way it used to be. But not this week.
This week I’ve been using the $35 Raspberry Pi 2, a bare-bones Linux computer no bigger than a juice box. And I’ve rediscovered something I had forgotten: the thrill of tinkering with a machine and its software. Of course, that thrill is accompanied, from time to time, with the urge to take a baseball bat to an inanimate object.
The Raspberry Pi is the antithesis of our polished, hermetically sealed Apple and Windows PCs. Open the cardboard box and all you’ll find inside is a green board covered with chips, circuits and ports. There’s no keyboard, monitor, or power cord. There isn’t even an operating system. And that’s all by design.
It was made by a U.K.-based nonprofit called the Raspberry Pi Foundation to encourage today’s children, around the age 10 and up, to learn more about how computers really work. Children today “have wonderful technology in their lives, but they are deprived of learning how it works,” Eben Upton, co-founder of the foundation, says. So while every other electronics maker has been slaving away on ease-of-use features, Mr. Upton decided to deliberately create a computer that dials back the user friendliness.
After using the Pi 2, there’s no doubt in my mind that it’s a great way for children and teenagers to learn about computer hardware and software. It’s also great for us curious adults who are interested in knowing more about the worlds of open-source and software coding, and don’t mind typing arcane commands into a DOS-looking interface to get there.
But don’t let that scare you. I challenged myself to see what I could do with the little thing and it put my problem-solving skills and patience to the test. Even if you’re someone like me, with little to no computer coding knowledge, you’ll be amazed by the number of things you can do with a $35 computer.
A $35 Linux Computer
My journey all started with gathering the right pieces to make the Pi my main computer for past few days.
Not only doesn’t the Pi come with an operating system, there isn’t even a hard drive inside. There is, however, a MicroSD card slot. So I did what the very helpful Raspberry Pi websites and community of experts tell beginners to do: I bought a $10 card preloaded with Raspbian, a basic Linux OS optimized for the Pi. (You can download the free software and put it on a card you already own, too.) Later this year, a new version of Windows will be released for the Pi.
OK, so it costs a little more than $35. I also bought a $5 plastic box to house the board, a $13 USB Wi-Fi dongle and a $8 Pi-compatible MicroUSB power cord from Adafruit.com, a website that sells the Pi and a selection of hardware add-ons for it, and provides tutorials.
With those things, plus a USB mouse and keyboard and an HDMI monitor I already had (TVs work fine, too), I was up and running. To get started, I did have to type some text into the command line and go through some installation processes, but believe it or not, it took less time to set up the computer than to bake a real raspberry pie. (Even with a pre-made crust!)
Raspbian, which launched a Windows-style graphic interface once I installed it, provides a basic desktop and menu with access to programs and settings. Using the preloaded Web browser, I’ve been able to do most of what I do on my laptop—check email, Twitter, Facebook. I also downloaded the free LibreOffice suite from the preloaded Pi Store. Read the rest of this entry »
Megan Logan writes: Security is boring—particularly when it works properly.
The new Sesame 2 key fob is a dead-simple security solution for your Mac that’s exactly the right kind of boring. It automatically locks your computer when you walk away from it. Also, not as boring, it allows for some customizable actions including two-factor authentication.
The small device fastens to your keychain or slips into your change pocket and pairs to your Mac over Bluetooth. It can determine your physical distance from your machine, and when you wander too far away from your Mac, it can force the screen to lock, requiring a login to access the desktop again.
When you return, it can either unlock your computer automatically or, if you have the optional Two-Factor Authentication mode enabled, require both the system password and the Sesame 2 to unlock the computer.
Atama originally put out its first Sesame Bluetooth key last year. This new version, the Sesame 2, is now available on the London-based company’s website for $39, or at Apple Stores and Amazon in the U.K. for £39.
The distance that triggers a screen lock is somewhat customizable—users can choose between “Near” and “Far” locking distances. While there’s some fluctuation in actual distance because of varying real-world conditions, the “Near” option typically locks your Mac once you step 20-25 feet away from it. Read the rest of this entry »
Russian hackers use ‘zero-day’ in cyber-spy campaign
For The Washington Post, Ellen Nakashima reports: A Russian hacking group probably working for the government has been exploiting a previously unknown flaw in Microsoft’s Windows operating system to spy on NATO, the Ukrainian government, a U.S. university researcher and other national security targets, according to a new report.
“This is consistent with espionage activity. All indicators from a targeting and lures perspective would indicate espionage with Russian national interests.”
— iSight Senior Director Stephen Ward
The group has been active since at least 2009, according to research by iSight Partners, a cybersecurity firm.
Its targets in the recent campaign also included a Polish energy firm, a Western European government agency and a French telecommunications firm.
“This is consistent with espionage activity,” said iSight Senior Director Stephen Ward. “All indicators from a targeting and lures perspective would indicate espionage with Russian national interests.”
“The firm began monitoring the hackers’ activity in late 2013 and discovered the vulnerability in August…The flaw is present in every Windows operating system from Vista to 8.1, he said, except Windows XP.”
There is no indication that the group was behind a recent spate of intrusions into U.S. banks, including JPMorgan Chase, Ward said.
“ISight dubbed the recently detected hacking group SandWorm because of references embedded in its code to the science-fiction novel ‘Dune.’ There were various mentions in Russian to the fictional desert planet of Arrakis, for instance.”
Current and former U.S. intelligence officials say the capabilities of Russian hackers are on par with those of the United States and Israel. Read the rest of this entry »