Ghost Squad Hackers Leak Terror Identities Online

Earlier today, S1ege of Ghost Squad Hackers released the personal information of an alleged member of ISIS operating out of Libya. The information exposed within the leak contains the telephone number and IP Address of an ISIS supporter/member inside the country, as well as their contact list and call logs over the course of the last week- possibly uncovering countless more terror targets in the region. This is the 3rd such leak Ghost Squad has released over the course of the 2 weeks alone, and group leader S1ege indicates that the information uncovered today is merely a tease for a much larger leak to come later this year.

For the time being, through the Anonymous Intelligence Agency, the information has been passed along to the United States Air Force and Central Intelligence Agency in order to confirm the legitimacy of the targets and ensure they meet the appropriate fates.

https://twitter.com/GhostSquadHack/status/1059478993345355776

If there is any information you would like to report, you can reach out to the Anonymous Intelligence Agency: tips@AnonIntell.org

France Issues Arrest Warrants for Senior Level Officials of Assad Regime In Syria

The other week when President Abdel Fattah al-Sisi of Egypt was visiting the United Nations Headquarters in New York City I called and sent messages to the International Criminal Court (ICC) and International Police (INTERPOL) in Lyon, France asking if there had ever been an arrest warrant issued in his name. I asked this because I was seriously considering taking matters into my own hands by placing Sisi under citizens arrest if I had ever managed to get close enough to him. It wasn’t necessarily a joke either, I even managed to get the United Nations to email the itinerary various speeches at the Nelson Mandela Summit on September 24th, 2018, and had been researching how to get a press pass in order to get inside the facility.

At this point in time it is an indisputable fact that President Sisi is guilty of various War Crimes and crimes against humanity, including genocide, torture, forced disappearances, murder or conspiracy to commit murder. To me it just didn’t make sense that anyone responsible for acts like this would be able to walk the streets of New York a free man, whilst simultaneous dinning/sleeping at 5 star hotels. I refuse to stand for that.

Image result for sisi wanted crimes against humanity

Now, I know full well that placing Sisi under citizens arrest would have never worked or sticked, and that I probably would have been shot dead by the NYPD or Sisi’s guard detail if I ever tried it – but that was never the point. What I did and said was a political gesture meant to get the worlds attention and force people to think differently about these types of situations headed into the future. My statements to INTERPOL and the ICC also weren’t even limited to Sisi either. For example, I also inquired about arrest warrants for Bashar al-Assad as well, asking what their policy was for dealing with men like him. How could men like this not have a single arrest warrant out in their name, how come they are not arrested the second they step outside their county and onto foreign soil I wondered? So I asked international authorities those very questions.

I bring this up because I’m finding one headline in the news this morning particularly interesting. This would be the news that, on November 5th 2018, French authorities have officially issued international arrest warrants out in the name of various high ranking officials serving the Assad regime in Syria, including Syria’s National Security Bureau director Ali Mamluk,  as well as Jamil Hassan, head of the Syrian air force’s intelligence agency, and Abdel Salam Mahmoud, head of Syria’s air force intelligence’s investigative branch.

According to reports, they are being charged with “complicity in acts of torture, complicity in crimes against humanity and complicity in war crimes” – literally the exact the same charges I first brought up in my original emails to French authorities. Moreover, even through the warrants were first released to the public today, November 5th 2018, they were actually issued on October 8th 2018 – two weeks after my initial emails and phone calls. Coincidence? You tell me….  #VigilanteLife 😉

 

Responsible Artisanal Gold Solutions Announces Worlds 1st Conflict Free Gold Supply Chain

(HRW) – People in the United States will now be able to buy jewelry made with “conflict-free” gold from Zales and Kay Jewelers, two of the nation’s largest jewelry retailers. The Responsible Artisanal Gold Solutions (RAGS) Forum announced last week the first “conflict-free” supply chain from an artisanal mine in the Democratic Republic of Congo to US retailers. This is good news – even though the amount of gold coming this way may be small.

In the past, many mainstream jewelers have understandably avoided “conflict minerals” such as gold from the Congo because of its links with violent and abusive armed groups and elements of Congolese security forces. The RAGS initiative, supported by USAID and civil society groups, worked with a local mine in South Kivu to improve working conditions, address human rights issues, and ensure full trace-ability from the mine site to the retailer. The gold has been manufactured into earrings now sold by Signet Jewelers, the world’s largest diamond retailer and the parent company of Zales and Kay Jewelers.

Traceability is a big issue for the jewelry industry. We recently assessed 13 well-known jewelry brands for their sourcing practices. We found many jewelry companies did not know the source of their gold and diamonds, and as a result did not know enough about human rights risks in their supply chains.

https://twitter.com/markc_anderson/status/840519496548904960

Now, Signet has trace-ability over a small portion of its gold. However, the vast majority of Signet’s gold comes from refiners that are expected to carry out their own due diligence over their supply chain, which in some cases fall short of international human rights standards. But it is a good start, especially for Congo, where most of its artisanally-sourced gold is smuggled out of the country.

The new initiative also shows that it is possible to source responsibly from local artisanal mining communities, which provide livelihoods for an estimated 40 million people worldwide, many in poor rural communities throughout the global South. Helping these mines meet human rights and environmental standards and then sourcing their gold contributes enormously to social and economic development in local communities.

Other jewelers, such as Cartier and Chopard, have similarly supported and sourced from artisanal mines in Latin America. Such initiatives are a win-win for jewelers. They not only support local mining communities, but also can assure their customers of their gold’s origins. Other jewelers should follow suit.

Full Press Release from Responsible Artisanal Gold Solutions:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2018/11/RAGSF-Supply-Chain-Press-Release-FINAL-24-Oct-2018.pdf”%5D


This article was originally published by Human Rights Watch on November 2nd 2018. It was republished, with permission, using a Creative Commons BY-NC-ND 3.0 US License, in accordance with the Terms & Conditions of Human Rights Watch | Formatting edits, Tweets and PDF added/embedded by Rogue Media Labs 

Ron Wyden Releases Discussion Draft of New Data Privacy Protection Act

On October 31st 2018, Senator Ron Wyden (D, Oregon) formally introduced a discussion draft of a new Bill which proposes “To amend the Federal Trade Commission Act to establish requirements and responsibilities for entities that use, store, or share personal information, to protect personal information, and for other purposes.” Among other things, the proposed legislation hopes to impose strict fines against and possibly imposes jail time for executives of major US corporations found to have mishandled, misused or lost/exposed the personal data of US citizens throughout the future.

According to Wydens website, “The Consumer Data Protection Act protects Americans’ privacy, allows consumers to control the sale and sharing of their data, gives the FTC the authority to be an effective cop on the beat, and will spur a new market for privacy-protecting services.

Overview of Data Protection Act:

  • Establish minimum privacy and cybersecurity standards.
  • Issue steep fines (up to 4% of annual revenue), on the first offense for companies and 10-20 year criminal penalties for senior executives.
  • Create a national Do Not Track system that lets consumers stop third-party companies from tracking them on the web by sharing data, selling data, or targeting advertisements based on their personal information. It permits companies to charge consumers who want to use their products and services, but don’t want their information monetized.
  • Give consumers a way to review what personal information a company has about them, learn with whom it has been shared or sold, and to challenge inaccuracies in it.
  • Hire 175 more staff to police the largely unregulated market for private data.
  • Require companies to assess the algorithms that process consumer data to examine their impact on accuracy, fairness, bias, discrimination, privacy, and security.

However, it is important to note that, if passed as is, these laws would only apply to companies receiving more than $50 million in yearly revenue, which actively host the personal information of greater than 1 million people/customers.  Moreover, the act excludes 3rd party data hosting providers, small business owners, as well as data brokers or commercial entities who “as a substantial part of their business, collects, assembles or maintains personal information concerning an individual who is not a customer or an employee of that entity in order to sell or trade the information.

Being as this is a “Discussion Draft” for the time being, Mr. Wyden is currently accepting feedback, criticisms, critiques and constructive criticisms of his legislation. If you have something you would like to say in response to it, you can reach Senator Wyden at: PrivacyBillComments@wyden.senate.gov

Full Text of Data Protection Act:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2018/11/Wyden-Privacy-Bill-Discussion-Draft-Nov-1.pdf” title=”Wyden Privacy Bill Discussion Draft Nov 1″]

 

Società Italiana degli Autori ed Editori Hacked, Database Leaked Online

Last night the website belonging to Società Italiana degli Autori ed Editori, the Italian copyright collection agency, was hacked, defaced and its databases leaked online. A group known as “Anonplus of the Anonymous Hacker Collective has taken credit for the hack, and as of November 3rd 2018 the leaked databases are still available online for anyone to download.

All told there is about 3.7 GB worth of data included in the leak located on three separate servers, including  sensitive information such as names, emails, passwords and the cell phone numbers of various trade unionists, journalists and academics. As for why the hack was executed, Anonplus claims it was carried out in protest of the mismanagement of intellectual property works entrusted to the agency over recent years. So, just before midnight on Friday, November 2nd 2018, Anonymous hackers managed to gain access to the website, make edits to the sites domain/theme and steal content from its archived databases. 

As was reported by la Repubblica, an Italian based newspaper, “The AnonPlus group has already been responsible for striking actions against the (Italian) Democratic Party, Il Giornale and the secretary of the Lega Matteo Salvini, in February, when the group claimed to have stolen even the content of Telegram’s chats from the current vice premier and minister of Indoor.” Adding that Anonplus has “also made itself known for the intrusion into the sites of computer companies such as Norton Antivirus and Symantec and for having attacked put other institutional objectives in Central America offline.

The group has already been banned offline by Twitter in the past, so there is no telling how long the information will remain accessible to the public.

Full Leak from AnonPlus:

Target:

Database Download: (278mb) decompressed (3.7GB)

Mirror:

PoC:

Artificial Intelligence To Crawl DeepWeb To Find Cyber Attacks Before They Happen

A new joint operation undertaken by military contractor Lockheed Martin, along with Cyber Reconnaissance, Universidad Nacional del Sur and the Universities of Arizona and Southern California aims to revolutionize cyber intelligence going forward throughout the future. The conception is not dissimilar to the ‘Web Bot” project, which attempts to index/collect, analyze and interpret key words and searches sent across the internet in live time as they are happening in order to predict future trends.

The project is officially called DARKMENTION, “a deployed system to predict enterprise-targeted external cyber attacks.” It was developed under the Cyberattack Automated Unconventional Sensor Environment (CAUSE) program for the Intelligence Advanced Research Projects Activity (IARPA), and attached to a database belonging to CYR3CON, a threat intelligence firm, which has cataloged various successful cyber attacks/attack styles pulled off throughout the past.

Together along with this database, DARKMENTION aims to crawl both the “Surface Web” and “Deep Web” in hopes of finding, recording and indexing various hacking forums, website and chats, in order to pick up on key issues or talking points within them. In doing so, researchers hope to uncover potential targets before hackers can organize enough to launch attacks against them, and/or uncover new information about how attacks are are actually set up/pulled off. The project could theoretically revolutionize intelligence gathering, while also drastically cutting down on Governmental/military operational budgets.

If this seems impossible to you, you might remember a 2016 study by Intelliagg and Darksum, which managed to crawl, index and catalog approximately 29,532 websites hosted on the “DarkNet” – roughly 54% of the entire estimated size of the DarkNet. I bring this up because Darksum‘s project didn’t have nearly the budget or resources as Lockheed Martin‘s now does, and the Surface Web and Deep Web are inherently much easier to navigate than the DarkNet.

Full Research Project: 

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2018/11/darkmention.pdf”%5D

New Tests Reveal Voting Machines Still Suffer from Key Vulnerabilities Ahead of Mid-Term Elections

Last summer at the 2017 DEFCON hackers conference in Las Vegas, Nevada, hackers were given open access to various US voting machines known to have been used in the 2016 US Presidential Election. What they uncovered was remarkable. For example, hackers were able to compromise different types of voting machines used in 18 States in 2016, some of which were hacked/cracked in as little as 120 seconds – allowing for, among other things, remote executions/control of those machines.

In response to this and other cyber threats like them, in conjunction with the United States Department of Homeland Security, in January 2018, US Congress rolled out a new ‘Election Security Initiative‘ to better secure the country/voting process headed in to the 2018 November Mid-Term Elections. However, to date, only 21 out of 50 US states have successfully completed their security audits with the DHS. On top of this, recent pen tests indicate that the same voting machines to be used in state elections later this month are still suffering from critical and un-patched vulnerabilities that could potentially compromise the legitimacy or outcome of state elections.

According to a sneak peak of a new report by CoalFire released to the public on November 1st 2018, assessing the security vulnerabilities of US voting machines in 10 states ahead of the November 2018 Mid-Terms, CoalFire‘s “team of penetration testers was able to reverse engineer voting media and replace software in voting systems with a program that emulates it, but recompiled with malicious logic, instructs it to record malicious votes—despite the systems having passed EAC voting system standards.” Explaining that “These vulnerabilities can be found in network infrastructure, voter registration systems, and equipment in storage, which can be compromised if proper controls are not implemented; and elections staff, which could become victims of social engineering schemes.

Despite different Federal and private initiatives meant to sure up problems/security risks ahead of the November elections, Coalfire‘s Vice President, Mike Weber, noted that he sensed “a lack of cybersecurity rigor in the Voluntary Voting System Guidelines (VVSG) 1.1 standard issued by the Elections Assistance Comission (EAC).” To this very point, as was reported by SC Magazine earlier today, November 1st 2018, 29 US states have failed to take advantage of the National Protection and Programs Directorate a free cyber security initiative/partnership provided to US Federal, State and local Governments on behalf of the US Department of Homeland Security. 

To date, the only confirmed states to have conducted full security audits head of the November elections are Arizona, Colorado, Connecticut, Delaware, Iowa, Illinois, Indiana, Maryland, Massachusetts, Minnesota, Montana, Nebraska, North Carolina, Pennsylvania, Rhode Island, South Carolina, Utah, Washington and Wisconsin – Louisiana’s is currently underway.

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2018/11/TFESReport.pdf”%5D

 

Russia Levies Heavy Fines On Independent News Media & Human Rights Organizations

(AI) – A wave of unfair, excessive and suffocating fines levied on independent Russian media, NGOs and human rights defenders represent a new assault on human rights in Russia, Amnesty International said today.

Once again the Russian authorities are targeting independent organizations and individuals – but this time their weapon is suffocating fines. Using a host of draconian laws, the authorities are levying one extortionate fine after another in what appears to be a coordinated attack to drive critical organizations out of existence altogether,” said Natalia Zviagina, Director of Amnesty International’s Office in Moscow.

The latest victim of this targeted attack is The New Times magazine, one of the leading critical media outlets in Russia. On 26 October, The New Times was fined 22,250,000 rubles (US$ 348,000) for “failure by an editor, a broadcaster or a publisher of a medium to provide information on receiving funds.” It’s the biggest fine so far imposed on media in Russia. The magazine was forced to discontinue its print edition in 2017 after its reputation for being disloyal to the regime meant it was abandoned by advertisers. Now faced with this heavy fine, The New Times is on the verge of bankruptcy.

Also on 26 October, the Andrey Rylkov Foundation – a prominent Russian group advocating for reforming drug policies – was fined 800,000 rubles (US$ 12,500) for distributing “propaganda of narcotic substances.” The article in question appeared in a bulletin that the foundation publishes on accessing health services for people who use drugs. “The same financial whip the authorities are using against their critics in the media, is simultaneously being used against those expressing dissident opinions on a range of policy issues,” said Natalia Zviagina.

Only a few days earlier, a court imposed an unusually heavy fine of 1,000,000 rubles (US$ 15,600) on Transparency International Russia after it lost a defamation case launched by a close associate of Vladimir Putin. At the same time, Russian courts have largely failed to protect human rights defenders from attacks on their reputation by state-controlled mainstream media.

Earlier in this month, Sergei Zykov, a human rights defender from Yekaterinburg, in the Urals, and Aleksandr Kunilovsky, an opposition activist from Tyumen, in northern Siberia, were fined 300,000 rubles (US$ 4,700) and 290,000 rubles (US$ 4,500), respectively, for violations of Russia’s unduly restrictive rules governing public assemblies. “We call on the Russian authorities to immediately halt this vicious assault on civil society organizations and stop using the repressive legislation to impose extortionate penalties,” said Natalia Zviagina.

Background

The New Times, Andrey Rylkov Foundation and Transparency International Russia have faced increased pressure from the Russian authorities, mainly due to the fact that all three organizations are recipients of foreign funding.

Article 13.15.1 of the Administrative Offences Code used against The New Times was introduced in 2015 as part of a campaign against independent media who have been forced to rely on foreign funding due to the lack of sufficient national resources accessible to them.

The Andrey Rylkov Foundation was listed as a “foreign agent” by the Ministry of Justice in 2016. Since then, the group has faced a drastic reduction in its budget due to its inability to generate sufficient funding from national sources.

Read More:

https://www.amnesty.org/en/latest/news/2018/06/russia-extortionate-fine-for-airing-drug-legalization-interview-a-repressive-act-of-censorship/

https://www.amnesty.org/en/latest/news/2017/02/russia-deeply-alarming-raid-targets-human-rights-activist-and-journalist-zoya-svetova/

https://www.amnesty.org/en/latest/news/2016/11/russia-four-years-of-putins-foreign-agents-law-to-shackle-and-silence-ngos/


This article was originally published by Amnesty International on October 29th 2018. It was republished, with permission, under a Creative Commons BY-NC-ND 4.0 International License, in accordance with the Terms & Conditions of Amnesty International | Formatting Edits and Tweets added by Rogue Media Labs

Wikileaks Vault 7 Source Releases Letter from Prison, Gets Two Additional Charges

Joshua Adam Schulte, whom is currently in Federal prison facing charges of unauthorized disclosure of classified information and other offenses relating to the theft of classified material from the Central Intelligence Agency, has just released a letter from prison accusing the New York State prison system of un-Constitutional behavior and inhumane living conditions. Among the allegations, Shulte accuses the prison guards of regularly carrying out assault, says that prison cages are regularly sprayed with cold water, that he has been forced to endure freezing cold temperatures without blankets or adequate clothing, has been forced into solitary confinement without charge/explanation and denied the right to make contact or visit with his attorney.

Interestingly enough, approximately two days after his letter was drafted/released to the public, on October 31st 2018, the US Justice Department announced it would be adding two additional charges to Shulte’s case, charging him with “additional violation of 18 U.S.C. § 793(e), based on his unlawful transmission and attempted transmission of classified national defense information from the MCC, and (ii) Count Eleven charges the defendant with a violation of 18 U.S.C. § 401(3), based on his contempt of the Protective Order. In light ofthe new charges, and for the additional reasons set forth in the Government’s ex parte, classified submission.

According to the US Federal Bureau of Investigation, whilst incarcerated, Shulte was found to have been in possession of multiple cellphones, including one which was “significantly encrypted,” as well as 13 social media apps/accounts and an encrypted email account. Using these accounts, apps and tools, the FBI claims that Shulte “Clandestinly” contacted/colluded from prison with sources on the outside to further leak more classified information.

DOJ’s Motion for New Charges Can Be Found Here: https://www.scribd.com/document/392137940/Letter-Motion-for-New-Charges

Joshua Shulte’s Letter Leaked from Prison:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2018/11/nysd-1.17-cr-00548-67-0.pdf”%5D

US Department of Justice Indicts Chinese Aviation Spies & Their Team of Hackers

In a press release made available to the public on October 30th, 2018, the United States Department of Justice announced the indictment of various members of Chinese Intelligence and their team of hackers. The indictment officially names two Chinese officers; Zha Rong and Chai Meng, 5 of their co-conspirators; Zhang Zhang-Gui, Liu Chunliang, Gao Hong Kun, Zhuang Xiaowei, and Ma Zhiqi – alleged to have carried out hacking operations on behalf of them, along with three others; Tian Xi, Gu Gen and Li Xiao.

From January 2010 to May 2015, the team is alleged to have carried out repeated hacking operations against various US and internationally based businesses with the intention of obtaining,”among other data, intellectual property and confidential business information, including information related to a turbofan engine used in commercial airliners.” Their actions are primarily tied to active hacking attempts against and intellectual property theft of several European and US based aviation companies and parts manufacturers, 13 in total. Included in the US states effected by the theft/breach are Arizona, Massachusetts, California and Oregon.

According to the official indictment filed in the Southern District of California provided below, working under the direction of Zha Rong and Chai Meng, the Chinese hackers listed above “attempted a series of intrusions in order to facilitate intrusions and steal non-public commercial and other data.” Alleging that, to do this, “the hackers used a range of techniques, including spear phishing, sowing multiple different strains of malware into company computer systems, using the victim companies own websites as ‘watering holes’ to compromise website visitors’ computers, and domain hijacking through the compromise of domain registrars.” Perhaps most importantly, these hacks were successful.

View Full Indictment from DOJ:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2018/11/indictment_zhang_et_al_0.pdf”%5D

Ponemon Institute Releases State of EndPoint Security Report 2018

Earlier this week The Ponemon Institute released a new research paper entitled “Analyzing The 2018 State of Endpoint Security Risk,” sponsored by Barkly. To gather data and compile their results, researchers interviewed approximately 660 IT security professionals responsible for managing end point security for various corporations throughout the United States. What they concluded was is the number of 0Day exploits being released in the wild has dramatically increased over the course of 2018, and so to have the number of successful cyber attacks being absorbed by US corporations.

According to the results, the number of cyber attacks which have successfully breached the end point security measures implemented/installed by major US corporations has increased 17% from 2017 to 2018. Moreover, 64% of the IT professionals interviewed reported that at least one hacker or cyber attack had “successfully compromised data assets, files and/or IT infrastructure” causing significant financial damage to their systems within the course of the last 12 months alone. Perhaps most interestingly enough, 70% of the IT professionals interviewed admitted that they were unable to trace the origin of the hacks against them, and to this day have not uncovered the party(s) responsible for launching them. On top of this, only 69%of respondents say their traditional, signature-based antivirus solutions provide the protection needed to stop all serious attacks against their systems.

Key Findings from Ponemon’s Study:

  • 63% of IT security professionals say that they have seen endpoint attacks increase from 2017 – 2018
  • Only 52% of those same professionals claim the attacks can be stopped/mitigated
  • The average cost per compromised endpoint is $440. Small-and-medium-sized
    (SMB) companies have a much higher cost of $763
  • Of the professionals whom saw their systems compromised, 79% of them claim it was the result of new and previously unknown exploit – such as 0Day’s.
  • 19% say they were compromised by a previously disclosed/known attack style
  • Traditional anti-virus software only picks up 57% of all attacks
  • Every time a company is breached, it takes on average 102 days for security professionals to patch their systems
  • It takes on average 3 months for companies to buy/develop and begin to deploy Endpoint Detection & Response (EDR) solutions
  • The average cost, in damages, of an end point data breach rose from $5 million in 2017 to $7.12 million in 2018
  • The average IT budget of the companies surveyed was $114 million, with only an average of $5.56 million allocated specifically towards endpoint security
  • There was a 58% increase in the number of malware attacks against US corporations from 2017 to 2018

Based on their figures, researchers estimate that the number of endpoint security attacks absorbed by global corporations will only continue to increase in 2019. In their estimation, companies should expect to see at least a 38% increase in file based attacks – such as attacks using malicious encoded Word documents or pdf’s. Researchers are also advising companies to take a look at and/or consider replacing their “legacy” anti-virus service providers in favor of something new, and encourage more companies to launch or create new bug-bounty initiatives, which often times find solutions at a much lower cost than malicious data breaches after the fact.

View Full Study:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2018/10/state-of-endpoint-security-2018.pdf”%5D