14
By Capt (Ret) C de Waart, feel free to share: in Confidence Al-Qaida chief Ayman al-Zawahiri The Coordinator 2014 Part 19-76-Caliphate-ISIS Cyber Caliphate-2 'WE ARE ALREADY HERE' See also my previous: Al-Qaida chief Ayman al-Zawahiri The Coordinator 2014 Part 19-76-Caliphate-Electronic Jihad Cyberterrorism is the act of Internet terrorism in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. Classified National Intelligence Estimates over the past five years have identified Russia and China as the United States’ most sophisticated, and prolific, adversaries in cyberspace. However, American officials have said that Iran and North Korea concern them the most, not for their sophistication, but because their attacks are aimed more at destruction, as was the case with the attack on Sony Pictures. Terror Groups May Be Winning Digital War On Extremist Ideology "If the international framework that ISIL want to tear down cannot manage these fundamentals, how can we expect to win the broader argument over extremism?" "ISIL is showing increased sophistication in recruiting young people, particularly in virtual spaces," -- Secretary-General Ban Ki-moon Winning that argument requires demonstrating that secure, pluralistic societies have a better future to offer. "With respect to digital security, frankly, we are failing," -- Nick Ashton-Hart, executive director of the Internet & Digital Ecosystem Alliance (IDEA), "And it's not just ISIL that is aggressively targeting children and youth - but al- Qaeda, Boko Haram, Al-Shabaab, and other groups," Samantha Power, the U.S. Permanent Representative to the United Nations, "If the international framework that ISIL want to tear down cannot manage these fundamentals, how can we expect to win the broader argument over extremism?" A letter written by Osama Bin Laden in May 2010 from inside his compound in Abbottabad, stated, “wide-scale spread of jihadist ideology, especially on internet and the tremendous number of young people who frequent the jihadist websites are a major achievement for Jihad”. The letter was released by Combating Terrorism Center at West Point. This trend must be arrested on war footing. Otherwise the future will be catastrophic. “Cyber gives them a usable weapon, in ways nuclear technology does not,” said Frederick W. Kagan, Cees: Intel to Rent Page 1 of 14 20/03/2022

Al-Qaida chief Ayman al-Zawahiri The Coordinator 2014 Part 19-76-Caliphate-ISIS Cyber Caliphate-2

Embed Size (px)

Citation preview

By Capt (Ret) C de Waart, feel free to share: in Confidence

Al-Qaida chief Ayman al-Zawahiri The Coordinator 2014 Part 19-76-Caliphate-ISIS Cyber Caliphate-2

'WE ARE ALREADY HERE'See also my previous: Al-Qaida chief Ayman al-Zawahiri The Coordinator 2014 Part 19-76-

Caliphate-Electronic Jihad

Cyberterrorism is the act of Internet terrorism in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

Classified National Intelligence Estimates over the past five years have identified Russia and China as the United States’ most sophisticated, and prolific, adversaries in cyberspace.

However, American officials have said that Iran and North Korea concern them the most, not for their sophistication, but because their attacks are aimed more at destruction, as was the case with the attack on Sony Pictures.

Terror Groups May Be Winning Digital War On Extremist Ideology "If the international framework that ISIL want to tear down cannot manage these fundamentals, how can we expect to win the broader argument over extremism?" "ISIL is showing increased sophistication in recruiting young people, particularly in virtual spaces," -- Secretary-General Ban Ki-moon

Winning that argument requires demonstrating that secure, pluralistic societies have a better future to offer. "With respect to digital security, frankly, we are failing," -- Nick Ashton-Hart, executive director of the Internet & Digital Ecosystem Alliance (IDEA),

"And it's not just ISIL that is aggressively targeting children and youth - but al-Qaeda, Boko Haram, Al-Shabaab, and other groups," Samantha Power, the U.S. Permanent Representative to the United Nations,

"If the international framework that ISIL want to tear down cannot manage these fundamentals, how can we expect to win the broader argument over extremism?"

A letter written by Osama Bin Laden in May 2010 from inside his compound in Abbottabad, stated, “wide-scale spread of jihadist ideology, especially on internet and the tremendous number of young people who frequent the jihadist websites are a major achievement for Jihad”. The letter was released by Combating Terrorism Center at West Point.

This trend must be arrested on war footing. Otherwise the future will be catastrophic. “Cyber gives them a usable weapon, in ways nuclear technology does not,” said

Frederick W. Kagan,

Major Gen. (Ret.) Professor Isaac Ben-Israel, Head of the Blavatnik Interdisciplinary Cyber Research Center (ICRC) and chairman of the Cybersecurity Conference currently being held at Tel Aviv University (TAU).

"The global market for cybersecurity products and services is estimated to be around $60 billion USD per year, and Israel's share of the market is close to 10%," he noted. "I don't have to tell you that we are not 10% of anything else in the world." 

"Israel is considered to be a leading state, second perhaps only to the US," he added, explaining that this is why thousands of people have looked to Israel for their cybersecurity needs. 

Prof. Ben-Israel stated, as well, that the need for cybersecurity extends far beyond the realm of terror threats. 

Cees: Intel to Rent Page 1 of 9 15/04/2023

By Capt (Ret) C de Waart, feel free to share: in Confidence

"It's not only terror," he said. "The threat is coming from a long list of adversaries." Among them, he said, are individuals - and even one person "can cause a lot of damage." 

"Sometimes they are insiders," he noted, adding the example of ex-employees who seek to damage their former businesses. Others, like Anonymous, are loosely organized groups with political agendas. 

"The most dangerous threat comes from states," he said. "They have enough endurance to develop something sophisticated."

Washington, Jul 10: The US disrupted an undisclosed number of terrorist plots tied to the Independence Day holiday weekend, highlighting the risk of an attack on American soil inspired by Islamic State extremists, said FBI Director James Comey on Thursday, a day after he warned US legislators about the growing threat posed by terrorists and other criminals who communicate using encrypted applications that can't be deciphered. Mr Comey's warnings came amid news that the massive hack last year of the US Office of Personnel Management's system containing security clearance information affected 21.5 million people, including current and former employees, contractors and their families and friends. That is in addition to a separate hack – also last year – of OPM's personnel database that affected 4.2 million people.

Mr Comey called the heist a "treasure trove of information". Just imagine, he said, "if you were a foreign intelligence service and you had that data – how it would be useful".

Dozens of Americans were communicating with Islamic State over secretive networks, Mr Comey said, adding that potential terrorists are "going dark" by using such tools.

FBI officials have said that American sympathisers often follow Islamic State militants on Twitter and send them direct messages through the social media platform. Militants then direct the Americans to use secure communication tools that can't be accessed by federal agents. Islamic State has more than 21,000 English-speaking followers on Twitter, federal authorities say.

9 Jul. In the wake of ever-increasing cyber-security threats, Germany has passed legislation ordering that over 2,000 essential service providers implement new minimum information security standards or face penalties if they fail to do so within two years.The German Patriot air and missile defense systems, stationed at the Turkish border with Syria, have carried out “unexplained” commands allegedly issued by unknown hackers, according to a German media report since rebutted by the government. Compromising military systems is not something that an amateur hacking group would have the skills to do, or would want to admit doing, believes computer security consultant and former UK-based computer hacker Robert Jonathan Schifreen. He told RT that the “unexplained” commands from the hackers mentioned in the report, while “certainly worrying,” could not possibly be anything of much significance. “It is certainly the case that foreign governments, intelligence agencies do try to hack into these systems, and it may well be that the software built into the missile has been compromised in some way by some foreign government,” he added. - security consultant and former UK-based computer hacker Robert Jonathan Schifreen.

Jun 21, A cyber-attack against a Polish airline caused around 1,400 passengers to be grounded after hackers accessed the company's computer system used to issue flight plans. Polish airline LOT saw their systems broken into at about 4pm local time and it took specialists around five hours to find a solution to the problem. The state-owned company was forced to cancel ten national and international flights while more than a dozen were delayed

Cees: Intel to Rent Page 2 of 9 15/04/2023

By Capt (Ret) C de Waart, feel free to share: in Confidence

at Warsaw's Frederic Chopin Airport. LOT spokesman Adrian Kubicki described the incident as the 'first attack of its kind' in an interview with TVN 24 television. He added: 'We're using state-of-the-art computer systems, so this could potentially be a threat to others in the industry.' 

The "Islamic State Hacking Division" With the huge amount of data we have from various different servers and databases, we have decided to leak 100 addresses so that our brothers residing in America can deal with you," the group said in the English-language posting. AQ, “You’ll see no mercy, infidels. We are already here, we are in your PCs, in each house, in each office.

May 26, Africa: Terror Groups May Be Winning Digital War On Extremist Ideology. United Nations — The United Nations is quick to point out the increasing pace at which digital technology is racing across the world. Six out of every seven people are armed with mobile phones - and more than three billion, out of the world's 7.1 billion people, have access to the Internet. In February, ISIL posted a polished, 50-page guide online called "The Hijrah to the Islamic State," that instructs potential recruits how to make the journey to its territory - including everything from finding safe houses in Turkey, to what kind of backpack to bring, and how to answer questions from immigration officials without arousing suspicion.

Still, Secretary-General Ban Ki-moon warns that while advanced technologies are accelerating progress, there are also emerging threats. "Extremist groups are using social networks to spread their hateful ideologies," he told a Digital Forum in South Korea last week. And despite the wide digital divide, he said, information and communication technologies (ICTs) are fast shaping the U.N.'s future sustainable development agenda. "Our food agency uses mobile phones to help farmers set prices. Our relief operations communicate emergency information over online networks. And our messages go directly to the global public over Twitter and Facebook," he said. But there is also an increasing downside to the wide use of Twitter and Facebook: the world's terror networks have been more adept at spreading their politically-loaded messages of hatred and religious extremism through the use of modern communication technologies - and keeping one step ahead of the governments pursuing them.Ambassador Samantha Power, the U.S. Permanent Representative to the United Nations, told the Security Council last month that groups such as the Islamic State of Iraq and the Levant (ISIL, also known as ISIS), Al-Qaeda, Boko Haram and Al Shabaab are using the latest tools of modern technology to boost their cause.

"ISIL is showing increased sophistication in recruiting young people, particularly in virtual spaces," Power said. She said the group disseminates around 90,000 tweets each day, and its members and supporters routinely co-opt trending hashtags to disseminate their messages.

Nick Ashton-Hart, executive director of the Internet & Digital Ecosystem Alliance (IDEA), a Swiss non-governmental organisation (NGO), told IPS winning the digital argument, with those whose objective is the destruction of open, pluralistic societies, is a challenge. "But online or offline it always has been," he added.Winning that argument requires demonstrating that secure, pluralistic societies have a better future to offer. "With respect to digital security, frankly, we are failing," he said."Just look at basic international cooperation to protect people in their daily lives, from crime, fraud, and identity theft - as well as crimes like terrorism." The United States, he pointed out, has a backlog of more than 11,000 requests for legal assistance on all kinds of crime from the law enforcement officials of countries worldwide - and it is far from alone. The international mutual legal assistance (MLAT) framework is simply not fit for digital purpose, said Ashton-

Cees: Intel to Rent Page 3 of 9 15/04/2023

By Capt (Ret) C de Waart, feel free to share: in Confidence

Hart, the senior permanent representative of the technology sector to the U.N., its member-states, and the international organisations in Geneva.

Powers said ISIL even reportedly developed a Twitter app last year that allows Twitter subscribers to hand over control of their feed to ISIL - allowing ISIL to tweet from the individual subscriber's account, exponentially amplifying the reach of its messages, Power said. In February, ISIL posted a polished, 50-page guide online called "The Hijrah to the Islamic State," that instructs potential recruits how to make the journey to its territory - including everything from finding safe houses in Turkey, to what kind of backpack to bring, and how to answer questions from immigration officials without arousing suspicion, she said."And it's not just ISIL that is aggressively targeting children and youth - but al-Qaeda, Boko Haram, Al-Shabaab, and other groups," Power told delegates. Last week, ISIL released a 34-minute video, purportedly from its recluse leader Abu Bakr al-Baghdadi, in which he appealed to Muslims to either join ISIL or carry out attacks in their home countries.The online recording, the New York Times reported, was translated into English, French, German, Russian and Turkish, "an unusual move suggesting that the group was hoping for maximum exposure."

According to the United Nations, some 600 million people were victims of cybercrimes two years ago. And U.N. experts estimate these crimes will cost the global economy about 400 billion dollars every year. Ashton-Hart told IPS the main global crime prevention treaty, the Convention on Transboundary Organised Crime, is starved of the funding necessary to fully implement it. Senior judges in the Hague tell me they cannot get the cooperation they need in basic digital evidence-gathering integral to prosecute monstrous crimes, in some cases the most grave crimes in existence.""If the international framework that ISIL want to tear down cannot manage these fundamentals, how can we expect to win the broader argument over extremism?" he asked.He also said creating the practical measures that underpin trust between societies in basic law enforcement and baseline cybersecurity is not optional "and yet we still have more than 200 processes related to these issues without any structured, effective coordination between them to ensure sustainable, win-win outcomes."Edited by Kitty Stapp

A new frontline Syed Arfeen March 8, 2015 Militants have embraced social media wholly

and Pakistan has no mechanism to check it

On February 13, soon after the deadly suicide attack on Imamia Masjid Imambargah in Hayatabad, Peshawar, the banned Tehreek-e-Taliban Pakistan (TTP) claimed the responsibility for it. As the news flashed on tv screens, the cyber team of the notorious media wing of TTP, Umar Media, released a video, showing three terrorists that carried out the Hayatabad suicide mission and their mastermind Umar Mansoor. The video was in Pashto language but was subtitled in Urdu. It seemed that editing, subtitling and graphics of the video were done way before the attack and its release coincided with a statement on social media and blogs.

Cees: Intel to Rent Page 4 of 9 15/04/2023

By Capt (Ret) C de Waart, feel free to share: in Confidence

Around the same time, Umar Media also released the December 2014 video of Army Public School attackers. Umar Mansoor was shown in this video too. The TTP turned to social media yet again to issue the statement of Mullah Fazlullah aka Mullah Radio on internet “justifying” the brutal attack on innocent APS schoolchildren. Recently in Quetta, Mohammad Usman alias Saifullah Kurd, Balochistan Chief of banned Lashkar-e-Jhangvi (LeJ) was gunned down in an encounter with security forces. He was the alleged mastermind of Shia Hazara massacre in Balochistan and was the most-wanted man in the province. The Ahl-e-Sunnat Wal Jamaat (ASWJ) and LeJ sympathisers paid roaring tributes to him on social media.Terrorists have embraced social media wholly. And, as one of the most frequent users of this medium, the banned militant affiliates and supporters are glorifying terrorists ever since the restoration of capital punishment in the country, particularly on Facebook and Twitter.The 14th point of the National Action Plan is about “measures against abuse of internet and social media for terrorism”. Yet, the banned terrorist organisations are, to say the least, openly calling the shots. They are connected via Facebook, Twitter, YouTube, Dailymotion, and other websites — Linkedin, blogs, internet forums and discussion groups.The new jihadi generation of militants is internet savvy. Their social Internet forums romanticise youngsters living in different parts of the world, especially Europe. The cyber space is becoming a useful arsenal for jihadists to narrate and propagate what they call the ‘true’ version of Islam. Take al-Qaeda Indian Sub-Continent (AQIS) spokesman Usama Mehmood who is very active on Twitter. Twitter suspended his first account but he reappeared with another identity. Likewise, Twitter has barred Tehreek-e-Taliban Pakistan-Jamaat-ul-Ahrar (TTPJA) spokesman Ehsanullah Ehsan’s more than three accounts. But he has re-emerged with a different identity each time.A letter written by Osama Bin Laden in May 2010 from inside his compound in Abbottabad, stated, “wide-scale spread of jihadist ideology, especially on internet and the tremendous number of young people who frequent the jihadist websites are a major achievement for Jihad”. The letter was released by Combating Terrorism Center at West Point.

There seems to be three phases of online jihad. Initially, in the 1980s, they operated websites; followed by forums and discussion

groups, where after careful 24 to 48-hour-long screening of users, permissions were granted; and now al-Qaeda offshoots, led by the Islamic State of Iraq and Sham (ISIS), has turned online jihad to social media warfare.

The new jihadi generation of militants is internet savvy. Their social Internet forums romanticise youngsters living in different parts of the world, especially Europe. There are reports of cases where after watching videos posted on Facebook, Twitter, YouTube, Dailymotion, Flickr, Ask.fm and other social media forums, teenagers including girls have travelled to Syria and Iraq to join ISIS in war zones.Watchdogs of jihadi websites believe that US-based social media companies are used to stream jihadi sentiments. Jihadis use apps that are available on Google Play and iTunes. A San Francisco-based website is providing an opportunity for uploading and downloading jihadi content which is fast, free and unobstructed for terror organisations. The safe-mail.net is used for secure interaction. Interestingly, safe-mail, which is an Israeli company, bills itself as “the most secure, easy to use communication system…”.The cyber army of militants also organise training modules for potential companions that includes bomb and missile-making to encrypted conversations. A few months back, a video was uploaded on Twitter showing safety procedures from drone attacks. The 30-minute video demonstrated the making of gadgetry required as safety guard.

Cees: Intel to Rent Page 5 of 9 15/04/2023

By Capt (Ret) C de Waart, feel free to share: in Confidence

Al-Qaeda’s Samir Khan set the trend for online warfare. He was the editor of the first online English jihadi magazine, Inspire. The other online magazines include Resurgence of AQIS, Azan of TTP, Ahya-e-Khilafat of TTPJA, Dabiq of ISIS and Harvest of Jabhat-al-Nusra Syria.Some of these forums engage with the user through a question and answer session. Many key leaders have appeared in such sessions. Such forums also provide trainings and booklets for hacking.Pakistan is confronting an important challenge of cyber security. In November 2011, law enforcement agencies raided a house in the neighbourhood of Gulistan-e-Jauhar in Karachi. During the operation, Abdul Moid Bin Abdus Salaam alias Abu Umar blew himself up. He headed the social media wing of al-Qaeda, As-Sahab. In November 2013, during Ashura procession riot in Rawalpindi, people belonging to two different sects used hate materials against each other. They spread misinformation on social media that a few people were slaughtered. That flared up the sectarian sentiments. Then again, terrorist organisations of Pakistan posted online videos and statements of the Karachi Dockyard and Karachi airport attacks. Former spokesman of TTP, Shahidullah Shahid pledged allegiance to ISIS through an audio and later a video recording. The LeJ issued various horrific videos of the Shia community massacres in Balochistan and Gilgit Baltistan region.Last year in December, Indian Police arrested 24-years-old Mehdi Masroor Biswas from Banglore. He was an engineer by training and an executive with an Indian multinational company. He ran one of the most influential ISIS twitter account @ShamiWitness and had more than 17,000 followers. Channel 4 of UK reported that Mehdi was managing the Twitter account.

This trend must be arrested on war footing. Otherwise the future will be catastrophic.“Every nation has its own CERT (Computer Emergency Response Team) — team that are tasked to deal with the emerging threat of cyber terrorism. But no such team functions in Pakistan,” says Ammar Jafri, founding head of FIA Cyber Crime Cell, NR3C (National Response Centre). “PISA (Pakistan Information Security Association) has its internationally-recognised CERT team but the government of Pakistan is not willing to acknowledge it,” claims Jafri who is also the president of PISA.

In Pakistan, there is no inclusive mechanism of monitoring internet traffic and the country is not a signatory of the Convention of Cyber Crime (CCC) also known as the Budapest Convention, the first international treaty on crimes committed via Internet and other computer networks. Its main objective, set out in the preamble, is to pursue a common criminal policy aimed at the protection of society against cybercrime, especially by adopting appropriate legislation and fostering international co-operation.

There are 53 counties that have signed the Budapest Convention but 39 European and six non-European countries have ratified this treaty, including the US.Pakistan needs global cooperation to fight the war of cyber terrorism and that can only be done if it has access to the data of infra-structured countries which include the US and European Union. These infra-structured countries have all the relevant data because their companies are the largest service providers of different applications.

“The entire cyber crime in Pakistan is being fought on the two sections, 36 & 37 of Electronic Transaction Ordinance (ETO),” says Barrister Zahid Jameel. “Pakistan is not on the platform of CCC because there is no cyber crime legislation in the country and we can only get the US data through this channel by legislation consistent with the international perspective.”

Iran Is Raising Sophistication and Frequency of Cyberattacks, Study Says

Cees: Intel to Rent Page 6 of 9 15/04/2023

By Capt (Ret) C de Waart, feel free to share: in Confidence

By DAVID E. SANGER and NICOLE PERLROTHAPRIL 15, 2015 WASHINGTON — In February, a year after the Las Vegas Sands was hit by a devastating cyberattack that ruined many of the computers running its casino and hotel operations, the director of national intelligence, James R. Clapper Jr., publicly told Congress what seemed obvious: Iranian hackers were behind the attack.Sheldon G. Adelson, the billionaire chief executive of Sands, who is a major supporter of Israel and an ardent opponent of negotiating with Tehran, had suggested an approach to the Iran problem a few months before the attack that no public figure had ever uttered in front of cameras.

“What I would say is: ‘Listen. You see that desert out there? I want to show you something,’ ” Mr. Adelson said at Yeshiva University in Manhattan in October 2013. He then argued for detonating an American nuclear weapon where it would not “hurt a soul,” except “rattlesnakes and scorpions or whatever,” before adding, “Then you say, ‘See, the next one is in the middle of Tehran.’ ”Instead, Tehran directed an attack at the desert of Nevada. Now a new study of Iran’s cyberactivities, to be released by Norse, a cybersecurity firm, and the American Enterprise Institute, concludes that beyond the Sands attack, Iran has greatly increased the frequency and skill of its cyberattacks, even while negotiating with world powers over limits on its nuclear capabilities.“Cyber gives them a usable weapon, in ways nuclear technology does not,” said Frederick W. Kagan, who directs the institute’s Critical Threats Project and is beginning a larger effort to track Iranian cyberactivity. “And it has a degree of plausible deniability that is attractive to many countries.” Mr. Kagan argues that if sanctions against Iran are suspended under the proposed nuclear accord, Iran will be able to devote the revenue from improved oil exports to cyberweapons. But it is far from clear that that is what Iran would do. When Mr. Clapper named Iran in the Sands attack, it was one of the few instances in which American intelligence agencies had identified a specific country that it believed was using such attacks for political purposes. The first came in December, when President Obama accused North Korea of launching a cyberattack on Sony Pictures. Other United States officials have said that Iran attacked American banks in retaliation for sanctions and that it destroyed computers at the oil giant Saudi Aramco in retaliation for the close Saudi ties with the United States.

The evidence from the Norse report, along with analyses by American intelligence agencies, strongly suggests that Iran has made much greater use of cyberweapons over the past year, despite international sanctions. The attacks have mostly involved espionage, but a few, like the Sands attack, have been for destructive purposes.In the report, to be released Friday, Norse — which, like other cybersecurity firms, has an interest in portraying a world of cyberthreats but presumably little incentive in linking them to any particular country — traced thousands of attacks against American targets to hackers inside Iran.The report, and a similar one from Cylance, another cybersecurity firm, make clear that Iranian hackers are moving from ostentatious cyberattacks in which they deface websites or simply knock them offline to much quieter reconnaissance. In some cases, they appear to be probing for critical infrastructure systems that could provide opportunities for more dangerous and destructive attacks. But Norse and Cylance differ on the question of whether the Iranian attacks have accelerated in recent months, or whether Tehran may be pulling back during a critical point in the nuclear negotiations.Norse, which says it maintains thousands of sensors across the Internet to collect intelligence on attackers’ methods, insists that Iranian hackers have shown no signs of letting up. Between

Cees: Intel to Rent Page 7 of 9 15/04/2023

By Capt (Ret) C de Waart, feel free to share: in Confidence

January 2014 and last month, the Norse report said, its sensors picked up a 115 percent increase in attacks launched from Iranian Internet protocol, or I.P., addresses. Norse said that its sensors had detected more than 900 attacks, on average, every day in the first half of March.Cylance came to a different conclusion, at least for Iran’s activities in the past few months, as negotiations have come to a head. Stuart McClure, the chief executive and founder of Cylance, which has been tracking Iranian hacking groups, said that there had been a notable drop in activity over the past few months, and that the groups were now largely quiet.American intelligence agencies also monitor the groups, but they do not publicly publish assessments of the activity. Classified National Intelligence Estimates over the past five years have identified Russia and China as the United States’ most sophisticated, and prolific, adversaries in cyberspace.However, American officials have said that Iran and North Korea concern them the most, not for their sophistication, but because their attacks are aimed more at destruction, as was the case with the attack on Sony Pictures. In addition to the Sands attack last year — about which Mr. Clapper gave no detail in public — Iran has been identified as the source of the 2012 attack on Saudi Aramco, in which hackers wiped out data on 30,000 computers, replacing it with an image of a burning American flag.American intelligence officials say Iran’s most sophisticated hackers are limited in number, but work for both front companies and the government. The officials are concerned that as destructive attacks become more frequent, the temptation will rise to launch attacks on what the government calls “critical infrastructure,” like railways, power grids or water supplies.Cylance researchers, for example, noted that Iranian hackers were using tools to spy on and potentially shut down critical control systems and computer networks in the United States, as well as in Canada, Israel, Saudi Arabia, the United Arab Emirates and a handful of other countries. Their targets have included a network that connects Marines and civilians across the United States, as well as networks of oil companies and major airlines and airports.Norse’s researchers also noted attacks from Iran that were directed at so-called Scada systems — short for supervisory control and data acquisition systems — like the kind that the United States and Israel attacked at Iran’s nuclear enrichment center in Natanz, using code that caused about 1,000 centrifuges to self-destruct.That strike, often referred to as the Stuxnet attack, may have inspired the Iranians to begin a cycle of retaliation, a recently disclosed memo from Edward J. Snowden’s trove of National Security Agency documents indicates. Norse says it saw evidence that Iranian hackers probed the network of Telvent, a company now owned by Schneider Electric that designs software to allow energy companies and power grid operators to control their valves and switches from afar.The company’s systems were breached by Chinese military hackers in 2012. Two years later, Norse said, it witnessed 62 attacks, in a span of 10 minutes, from an I.P. address in Iran on a Telvent system that provides the foundation for all of the company’s Scada infrastructure.“This activity,” Norse researchers wrote, “might be interpreted as an Iranian effort to establish cyberbeachheads in crucial U.S. infrastructure systems — malware that is dormant for now but would allow Iran to damage and destroy those systems if it chose to do so later.”

Apr 14, 2015 7:45EXCLUSIVE: Hackers Take Down Alhayat Pro Saudi News Website

Cees: Intel to Rent Page 8 of 9 15/04/2023

By Capt (Ret) C de Waart, feel free to share: in Confidence

TEHRAN (FNA 15 April)- A newly emerged group of Yemeni hackers attacked the pro-Saudi news website, AlHayat, on Monday in protest at the Riyadh's invasion of Yemen.The group that has introduced itself as "Yemen Cyber Army" hacked AlHayat.com "to support Yemen revolution", according to a statement left on AlHayat's website which also shows a photo of the Lebanese Hezbollah leader, Seyed Hassan Nasrallah.The group said the cyberattack on the pro-Saudi paper was codenamed OpSaudi, and added in their message, which was apparently addressed to the "Saudi Dictators" that "we are oppressed, but not weak; we are waiting for you. Come with all your Israeli and US made weapons!" "The message is short but clear: Prepare Your Hideaway," it added. The hackers said they leaked the names of All Alhayat users and subscribers "to warn all Pro-Saudi or pan-Arabs accept Yemen Revolution and join us against your dictators". To see the leaked files and the group's statement please click here, here, here, here, and here. To see the defacement files, please click here, here and here.

**Regards Cees 'WE ARE ALREADY HERE'

 

Cees: Intel to Rent Page 9 of 9 15/04/2023