✌NCTC Report – Electricity Infrastructure and Cyber Attacks – Original Document✌

Read all at

https://t.me/ABOVETOPSECRETXXL/33643

NCTC Report – Electricity Infrastructure and Cyber Attacks – Original Document

❌©BERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY – websites: https://www.berndpulch.org
https://googlefirst.org

PLEASE SUPPORT OUR COMMON CAUSE AND HELP ME TO STAY ALIVE.

https://www.patreon.com/bePatron?u=54250700

https://www.patreon.com/berndpulch?utm_campaign=creatorshare_creator

https://www.buymeacoffee.com/berndpulch

CRYPTO WALLET  for

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

If you want to be totally anonymous please use Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

🙏GOD BLESS YOU🙏

Follow the ONLY MEDIA with the LICENSE TO SPY ✌️@abovetopsecretxxl

The Joint Committee on the National Security Report “A hostage to fortune…” – Follow the ONLY MEDIA with the LICENSE TO SPY ✌️@abovetopsecretxxl

Read all at

https://t.me/ABOVETOPSECRETXXL/31976

Scandal in Austria: Green ministry and left-wing cultural activists protected pedophile TV star

✌️SHARE

👉THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
https://berndpulch.org/about-me/
👉JOIN @ABOVETOPSECRETXXL
https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
👉JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL
SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

In Austria, a pedophile scandal is currently causing horror in the cultural scene. The actor Florian Treichtmeister, who is particularly popular among the left-wing chic scene and has won countless awards, hoarded more than 56,000 (!) pieces of child pornography on various data carriers over the past 15 years. It was only thanks to his ex-girlfriend that this circumstance came to light through her report. Because (green) politics and left-wing cultural workers knew already since 2021 (!) of investigations against the “TV star”. Whether children were also abused by the actor is still unclear.

Read more: Scandal in Austria: Green ministry and left-wing cultural activists protected pedophile TV star

The Freedom Party sharply attacks First Lady Doris Schmidauer.

Meanwhile, even Austrian mainstream media are asking themselves the anxious question, “What did Doris Schmidauer know?” the eternally clueless grinning wife of Federal President Van der Bellen.

Schmidauer is a member of the supervisory board of the Burgtheater

Nevertheless, she still did not take action. Now FPÖ Secretary General Christian Hafenecker attacks the Green First Lady:

“Now full transparency should be practiced for once. I would be interested to know whether the left-wing chic protected one of theirs.” (oe24)

Hafenecker continued:

“The Burgtheater has absolute argumentation emergency. Here I would like to know what actually happened. Ms. Schmidauer should also come out of her silence for once and explain what happened.

The second FPÖ secretary general Michael Schnedlitz also demands full clarification:

“Even if Treichtmeister has dismissed the accusations to the Burgtheater as baseless rumors and an act of revenge by an ex-girlfriend: Why wasn’t he suspended until clarification? The Bundestheaterholding was supposedly informed, but was the Burgtheater’s supervisory board also informed? And if so, what did the members, including prominent names like Doris Schmidauer, after all the wife of the Federal President, have to say about it?”

“Child pornography is child abuse”.

“The handling of this scandal in itself is so catastrophic that a transition to the order of the day and the mere conviction of the accused by the judiciary is by far not enough. Child pornography is always a product of child abuse that destroys children’s souls and where no one can look away,” Schnedlitz said.

Just the tip of the iceberg?

As has now become known, investigations into the Treichtmeister case are likely to have been known to both the Green-led Department of Culture under Green State Secretary Andrea Mayer and Vice Chancellor Werner Kogler, who is also Green, as well as left-wing cultural workers at the Burgtheater and the Bundestheater-Holding since September 2021. The pedophile actor was therefore apparently covered by the political side and the cultural scene.

“In the industry, investigations were an open secret”.

  • said a tabloid about the case.

The Burgtheater announced as justification:

“Teichtmeister was confronted with the allegations by the management and has credibly denied them all.”

Allegedly, the actor talked his way out of it with a revenge action by his ex-girlfriend. But the scandal is currently expanding.

Despite investigations, pedophile was allowed to shoot with children!

In the summer of 2021, Teichtmeister even shot another film with children: In “Serviam” he played the father of a twelve-year-old girl! His ex-girlfriend had already filed a complaint with the police at that time. The police file with the accusations reads like a crime script: bodily harm, dangerous threat, continued use of violence, narcotics law.

But the left-wing cultural scene already starts with the usual relativizations. While Techtmeister and his pedophilia are played down in the worst possible way in the left-wing Standard forum, artists do not want to let this scandal drag down the Sisi film “Corsage,” which is currently in the running for an Oscar abroad. And this, although Techtmeister plays the leading role in it.

    110g cocaine as “personal use

    The theory or suspicion that Teichmeister enjoyed a “celebrity bonus” in the prosecution and with the public prosecutors and was/is also presumably part of a larger pedophile network, which reaches into the highest circles, is likely to be substantiated. Because as it became known now, one found with the pedophile actor already in August 2021 with a house search 110 gram cocaine

    But a criminal prosecution was dropped – with the argument, he could make credible that it was “personal use”. A complaint filed by his ex-girlfriend for domestic violence was also not pursued further because the woman was not believed.

    In view of the scandal, the left-wing Standard did not miss the opportunity to publish a “cheering article” on Teichtmeister’s acting performance. And the left-wing writer Elfride Jelinke also said that one must separate “the work from the artist. Of course, leftists don’t care about that when it comes to their historical revisionism, which in a mania of “cancle culture” wants to rename and ban everything and everyone who doesn’t fit into their world view. No “work is separated from the artist” here.

    It further became known that the lawyer of a mother of a child with whom Teichtmeister was filming contacted the director of the film “Serviam” in October 2021 and sued for an injunction against Teichtmeister taking photos of the child. Teichtmeister allegedly photographed children on the film sets and privately captioned those photos with speech bubbles that included phatnasies of violence and rape.

    Austria’s federal government is overflowing with expressions of dismay and calls for stricter punishments and laws following the widening pedophile scandal involving actor Teichtmeister. It was the politicians themselves who helped to cover up the case from the public.

    They now want to extend the sentencing range for possession of child pornography from two years to up to five years. Teichtmeister could even be spared a prison sentence. In the case of left-wing cuddly justice and since he is so far blameless, remorseful and confessed, a suspended sentence would also be possible.

    The defense attorney of the pedophile actor, the lawyer and constitutional judge (!) Michael Rami, is also causing a stir. This described the act of his client as a “pure digital offense”. “This legal opinion is not only morally reprehensible, it is also a mockery of all children to whom cruel, sexualized violence was inflicted in front of a running camera,” Sepp Rothwangl of the platform “Betroffener kirchlicher Gewalt” said of the statements.

    Whether Teichtmeister was or is part of a pedophile network (and into which elite circles these connections went) has strangely been largely left out of the debate so far. And this despite the fact that the amount of seized material (over 56,000 files) clearly indicates this. Teichtmeister claims to have only obtained the child pornography from the darknet since 2008. Without backers or further buyers. But other actors are said to be involved.

    Thus, it is the tip of an iceberg that could shake the entire left-wing cultural scene in Austria. One remembers, for example, the statements of former FPÖ Vice Chancellor Heinz-Christian Strache in the so-called Ibiza video, according to which he knew an informant who could prove sexual acts of ex-SPÖ Chancellor Christian Kern with minors in Africa.

    The latest findings in the Techtmeister case leave even experienced observers speechless at the audacity and negligence involved. Thus, the pedophile actor not only filmed with children AFTER the investigations, he was also invited as a guest of honor (!) to the parliament to read texts of victims there in 2016 as part of a state act on child abuse! Already since 2008, Techtmeister is known to have collected child pornography.

    And suddenly, even former colleagues and artists dare to come out of hiding. Actress Valerie Huber, for example, posted the following lines on her Instagram channel under an article on the Techtmeister case:

    “Finally it’s out, finally not everyone is covering up everything. Internally known for a long time and still continue to play at the Burgtheater as if nothing is wrong…”

    In turn, the Exxpress reported that Austria’s media law prevented the medium from mentioning Teichtmeister’s name in connection with the pedophile scandal as early as June 2022. And a whistleblower claims to have revealed to Medium:

    “As with Teichtmeister, everything is to be covered up with this actor so that the film project is not damaged. Again, many people know about the accusations, and again, no one brings this to the public.”

    THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

    https://t.me/ABOVETOPSECRETXXL

    👉JOIN @ABOVETOPSECRETXXL

    US Delta Command and Control was hacked

    SUPPORT US AND Become a Patron!

    CLICK HERE: https://www.patreon.com/bePatron?u=54250700

    True Information is the most valuable resource and we ask you kindly to give back. Thank you!

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

    https://t.me/ABOVETOPSECRETXXL

    https://gab.com/berndpulch

    https://gettr.com/user/berndpulch

    https://truthbook.social/berndpulch

    The Joker DPR hacked into the much-vaunted American Delta command and control program, which is actively used by the AFU. To make it clear, this is a program in which all data on friendly and enemy troops is entered for command and control

    THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

    https://t.me/ABOVETOPSECRETXXL

    Handbook to help Victims of serious international Crimes

    SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

    https://t.me/ABOVETOPSECRETXXL

    👉JOIN @ABOVETOPSECRETXXL

    https://gab.com/berndpulch

    READ ALL AT:

    https://t.me/ABOVETOPSECRETXXL/19223

    👉JOIN @ABOVETOPSECRETXXL
    ABOVETOPSECRETXXL
    http://www.berndpulch.org
    THE ONLY WEBSITE WITH THE LICENSE TO SPY!
    https://gab.com/berndpulch
    👉JOIN @ABOVETOPSECRETXXL

    https://www.bitchute.com/channel/R55w1IXstR3h/

    THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

    https://t.me/ABOVETOPSECRETXXL

    👉JOIN @ABOVETOPSECRETXXL

    250 Gigabytes Hacked From The Metropolitan D.C. Police By The Ransomware Group Babuk

    SUPPORT US AND Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    🚨 FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

    https://t.me/ABOVETOPSECRETXXL

    Babuk Locker è il primo nuovo ransomware aziendale del ...

    DDOsecrets reports: “250 gigabytes hacked from the Metropolitan D.C. police by the ransomware group known as Babuk. The data includes a 156.35 gigabyte “gang database” (released by the hackers as “all”) and two 64.19 gigabyte (released by the hackers as “HR”) and 29.03 gigabyte (released by the hackers as “part 2”) human resource datasets.

    Distributed Denial of Secrets is immediately making the data available to journalists and researchers, and is in the process of reviewing it for portions that can be publicly released.

    The hackers released the following screenshots (click to view enlarged versions) showing what they had access to and what is presumably contained in the data that is being released. The screenshots are offered to maintain a complete record and to offer a preliminary overview to journalists, researchers and curious citizens.

    Distributed Denial of Secrets has located and converted 74,874 emails from the largely inaccessible .PST format to the universal .EML format, which are being made available to the public. The most recent collection of emails can be downloaded here. The emails come from the lead civilian analyst for the Department’s Intelligence Branch.

    Some email conversions are also being provided directly to journalists and researchers.This includes 17,690 emails from the Director of Human Resources as well as 6,022 emails from then-intern Marvin “Ben” Haiman, now the Executive Director of the Professional Development Bureau and former Director for the Homeland Security Advisory Council for DHS.

    The 98,586 emails are organized by archive, retain their original folder structure and are organized chronologically. Due to the way the emails were extracted and converted, they may not pass DKIM inspection. Forensic evaluation should only be performed on the original archives, as the conversions are provided only for convenience of journalists and other researchers.

    THIS IS AN EXCERPT – YOU CAN DOWNLOAD THE FULL DOCUMENT AND MANY MORE FOR FREE AT OUR TELEGRAM CHANNEL

    https://t.me/ABOVETOPSECRETXXL

    CISA: COST OF A CYBER INCIDENT: SYSTEMATIC REVIEW AND CROSS-VALIDATION – ORIGINAL DOCUMENT

    SUPPORT US AND Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    🚨 FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

    https://t.me/ABOVETOPSECRETXXL

    Continue reading “CISA: COST OF A CYBER INCIDENT: SYSTEMATIC REVIEW AND CROSS-VALIDATION – ORIGINAL DOCUMENT”

    COMPUTER CRIME EXPERT WITNESS MANUAL – ORIGINAL DOCUMENT

    SUPPORT US AND Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    🚨 FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

    https://t.me/ABOVETOPSECRETXXL

    Continue reading “COMPUTER CRIME EXPERT WITNESS MANUAL – ORIGINAL DOCUMENT”

    Blumenthal Calls Out Mark Zuckerberg During Facebook Whistleblower Hearing

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    LIVESTREAM – Facebook Whistleblower Testifies To Senate Commerce Subcommittee

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    UNITED STATES VS HACKER WORKING FOR UAE – ORIGINAL DOCUMENT

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    Continue reading “UNITED STATES VS HACKER WORKING FOR UAE – ORIGINAL DOCUMENT”

    ANONYMOUS – These Insanely Strange Videos Will Keep You Awake At Night – WHAT IS GOING ON?

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    Person Convicted To 11 Years For Money Laundering For North Korea

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    RealBanknotes.com > North Korea p66a: 5000 Won from 2002

    Ghaleb Alaumary, a 36-year-old dual U.S and Canadian citizen, worked for cyber criminals including the three North Koreans who heisted as much 1.3 billion dollars in a cybercrime spree believed to be executed on behalf of North Korean intelligence.Among the victims of the spree was a major Maltese bank, the Bank of Valletta, which was robbed of $14 million in 2019. To turn that cash into usable currency, the hackers turned to Alaumary.

    “Alaumary recruited and organized individuals to withdraw stolen cash from ATMs; he provided bank accounts that received funds from bank cyber-heists and fraud schemes; and, once the ill-gotten funds were in accounts he controlled, Alaumary further laundered the funds through wire transfers, cash withdrawals, and by exchanging the funds for cryptocurrency,” the DOJ explained.

    The North Korean spree employed other high-profile money launderers, including the Nigerian social media influencer Ramon “Hushpuppi” Abbas.

    Before working with the North Koreans, Alaumary was implicated as an accomplice in the theft of $9.4 million from Canada’s McEwan University.

    According to the DOJ, Alaumary worked with others to convince the university that they represented a construction company who had been involved in a major building project at the school, ultimately defrauding the school into wiring the team millions.

    In addition to the jail time, Alaumary has also been ordered to pay more than $30 million to his victims in restitution.

    “Other victims of Alaumary’s crimes included banks headquartered in India, Pakistan and Malta, as well as companies in the United States and U.K., individuals in the United States and a professional soccer club in the U.K.,” the DOJ said.

    NSA – Scope Of Treasure Map – Map Of Every Router & Device On The Global Internet – Original Document

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    Page 1 of Treasure Map Presentation
    Continue reading “NSA – Scope Of Treasure Map – Map Of Every Router & Device On The Global Internet – Original Document”

    Anonymous – “Everyone Should Be Prepared” – Watch Within The Next 48 hrs

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    Exposed – Google Kenosha WI -Warrant -Original Document

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    Google is giving data to police based on search keywords, court docs show -  CNET
    Continue reading “Exposed – Google Kenosha WI -Warrant -Original Document”

    Revealed – Colonial Piepeline – bc – Data Breach Notification – Original Document

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    Cyber-Security
    Continue reading “Revealed – Colonial Piepeline – bc – Data Breach Notification – Original Document”

    Background To Assessing Russian Influence In US Elections – Russia Hack Report – Original Document

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    http://www.berndpulch.org

    THE ONLY WEBSITE WITH THE LICENSE TO SPY!

    Page 1 of Russia Hack Report
    Continue reading “Background To Assessing Russian Influence In US Elections – Russia Hack Report – Original Document”

    Presidential Order Against Russian Hackers – Original Document

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    US expels Russian diplomats over cyber attack allegations - BBC News

    This executive order announced publicly acknowledged measures taken by the Obama administration in response to Russia’s alleged involvement in the hacking of Democratic National Committee and other computer systems. The annex identifies the entities targeted by the measures – including the Russian security service (FSB) and military intelligence (GRU).

    Page 1 of Document-10. Barack Obama, Executive Order, "Taking Additional Steps to Address the National Emergency with Respect to Significant Malicious Cyber-Enabled Activities," w/Annex. December 29, 2016. Unclassified.
    Continue reading “Presidential Order Against Russian Hackers – Original Document”

    Video – Iran Cyber Attack Tactics Revealed

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Documents have revealed how a cyber attack could be carried out against western nations by Iran. The secret research sets out details on how to attack various targets including sinking a cargo ship or blowing up a fuel pump at a petrol station.

    It’s believed the documents were put together by a cyber unit in the Islamic Revolutionary Guard Corps.

    US Court Action Vs North Korean Hackers & Their Cryptomoney Accounts – Original Document

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Commentary: Making sense of North Korea's hacking strategy | Reuters
    Page 1 of North Korea Hacking & Cryptocurrency
    Continue reading “US Court Action Vs North Korean Hackers & Their Cryptomoney Accounts – Original Document”

    Sky – ‘Enough Is Enough’: China ‘Named And Shamed’ By 30 Nations Over Cyber Attacks

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Assistant Defence Minister Andrew Hastie says it’s a “very sound development” that 30 nations came together and “named and shamed” China for cyber attacks on Microsoft.

    This comes after Western world allies including Australia, the United States and Japan joined forces to directly blame the communist superpower for a major cyber attack on Microsoft software. The attack exploited weaknesses in Microsoft Exchange software which impacted thousands of computers and networks across the world.

    “I think it’s a very sound development that we’ve named and shamed China behind these hacks – because it’s got to stop,” Mr Hastie told Sky News host Peta Credlin. “We have boundaries in our normal everyday relationships and so too have boundaries on the international stage. “And this is 30 nations saying to China ‘enough is enough – no more’.”

    Chinese Cyber Attacks Getting To ‘Critical Stage’

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    The Australian government, along with allies, has accused China of a major cyber attack on Microsoft software. It is alleged Chinese state-sponsored hackers compromised 400,000 servers across the world, including in Australia.

    The Australian’s Chris Griffith told Sky News these attacks are becoming more prevalent and critical around the world. “It’s hard to pinpoint exactly if the state (China) is explicitly involved in it, or it is encouraging it, or if it is tacitly approving it,” he said. “In the last year we have seen the ramping up of cyber activity to a level we haven’t seen before. “It’s getting to a critical stage.”

    Operation Trojan Shield – FBI San Diego Infiltraded Hundreds Of Criminal Networks – Original Document

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Encrochat-Nachrichten geknackt: Schon 24 Verhaftungen – Kryptodienst ist  ein Geschenk für Brandenburgs Drogenfahnder | Lausitzer Rundschau
    Continue reading “Operation Trojan Shield – FBI San Diego Infiltraded Hundreds Of Criminal Networks – Original Document”

    Presidential Documents – Executive Order 14017 – America’s Supply Chains – Original Document

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Ransomware Attack Hits Data Center Provider CyrusOne: Report | Threatpost

    Colonial Pipeline, supplier of 45% of East Coast fuel, was paralyzed in February by DarkSide ransomware attack.

    In response to the Colonial Pipeline event attributed to the ransomware group DarkSide, the Biden Administration has announced an all-of-government effort to mitigate potential energy supply disruptions. On top of temporary actions to relieve fuel shortages, agencies such as the FBI and CISA have released advisory documents to “help [critical infrastructure] owners and operators improve their entity’s functional resilience by reducing their vulnerability to ransomware.”

    In addition, President Biden signed an Executive Order designed broadly to “improve the nation’s cybersecurity,” although experts are already questioning whether the anticipated measures could have prevented any of the recent serious cyber events such as SolarWinds or Colonial Pipeline.

    Continue reading “Presidential Documents – Executive Order 14017 – America’s Supply Chains – Original Document”

    CISA & FBI – DarkSide Ransomware – Best Practices For Preventing Business Disruption From Ransomware Attacks – Original Document

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Lazarus Group Brings APT Tactics to Ransomware | Threatpost
    Continue reading “CISA & FBI – DarkSide Ransomware – Best Practices For Preventing Business Disruption From Ransomware Attacks – Original Document”

    NSA General Counsel Gerstell – “How We Need To Prepare For A Global Cyber Pandemic” – Original Document

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back

    Glenn S. Gerstell SPEECH | April 9, 2018

    By some accounts, Russian meddling in the US election system may have originated from the depths of a hot dog cart. It’s a success story, of sorts.

    In the early 1990s, an enterprising hot dog vendor in Russia seized upon the entrepreneurial opportunities created by the collapse of the Soviet Union to start his own catering company. He eventually grew his business enough to win lucrative catering contracts with the Russian government. He and his restaurants threw opulent banquets for Kremlin officials, earning him the nickname “Putin’s Cook.” Yevgeny Prigozhin’s company even won a contract in 2011 to deliver school lunches across Moscow, but children wouldn’t eat the food, complaining that it smelled rotten. Bad publicity ensued. Prigozhin’s company responded not by upgrading the food, but by hiring people to flood the internet with postings praising the food and rejecting complaints. Presumably, they found it cheaper to use the internet to write fake reviews than to fund deluxe hot dogs for schoolchildren.

    Continue reading “NSA General Counsel Gerstell – “How We Need To Prepare For A Global Cyber Pandemic” – Original Document”

    Confidential – The Impact Of Covid19 On Organized Crime – UNODC Report – Original Document

    Become a Patron!

    COVID 19 and organized crime: »Latin American governments are in a  state-making competition with crime«

    The European Banking Authority, EBA, Hit By Cyberattack Orchestrated by Chinese Spies

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    The European Financial Position, EBA, said it has become the latest casualty of a digital assault, which Microsoft said a week ago was organized by Chinese government operatives.

    The EBA said that it accepts no information was extricated from the assault on its Microsoft Trade Workers, and that it has now gotten its email foundation.

    Continue reading “The European Banking Authority, EBA, Hit By Cyberattack Orchestrated by Chinese Spies”

    UNITED NATIONS WARN THAT CRIMINAL SYNDICATES TURN TO CYBERCRIME

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Some like the notorious “Gomopa & Co. ” are doing it already in the aftermath of the Stasi’s affection for surveillance and computers but now UN officials warn that many criminal syndicates turn to cybercrime.

    COVID-19 transformed the global economy. While governments fought over scarce medical supplies, much of the world’s population sat at home. As workplaces stood unattended and malls lay empty, the massive resulting increase in internet traffic brought with it an inevitable explosion in illegal online activity.

    Continue reading “UNITED NATIONS WARN THAT CRIMINAL SYNDICATES TURN TO CYBERCRIME”

    MUTMASSLICHER GOMOPA-DRAHTZIEHER DR JOCHEN RESCH AUF DER WARNLISTE VON STIFTUNG WARENTEST

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    https://www.test.de/Anlegeranwalt-Etwas-zu-vielseitig-5662824-0/

    ALLES DR MABUSE ODER WAS ?

    Gomopa-Stasi-Opfer: “Darum Ist Jochen Resch Der Erfundene “GoMoPa”-Goldman & Manfred Resch Der Erfundene “Morgenstern”

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Hallo Herr Pulch,

    KGB-Spion Jochen Resch war 1989 monatelang in Moskau, einerseits aus Angst andererseits, um seine neue Rolle vorzubereiten. Dann hat er mit Stasi-Oberst Ehrenfried Stelzer die deutsch-russische Gesellschaft gegründet und parallel dazu Gomopa den Financial Intelligence Service, Intelligence steht für Geheimdienst wie Insider genauestens bestätigen können. Anschließend wurde Stelzer Reschs Strohmann bei der DIA und Maurischat Reschs Strohmann bei Gomopa.

    Der Luca-Brasi-Brutalo der Gomopa hat keinerlei Bildung, ist wie “eine Flasche leer”, kann kein Englisch und keine Orthographie und ist leicht lenkbar für seinen Führungsoffizier Resch.

    Continue reading “Gomopa-Stasi-Opfer: “Darum Ist Jochen Resch Der Erfundene “GoMoPa”-Goldman & Manfred Resch Der Erfundene “Morgenstern””

    DHS – Cybersecurity And Infrastructure Security Agency Mail-In Voting In 2020 Infrastructure Risk Assessment

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Page Count: 11 pages
    Date: July 28, 2020
    Restriction: None
    Originating Organization: Cybersecurity and Infrastructure Security Agency, Department of Homeland Security
    File Type: pdf
    File Size: 577,002 bytes
    File Hash (SHA-256): 4018616B3963268F457A9A294BF1A3A04EB90025898BC3C54B4785B048C873BB
     
     

    Continue reading “DHS – Cybersecurity And Infrastructure Security Agency Mail-In Voting In 2020 Infrastructure Risk Assessment”

    Exposed – Russia Likely To Continue Seeking To Undermine Faith In US Electoral Process

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Homeland Security Experts on the Biggest Threats and Challenges the U.S.  Faces in 2020 – Homeland Security Today
     
    Page Count: 4 pages
    Date: September 3, 2020
    Restriction: For Official Use Only
    Originating Organization: Cyber Mission Center, Office of Intelligence and Analysis, Department of Homeland Security
    File Type: pdf
    File Size: 167,819 bytes
    File Hash (SHA-256): CD0E044E731342D57AB13DCBB9C8B56D2D5A6295D1E51F6409461D1CAB55C61A
     

    Continue reading “Exposed – Russia Likely To Continue Seeking To Undermine Faith In US Electoral Process”

    FSBs Magnificent Seven: Neue Verbindungen Zwischen Berlin Und Istanbul

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    “Roman Davydov”, Foto aus dem slowakischen Visumantrag.

    Am 23. August 2019 wurde Zelimkhan Khangoshvili, ein georgischer Asylbewerber tschetschenischer Herkunft, auf dem Rückweg vom Freitagsmoscheeservice in einem Park in der Nähe des Berliner Kleiner Tiergartens ermordet. Der Mörder war von der deutschen Polizei gefangen genommen worden, nachdem er mit dem Fahrrad vom Tatort weggelaufen war und zwei Teenager gesehen hatten, wie er seine Perücke, Kleidung und seinen Schalldämpfer in die Spree entsorgt hatte. Er ist seitdem in Haft und hat Unschuld behauptet.
    In unseren früheren gemeinsamen Ermittlungen mit Der Spiegel und The Insider (Russland) haben wir den Mörder – der unter der gefälschten Identität von Vadim Sokolov (49) reiste – als Vadim Krasikov (54) identifiziert Mindestens zwei Auftragsmorde: 2007 in Karelien und 2013 in Moskau. Für diese Morde wurde er von den russischen Behörden auf einer Interpol Red Notice gesucht – bis er 2015 plötzlich fallen gelassen wurde.
    Wir haben letztendlich herausgefunden, dass das Attentat vom russischen FSB, der staatlichen Sicherheitsbehörde, geplant und organisiert wurde. Die Vorbereitung des Mordes wurde direkt von hochrangigen Mitgliedern einer Veteranenstiftung ehemaliger Spetsnaz-Offiziere der Eliteeinheit FSB Vympel überwacht. Wir konnten jedoch nachweisen, dass der FSB direkt an der Planung und Unterstützung der Operation beteiligt war, da wir die wiederholte Anwesenheit des Mörders in den FSB Spetznaz-Schulungseinrichtungen in den Monaten vor seiner Reise unter einer von der Regierung ausgestellten Deckungsidentität geolokalisieren konnten im August 2019 nach Deutschland.

    Continue reading “FSBs Magnificent Seven: Neue Verbindungen Zwischen Berlin Und Istanbul”

    Wer Ist Dmitry Badin, Der Von Deutschland Angeklagte GRU-Hacker Wegen Der Bundestags-Hacks?

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Am 5. Mai 2020 berichteten deutsche Medien, dass die deutsche Bundesanwaltschaft einen Haftbefehl gegen den russischen Staatsbürger Dmitry Badin erlassen hat, den Hauptverdächtigen beim Hacking des Deutschen Bundestages im Jahr 2015.

    Was war der Bundestags-Hack 2015?

    Continue reading “Wer Ist Dmitry Badin, Der Von Deutschland Angeklagte GRU-Hacker Wegen Der Bundestags-Hacks?”

    Website Defacement Activity Indicators Of Compromise And Techniques Used To Disseminate Pro-Iranian Messages

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back

    Following a week ago’s US airstrikes against Iranian military initiative, the FBI watched expanded revealing of site ruination movement spreading Pro-Iranian messages. The FBI accepts a few of the site disfigurement were the consequence of digital on-screen characters misusing realized vulnerabilities in content administration frameworks (CMSs) to transfer ruination documents. The FBI exhorts associations and individuals worried about Iranian digital focusing on be acquainted with the markers, strategies, and procedures gave in this FLASH, just as strategies and methods gave in as of late spread Private Industry Notification “Notice on Iranian Cyber Tactics and Techniques” (20200109-001, 9 January 2020).

    Continue reading “Website Defacement Activity Indicators Of Compromise And Techniques Used To Disseminate Pro-Iranian Messages”

    Cyber Criminals Use Social Engineering and Technical Attacks to Circumvent Multi-Factor Authentication

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    The FBI has watched digital entertainers bypassing multifaceted verification through normal social building and specialized assaults. This Stick clarifies these techniques and offers relief procedures for associations and elements utilizing multifaceted confirmation in their security endeavors. Multifaceted validation keeps on being a solid and compelling safety effort to secure online records, as long as clients play it safe to guarantee they don’t succumb to these assaults.

    Multifaceted validation is the utilization of an assortment of strategies to affirm a client’s personality rather than just utilizing a username and secret phrase. Regularly this sort of verification utilizes an optional token which changes after some time to give a one-time password, yet numerous organizations currently utilize biometrics or social data, for example, time of day, geolocation, or IP address—as a type of validation.

    Danger Diagram

    FBI detailing distinguished a few strategies digital on-screen characters use to go around prevalent multifaceted verification systems so as to acquire the one-time password and access ensured accounts. The essential techniques are social building assaults which assault the clients and specialized assaults which target web code.

    In 2019 a US banking establishment was focused by a digital assailant who had the option to exploit a blemish in the bank’s site to evade the two-factor confirmation actualized to ensure accounts. The digital assailant signed in with taken injured individual accreditations and, when arriving at the optional page where the client would typically need to enter a Stick and answer a security question, the aggressor entered a controlled string into the Internet URL setting the PC as one perceived on the record. This enabled him to sidestep the Stick and security question pages and start wire moves

    from the exploited people’s records.

    In 2016 clients of a US banking establishment were focused by a digital assailant who ported their telephone numbers to a telephone he possessed—an assault called SIM swapping. The aggressor considered the telephone organizations’ client care delegates, discovering some who were all the more ready to give him data to finish the SIM swap. When the aggressor had command over the clients’ telephone numbers, he called the bank to demand a wire move from the unfortunate casualties’ records to another record he possessed. The bank,

    perceiving the telephone number as having a place with the client, didn’t request full security questions yet mentioned a one-time code sent to the telephone number from which he was calling. He additionally mentioned to change PINs and passwords and had the option to connect unfortunate casualties’ charge card numbers to a versatile installment application.

    Through the span of 2018 and 2019, the FBI’s Web Wrongdoing Grievance Center and FBI unfortunate casualty grumblings watched the above assault—SIM swapping—as a typical strategy from digital culprits trying to go around two-factor validation. Casualties of these assaults have had their telephone numbers taken, their financial balances depleted, and their passwords and PINs changed. A large number of these assaults depend on socially building client care agents for significant telephone organizations, who offer data to the assailants.

    In February 2019 a digital security master at the RSA Gathering in San Francisco, exhibited a huge assortment of plans and assaults digital on-screen characters could use to dodge multifaceted validation. The security master exhibited ongoing instances of how digital entertainers could utilize man-in-the-center assaults and session capturing to block the traffic between a client and a site to lead these assaults and keep up access for whatever length of time that conceivable. He likewise showed social building assaults, including phishing plans or fake instant messages implying to be a bank or other help to make a client sign into a phony site and surrender their private data.

    At the June 2019 Hack-in-the-Crate gathering in Amsterdam, digital security specialists exhibited a couple of devices—Muraena and NecroBrowser—which worked pair to robotize a phishing plan against clients of multifaceted confirmation. The Muraena instrument captures traffic between a client and an objective site where they are mentioned to enter login qualifications and a token code not surprisingly. When validated, NecroBrowser stores the information for the casualties of this assault and seizes the session treat, permitting digital on-screen characters to sign into these private records, take them over, and change client passwords and recuperation email addresses while keeping up access as far as might be feasible.

    Moderation Systems

    Guarding against multifaceted confirmation assaults requires consciousness of the assaults which evade the security and consistent watchfulness for social designing assaults.

    Instruct clients and heads to distinguish social building deceit—how to perceive counterfeit sites, not tap on maverick connections in email, or square those connections altogether—and show them how to deal with basic social designing strategies.

    Consider utilizing extra or progressively complex types of multifaceted validation for clients and overseers, for example, biometrics or conduct verification strategies, however this may add burden to these clients.

    FBI Cyber Unit Identifies Campaigns Against Students

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Image result for fbi cyber crimes

    The FBI has identified successful spearphishing campaigns directed at college and university students, especially during periods when financial aid funds are disbursed in large volumes. In general, the spearphishing emails request students’ login credentials for the University’s internal intranet. The cyber criminals then capture students’ login credentials, and after gaining access, change the students’ direct deposit destination to bank accounts within the threat actor’s control.

    Threat

    In February 2018, the FBI received notification of a spearphishing campaign targeting students at an identified University in the south eastern United States. The campaign occurred in January 2018 when an unidentified number of students attending the University received an email requesting their login credentials for the University’s internal intranet. Using the University’s intranet portal, the cyber criminals accessed a third-party vendor that manages the disbursement of financial aid to students and changed the direct deposit information for 21 identified students to bank accounts under the cyber criminal’s control. The threat actor stole approximately $75,000 from the 21 students. The student accounts were accessed by at least 13 identified US Internet Protocol (IP) addresses.

    On 31 August 2018, the Department of Education identified a similar spearphishing campaign targeting multiple institutions of higher education. In this campaign, the cyber criminals sent students an email inviting them to view and confirm their updated billing statement by logging into the school’s student portal. After gaining access, the cyber criminals changed the students’ direct deposit destinations to bank accounts under the threat actor’s control.

    The nature of the spearphishing emails indicates the cyber criminals conducted reconnaissance of the target institutions and understand the schools’ use of student portals and third-party vendors for processing student loan payment information. In addition, the timing of the campaigns indicates the cyber criminals almost certainly launched these campaigns to coincide with periods when financial aid funds are disseminated in large volumes.

    Recommendations

    The FBI recommends providers implement the preventative measures listed below to help secure their systems from attacks:

    Notify all students of the phishing attempts and encourage them to be extra vigilant
    Implement two-factor authentication for access to sensitive systems and information
    Monitor student login attempts from unusual IP addresses and other anomalous activity
    Educate students on appropriate preventative and reactive actions to known criminal schemes and social engineering threats
    Apply extra scrutiny to e-mail messages with links or attachments directed toward students
    Apply extra scrutiny to bank information initiated by the students seeking to update or change direct deposit credentials
    Direct students to forward any suspicious requests for personal information to the information technology or security department

    Czech Republic – Cyber & Security Warning on Huawei and ZTE

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Executive Summary

    The National Cyber and Information Security Agency, registered office at Mučednická 1125/31, 616 00 Brno, pursuant to §12 paragraph 1 of the Act No. 181/2014 Coll. on Cyber Security and Change of Related Acts (Act on Cyber Security), as amended, issues this

    w a r n i n g :

    The use of technical or program tools of the following companies, including their subsidiary companies, poses a threat to the cyber security.
    – Huawei Technologies Co., Ltd., Shenzhen, People’s Republic of China
    – ZTE Corporation, Shenzhen, People’s Republic of China

    R E A S O N I N G

    1) On the basis of the facts found during the execution of its competence, the National Cyber and Information Security Agency (hereinafter referred to as “NCISA”) has found that the use of the technical or program tools of the aforementioned companies poses a threat to the cyber security and therefore, pursuant to §12 paragraph 1 of the Act on Cyber Security, issues this warning.

    2) NCISA’s competence to issue this warning is embedded within the provisions of §22, b), of the Act on Cyber Security, which empowers it to issue measures. Pursuant to §11 paragraph 2 of the Act on Cyber Security, these measures also include a warning under §12 of the Act on Cyber Security.

    3) This warning has been issued based on the following findings.

    4) The legal and political environment of the People’s Republic of China (“PRC”) in which the companies primarily operate and whose laws are required to comply with, requires private companies to cooperate in meeting the interests of the PRC, including participation in intelligence activities etc. At the same time, these companies usually do not refrain from such cooperation with the state; in this environment, efforts to protect customers’ interests at the expense of the interests of the PRC are significantly reduced. According to available information, there is an organizational and personal link between these companies and the state. Therefore, this raises concerns that the interests of the PRC may be prioritized over the interests of the users of these companies’ technologies.

    5) The PRC actively promotes its interests in the territory of the Czech Republic, including a conduct of influence and espionage intelligence activities (see, for example, Security Information Service Annual Report for 2017).

    6) The security community’s findings on the activities of these companies in the Czech Republic and around the world, which are available to NCISA, raise reasonable concerns about the existence of potential risks in using the technical or program tools they provide to their customers in order to support the interests of the PRC.

    7) The technical and program tools of the aforementioned companies are being supplied to the information and communication systems that are or may be of strategic importance from the national security standpoint. Disruption of information security, i.e. disruption of the availability, integrity, or confidentiality of information in such information and communication systems can have a significant impact on the security of the Czech Republic and its interests.

    8) These facts, in their entirety, lead to reasonable concerns about possible security risks in the use of these companies’ technologies. The degree of potential risk due to the possible impact of information security breaches on information and communication systems relevant to the state is not negligible.

    9) NCISA points out that the authorities or persons required to implement security measures under the Act on Cyber Security in connection with risk management pursuant to §5 paragraph 1 h) article 3 of the Decree No. 82/2018 Coll. on Security Measures, Cyber Security Incidents, Reactive Measures, Cyber Security and Data Disposal Submission Requirements (Cyber Security Regulation) in risk assessment and risk management plan shall take into account measures pursuant to §11 of the Act on Cyber Security. One of these measures is also a warning pursuant to §12 of the Act on Cyber Security.

    10) NCISA points out that the authorities or persons required to implement security measures under the Act on Cyber Security in connection with risk management pursuant to §4 paragraph 1 c) and paragraph 2 c) of the Decree No. 316/2014 Coll. on Security Measures, Cyber Security Incidents, Reactive Measures, and Cyber Security Submission Requirements (Cyber Security Regulation) shall take into account threats and vulnerabilities. With regard to the transitional provision in §35 of the Decree No. 82/2018 Coll. on Security Measures, Cyber Security Incidents, Reactive Measures, Cyber Security and Data Disposal Submission Requirements (Cyber Security Regulation), these are the administrators and operators of the Critical Information Infrastructure information systems and the administrators and operators of the Critical Information Infrastructure communication systems, in case these systems were designated before May 28, 2018, as well as the administrators and operators of important information systems that met the criteria before May 28, 2018.

    11) NCISA further points out that, pursuant to §4 paragraph 4 of the Act on Cyber Security, the authorities and persons referred to in §3 c) to f) of the Act on Cyber Security are required to take into account requirements arising from security measures during the selection of a supplier for their information or communication system, and include these requirements in a contract concluded with the supplier. Taking into account the requirements arising from security measures under the first sentence to the extent necessary to meet the obligations under the Act on Cyber Security cannot be considered an unlawful restriction of competition or an unjustified obstacle to competition.

     

    Home Security – Removal Of Kaspersky Products in American Institutions

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    DEPARTMENT OF HOMELAND SECURITY

    (U//FOUO) DHS Final Decision on Removal of Kaspersky-Branded Products

    The following assessment was included in court filings made by Kaspersky in their case against the U.S. Government for banning the use of Kaspersky products.

    Financial Decision on Binding Operational Directive 17-01, Removal of Kaspersky-Branded Products

    Page Count: 25 pages

    Date: December 4, 2017

    Restriction: For Official Use Only

    Originating Organization: Department of Homeland Security, Office of Cybersecurity and Communications

    File Type: pdf

    File Size: 504,629 bytes

    File Hash (SHA-256): 6F6A660D2CFCD36CBDFAE3675E6F7C76CEEF404DB26736D44AD196A139592100

    BOD 17-01 requires all federal executive branch departments and agencies to (1) identify the use or presence of “Kaspersky-branded products” on all federal information systems within 30 days of BOD issuance (i.e., by October 13); (2) develop and provide to DHS a detailed plan of action to remove and discontinue present and future use of all Kaspersky-branded products within 60 days of BOD issuance (i.e., by November 12); and (3) begin to implement the plan of action at 90 days after BOD issuance (i.e., December 12), unless directed otherwise by DHS in light of new information obtained by DHS, including but not limited to new information submitted by Kaspersky.

    The Secretary of Homeland Security is authorized to issue BODs, in consultation with the Director of the Office of Management and Budget, for the purpose of safeguarding federal information and information systems from a known or reasonably suspected information security threat, vulnerability, or risk. I recommended issuing the BOD in the Information Memorandum, and the rationale for issuance of the BOD was summarized in your Decision Memorandum. As described further below, your decision to issue BOD 17-01 was based on three interrelated concerns that rested on expert judgments concerning national security: the broad access to files and elevated privileges of anti-virus software, including Kaspersky software; ties between Kaspersky officials and Russian government agencies; and requirements under Russian law that allow Russian intelligence agencies to request or compel assistance from Kaspersky and to intercept communications transiting between Kaspersky operations in Russia and Kaspersky customers, including U.S. government customers. Because of these interrelated concerns, you determined that Kaspersky-branded products present a “known or reasonably suspected information security threat, vulnerability, or risk.” In addition, you found that these risks exist regardless of whether Kaspersky-branded products have ever been exploited for malicious purposes. The BOD is a tool for protecting federal information and information systems from any “known or reasonably suspected information security threat, vulnerability, or risk,” and the Department’s authority to issue it does not depend on whether Kaspersky-branded products have been exploited by the Russian Government or Kaspersky to date.

    BRG evaluated specific Kaspersky products according to the following objectives:

    (1) To evaluate whether it is feasible for an intelligence agency to passively monitor and decrypt traffic between users of Kaspersky-branded products and the Kaspersky Security Network (“KSN”), a cloud-based network that receives and analyzes information about possible threats from installed Kaspersky software;

    (2) To determine whether turning KSN off ― or using the Kaspersky Private Security Network (“KPSN”) ― can reliably prevent potentially sensitive data from being transmitted inadvertently to Kaspersky; and

    (3) To evaluate whether a malicious actor leveraging KSN can conduct targeted searches of Kaspersky users for specific information.

    As explained in the NCCIC Supplemental Assessment, the BRG analysis not only is largely unresponsive to DHS’s security concerns, but also supports DHS’s concerns in certain areas. For example, on objective (1), BRG analyzed only to the security of the connection between the antivirus software and the KSN; BRG did not address the security of communications within the KSN or between KSN and Kaspersky’s non-KSN IT infrastructure, such as Kaspersky offices and datacenters. BRG also evaluated the potential for “passive” interception of communications by intelligence agencies, but DHS is concerned about “active” operations involving access by Russian intelligence to Kaspersky offices and servers in Russia, as discussed in Section III.A.4 below and Part III.E of the Information Memorandum.

    3. Kaspersky Ties to the Russian Government

    In the Information Memorandum, I described certain ties, past and present, between Kaspersky officials and Russian government agencies. Kaspersky concedes key aspects of this account, such as Eugene Kaspersky’s former studies at an institute overseen by the KGB and other state institutions and his service as a software engineer at a Ministry of Defense institute. It also admits that its officials might have “acquaintances, friends, and professional relationships within the [Russian] government,” although Kaspersky states that, “in itself,” does not mean that these connections were or are “inappropriate” or “improper.” Furthermore, Kaspersky does not deny various connections to Russian intelligence described in the Information Memorandum, including that Eugene Kaspersky has saunas with a group that usually includes Russian intelligence officials; that Kaspersky’s Chief Legal Officer Igor Chekunov manages a team of specialists who provide technical support to the FSB and other Russian agencies; that the team can gather identifying information from individual computers; and that this technology has been used to aid the FSB in investigations

    Professor Maggs makes a number of significant conclusions. Specifically, Professor Maggs

    concludes that:

    (a) Russian law requires FSB bodies to carry out their activities in collaboration with various entities in Russia, including private enterprises, and thus including Kaspersky.

    (b) Private enterprises, including Kaspersky, are under a legal obligation to assist FSB bodies in the execution of the duties assigned to FSB bodies, including counterintelligence and intelligence activity.

    (c) Russian law permits FSB service personnel to be seconded to private enterprises, including Kaspersky, with the consent of the head of the enterprise and with the FSB personnel remaining in FSB military service status during the secondment.

    (d) Kaspersky qualifies as an “organizer of the dissemination of information on the Internet” and, as such, is required (1) to store in Russia and provide to authorized state bodies, including the FSB, metadata currently and content as of July 1, 2018; and, based on this or other laws, (2) to install equipment and software that enables the FSB and potentially other state authorities to monitor all data transmissions between Kaspersky’s computers in Russia and Kaspersky customers, including U.S. government customers.

    Exclusive – Homeland Security’s Cyberstrategy 2018 Revealed

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.




    DEPARTMENT OF HOMELAND SECURITY
    Department of Homeland Security Cybersecurity Strategy 2018
    May 20, 2018

    U.S. Department of Homeland Security Cybersecurity Strategy
    Page Count: 35 pages
    Date: May 15, 2018
    Restriction: None
    Originating Organization: Department of Homeland Security
    File Type: pdf
    File Size: 278,548 bytes
    File Hash (SHA-256): 65DED01F461679F5028AFE8C2B0FE08CBFE0EE17BD530F4815D12EF738FB3656

    Download File below

     


    The American people are increasingly dependent upon the Internet for daily conveniences, critical services, and economic prosperity. Substantial growth in Internet access and networked devices has facilitated widespread opportunities and innovation. This extraordinary level of connectivity, however, has also introduced progressively greater cyber risks for the United States. Long-standing threats are evolving as nation-states, terrorists, individual criminals, transnational criminal organizations, and other malicious actors move their activities into the digital world. Enabling the delivery of essential services—such as electricity, finance, transportation, water, and health care—through cyberspace also introduces new vulnerabilities and opens the door to potentially catastrophic consequences from cyber incidents. The growing number of Internet-connected devices and reliance on global supply chains further complicates the national and international risk picture. More than ever, cybersecurity is a matter of homeland security and one of the core missions of the U.S. Department of Homeland Security (DHS).

    At DHS, we believe that cyberspace can be secure and resilient. We work every day across the Department and with key partners and stakeholders to identify and manage national cybersecurity risks. We do this by adopting a holistic risk management approach. Like every organization, no matter how big or small, we must minimize our organizational vulnerability to malicious cyber activity by protecting our own networks. DHS also has broader responsibilities to protect the larger federal enterprise and improve the security and resilience of other critical systems. At the same time, we seek to reduce cyber threats by preventing and disrupting cyber crimes, and to lessen the consequences of cyber incidents by ensuring an effective federal response when appropriate. Finally, we work to create conditions for more effective cyber risk management through efforts to make the cyber ecosystem more fundamentally secure and resilient. This strategy sets forth our goals, objectives, and priorities to successfully execute the full range of the Secretary of Homeland Security’s cybersecurity responsibilities.

    During the last several decades, advances in technology have fundamentally changed the world. Substantial growth in Internet access, use of Internet-enabled devices, and the availability of high speed information technology systems and large datasets have facilitated productivity, efficiencies, and capabilities across all major industries. The proliferation of technology also presents new cybersecurity challenges and leads to significant national risks. More than 20 billion devices are expected to be connected to the Internet by 2020. The risks introduced by the growing number and variety of such devices are substantial.

    The United States faces threats from a growing set of sophisticated malicious actors who seek to exploit cyberspace. Motivations include espionage, political and ideological interests, and financial gain. Nation-states continue to present a considerable cyber threat. But non-state actors are emerging with capabilities that match those of sophisticated nation-states. Criminal actors are increasingly empowered by modern information and communications technologies that enable them to grow in sophistication and transnational reach. Transnational criminal organizations also increasingly collaborate through cyberspace. Complicating the threat picture, nation-states are increasingly using proxies and other techniques that blur the distinction between state and non-state cyber activities. In a number of cases, malicious actors engaged in significant criminal cyber activity appear to have both criminal and nation-state affiliations.

    These diverse threats can impact federal and nonfederal information systems. Attempted incursions into government networks occur on a daily basis; the number of cyber incidents on federal systems reported to DHS increased more than ten-fold between 2006 and 2015. In 2015, a high-profile intrusion into a single federal agency resulted in the compromise of personnel records of over 4 million federal employees and ultimately affected nearly 22 million people. The growing interconnection of cyber and physical systems within critical infrastructure also creates the potential risk for malicious cyber activity to result in direct physical consequences; for example, the December 2015 overriding of controls in the Ukrainian electric grid resulted in widespread loss of power. Ransomware incidents such as WannaCry and NotPetya demonstrate how the rapid growth of the internet-of-things further complicates the threat as everyday devices can be targeted by malicious cyber actors with potentially far-reaching consequences.

    Guiding Principles

    DHS advances our mission and will accomplish our cybersecurity goals by aligning departmental activities according to the following guiding principles:

    1. Risk prioritization. The foremost responsibility of DHS is to safeguard the American people and we must prioritize our efforts to focus on systemic risks and the greatest cybersecurity threats and vulnerabilities faced by the American people and our homeland.
    2. Cost-effectiveness. Cyberspace is highly complex and DHS efforts to increase cybersecurity must be continuously evaluated and reprioritized to ensure the best results for investments made.
    3. Innovation and agility. Cyberspace is an evolving domain with emergent risks. Although the proliferation of technology leads to new risks, it also provides an opportunity for innovation. DHS must lead by example in researching, developing, adapting, and employing cutting-edge cybersecurity capabilities and remain agile in its efforts to keep up with evolving threats and technologies.
    4. Collaboration. The growth and development of the Internet has been primarily driven by the private sector and the security of cyberspace is an inherently cross-cutting challenge. To accomplish our cybersecurity goals, we must work in a collaborative manner across our Components and with other federal and nonfederal partners.
    5. Global approach. Robust international engagement and collaboration is required to accomplish our national cybersecurity goals. DHS must engage internationally to manage global cyber risks, respond to worldwide incidents, and disrupt growing transnational cyber threats as well as encourage other nations and foreign entities to adopt the policies necessary to create an open, interoperable, secure, and reliable Internet.
    6. Balanced equities. Cyberspace empowers people and enables prosperity worldwide. Cybersecurity is not an end unto itself, and efforts to mitigate cybersecurity risks must also support international commerce, strengthen international security, and foster free expression and innovation.
    7. National values. DHS must uphold privacy, civil rights, and civil liberties in accordance with applicable law and policy. The Department empowers our cybersecurity programs to succeed by integrating privacy protections from the outset and employing a layered approach to privacy and civil liberties oversight.

    Joint Chief – Cyberspace Operations Revealed

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Cyberspace operations (CO) is the employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace.

    This publication focuses on military operations in and through cyberspace; explains the relationships and responsibilities of the Joint Staff (JS), combatant commands (CCMDs), United States Cyber Command (USCYBERCOM), the Service cyberspace component (SCC) commands, and combat support agencies; and establishes a framework for the employment of cyberspace forces and capabilities.

    The Nature of Cyberspace Relationship with the Physical Domains.

    Cyberspace, while part of the information environment, is dependent on the physical domains of air, land, maritime, and space.

    CO use links and nodes located in the physical domains and perform logical functions to create effects first in cyberspace and then, as needed, in the physical domains. Actions in cyberspace, through carefully controlled cascading effects, can enable freedom of action for activities in the physical domains.

    Cyberspace Layer Model. To assist in the planning and execution of CO, cyberspace can be described in terms of three interrelated layers: physical network, logical network, and cyberpersona. Department of Defense (DOD) Cyberspace. The Department of Defense information network (DODIN) is the set of information capabilities and associated processes for collecting, processing, storing, disseminating, and managing information on-demand to warfighters, policy makers, and support personnel, whether interconnected or stand-alone, including owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and national security systems.

    Connectivity and Access. Gaining access to operationally useful areas of cyberspace, including targets within them, is affected by legal, policy, or operational limitations. For all of these reasons, access is not guaranteed. Additionally, achieving a commander’s objectives can be significantly complicated by specific elements of cyberspace being used by enemies, adversaries, allies, neutral parties, and other United States Government (USG) departments and agencies, all at the same time.

    The operational environment (OE) is a composite of the conditions, circumstances, and influences that affect the employment of capabilities and impact the decisions of the commander assigned responsibility for it. The information environment permeates the physical domains and therefore exists in any OE. The information environment is the aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information.

    Given that cyberspace is wholly contained within the information environment and the chief purpose of information operations (IO) is to create effects in the information environment, there is significant interdependency between IO and CO.

    Integrating Cyberspace Operations with Other Operations

    During joint planning, cyberspace capabilities are integrated into the joint force commander’s (JFC’s) plans and synchronized with other operations across the range of military operations. While not the norm, some military objectives can be achieved by CO alone. Commanders conduct CO to obtain or retain freedom of maneuver in cyberspace, accomplish JFC objectives, deny freedom of action to the threat, and enable other operational activities.

    Cyberspace Operations Forces

    Commander, United States Cyber Command (CDRUSCYBERCOM), commands a preponderance of the cyberspace forces that are not retained by the Services. USCYBERCOM accomplishes its missions within three primary lines of operation: secure, operate, and defend the DODIN; defend the nation from attack in cyberspace; and provide cyberspace support as required to combatant commanders (CCDRs). The Services man, train, and equip cyberspace units and provide them to USCYBERCOM through the SCCs.

    Challenges to the Joint Force’s Use of Cyberspace

    Threats. Cyberspace presents the JFC’s operations with many threats, from nation-states to individual actors to accidents and natural hazards. Anonymity and Difficulties with Attribution. To initiate an appropriate defensive response, attribution of threats in cyberspace is crucial for any actions external to the defended cyberspace beyond authorized self-defense.

    Geography Challenges. In cyberspace, there is no stateless maneuver space. Therefore, when US military forces maneuver in foreign cyberspace, mission and policy requirements may require they maneuver clandestinely without the knowledge of the state where the infrastructure is located.

    Technology Challenges. Using a cyberspace capability that relies on exploitation of technical vulnerabilities in the target may reveal its functionality and compromise the capability’s effectiveness for future missions.

    Private Industry and Public Infrastructure. Many of DOD’s critical functions and operations rely on contracted commercial assets, including Internet service providers (ISPs) and global supply chains, over which DOD and its forces have no direct authority.

    Globalization. The combination of DOD’s global operations with its reliance on cyberspace and associated technologies means DOD often procures mission-essential information technology products and services from foreign vendors.

    Mitigations. DOD partners with the defense industrial base (DIB) to increase the security of information about DOD programs residing on or transiting DIB unclassified networks.

    Cyber Hackers Attack U.S. State And Local Authorities

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

     

    Bildergebnis für cyber attack

     

    An unidentified cyber actor in mid-March 2018 used GrandCrab Version 2 ransomware to attack a State of Connecticut municipality network and a state judicial branch network, according to DHS reporting derived from a state law enforcement official with direct and indirect access. The municipality did not pay the ransom, resulting in the encryption of multiple servers that affected some data backups and the loss of tax payment information and assessor data. The attack against the state judicial branch resulted in the infection of numerous computers, but minimal content encryption, according to the same DHS report.

    (U//FOUO) The unidentified cyber actor introduced the ransomware used against the judicial branch network through a vendor server/host; the ransomware then harvested cached credentials of high-level privileged accounts, according to the same DHS report. The actor then used the credentials to access two servers on the network and propagate the malware via server message block (SMB). Connecticut state cybersecurity officials were able to block the ransomware’s communication with external infrastructure, which prevented the encryption of additional hosts and data loss, according to the same DHS report.

    (U) GandCrab Malware

    (U) Released in late January 2018, GandCrab, also called “GrandCrab,” is a ransomware variant distributed by exploit kits that requires communication with the ransomware’s command-and-control (C2) server to encrypt files of an infected computer, according to an online technical support site. The developers of GandCrab recently upgraded the original version after Romanian police and BitDefender mitigated infections by recovering its decryption keys, according to a separate article from the same online technical support site. As of 6 March 2018, no free decryption key is available to victims of GandCrab version 2. GandCrab uses NameCoin’s .BIT as its top-level domain (TLD); therefore, variants of the ransomware using the .BIT TLD must also use a domain name server that supports .BIT, according to the same online technical support site. Upon infection, GandCrab will attempt to query the ransomware’s C2 servers on the .BIT domain to establish communication. GandCrab will not encrypt a host’s content with the .CRAB extension if communication is not established with the C2 server, according to the same online technical support site.

    Director Of U.S. Intelligence Reveals Cyber Threat Frame

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.



    Goals for a Common Approach to Threat Frameworks

    Following a common approach helps to:

    • Establish a shared ontology and enhance information-sharing since it is easier to maintain mapping of multiple models to a common reference than directly to each other

    • Characterize and categorize threat activity in a straightforward way that can support missions ranging from strategic decision-making to analysis and cybersecurity measures and users from generalists to technical experts

    • Support common situational awareness across organizations

    Key Attributes and Goals in Building a Cyber Threat Framework

    • Incorporate a hierarchical/layered perspective that allows a focus on a level detail appropriate to the audience while maintaining linkage and traceability of data

    • Employ Structured and documented categories with explicitly defined terms and labels (lexicon)

    • Focus on empirical/sensor-derived ‘objective’ data

    • Accommodate a wide variety of data sources, threat actors and activity

    • Provide as a foundation for analysis and decision-making

    The Common Cyber Threat Framework

    • Since 2012, the Office of the DNI has worked with interagency partners to build and refine The Common Cyber Threat Framework reflecting these key attributes and goals

    • The Common Cyber Threat Framework is not intended to displace or replace an organization’s existing model which is tailored to its specific mission and requirements; rather, it is intended to:

    Serve as a viable Universal Translator (a cyber Esperanto or Rosetta Stone) facilitating efficient and possibly automated exchange of data and insight across models once each has been mapped to it and the mappings shared

    Provide a Starting Point featuring a simple threat model and value-neutral concepts. It can be customized for any organization as needed—and any deviations from the common approach are readily apparent, facilitating mapping and data exchange.

     

     

    Chinese Cyber Hackers Launch Malicious Bot

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    In March 2018, an identified financial services corporation received a thumb drive infected with the bank credential-stealing Qakbot malware variant, targeting information from networked computers and financial institution web sites. The financial services corporation purchased bulk thumb drives from a US online retailer of computer hardware. The thumb drives were originally manufactured in China. According to FBI forensic analysis, the Qakbot malware was on the infected thumb drive before the drive arrived in the United States. Qakbot is extremely persistent and requires removal of all malware from every device. Failure to remove even one node of malware may result in re-infecting previously sanitized systems possibly costing the victim hundreds of thousands of dollars in malware removal and system downtime.

    Threat

    Qakbot is an information stealing worm—originally discovered in 2007 with a major update in 2017—that propagates through removable drives, network shares, and Web pages. The most common vector of intrusion for Qakbot is malicious attachments to phishing emails. Once executed, Qakbot spreads to other shared folders and uses Server Message Block (SMB) protocol to infect other machines. Qakbot has keylogging capabilities, and is able to propagate across network environments through a single instance within that network. It is capable of remaining on a device through the use of registry keys and by scheduling recurring tasks to run at timed intervals. Every device connected to the network and every piece of removable media which has been attached needs to be scanned for the malware and cleaned of the infection before it can be reconnected. The most recent updates in 2017 allows Qakbot to lock users out of the active directory, preventing them from being able to work. It also deploys malicious executables into network shares, registering them as services.

    Cyber actors have the capability to infect devices with malware at nearly any point in the manufacturing process. The FBI has historically seen cases of infection with malware capable of stealing credentials, gathering data on the users of a computer or network, dropping other types of malware, and serving as a “backdoor” into a secure network. It is difficult to know at which point the malware infection occurred or whether the infection was intentional, due to the international nature of hardware manufacturing.

    Recommendations

    To mitigate the threat of a potentially infected thumb drive, the following measures should be taken at a minimum:

    Ensure the use of approved, trusted vendors for hardware purchases.

    Scan all hardware, especially removable storage media, on an external system prior to its insertion into a network environment.

    For signature-based intrusion detection systems, ensure that the hash value for known Qakbot variants are included. The MD5 value for the variant identified in this PIN was: ff0e3ec80faafd04c9a8b375be77c6b6. This hash value can change, so be prepared to use other advanced detection systems.

    Users should protect themselves and organizations by practicing good browsing habits, ensuring they do not respond to or click on unsolicited email, and to not plug unknown USB devices into
    their workstations.

    If you don’t have the expertise to properly handle or identify potential cyber threats please seek out an expert who can provide the expertise needed to secure your organization.

     

    Director of US National Intelligence about Cyberthreats

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    A Common Cyber Threat Framework: A Foundation for Communication

    Page Count: 11 pages
    Date: July 18, 2018
    Restriction: None
    Originating Organization: Office of the Director of National Intelligence
    File Type: pdf
    File Size: 508,077 bytes
    File Hash (SHA-256):E8C62419D5DA3ED97F1429864F6D0A39708D23913F5D09303097A435ACC8DBAA

    Download File

    Goals for a Common Approach to Threat Frameworks

    Following a common approach helps to:

    • Establish a shared ontology and enhance information-sharing since it is easier to maintain mapping of multiple models to a common reference than directly to each other

    • Characterize and categorize threat activity in a straightforward way that can support missions ranging from strategic decision-making to analysis and cybersecurity measures and users from generalists to technical experts

    • Support common situational awareness across organizations

    Key Attributes and Goals in Building a Cyber Threat Framework

    • Incorporate a hierarchical/layered perspective that allows a focus on a level detail appropriate to the audience while maintaining linkage and traceability of data

    • Employ Structured and documented categories with explicitly defined terms and labels (lexicon)

    • Focus on empirical/sensor-derived ‘objective’ data

    • Accommodate a wide variety of data sources, threat actors and activity

    • Provide as a foundation for analysis and decision-making

    The Common Cyber Threat Framework

    • Since 2012, the Office of the DNI has worked with interagency partners to build and refine The Common Cyber Threat Framework reflecting these key attributes and goals

    • The Common Cyber Threat Framework is not intended to displace or replace an organization’s existing model which is tailored to its specific mission and requirements; rather, it is intended to:

    Serve as a viable Universal Translator (a cyber Esperanto or Rosetta Stone) facilitating efficient and possibly automated exchange of data and insight across models once each has been mapped to it and the mappings shared

    Provide a Starting Point featuring a simple threat model and value-neutral concepts. It can be customized for any organization as needed—and any deviations from the common approach are readily apparent, facilitating mapping and data exchange.

     

    Unknown Cyber Criminals attack US State and Government Sites

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Unidentified Cyber Actor Attacks State and Local Government Networks with GrandCrab Ransomware

    Page Count: 3 pages
    Date: June 4, 2018
    Restriction: For Official Use Only
    Originating Organization: Department of Homeland Security, Office of Intelligence and Analysis
    File Type: pdf
    File Size: 272,001 bytes
    File Hash (SHA-256):33D7903C899000F32FEF462130E8D9081F204EE41EB620B813A2E654F54415E5

    Download File

    (U//FOUO) An unidentified cyber actor in mid-March 2018 used GrandCrab Version 2 ransomware to attack a State of Connecticut municipality network and a state judicial branch network, according to DHS reporting derived from a state law enforcement official with direct and indirect access. The municipality did not pay the ransom, resulting in the encryption of multiple servers that affected some data backups and the loss of tax payment information and assessor data. The attack against the state judicial branch resulted in the infection of numerous computers, but minimal content encryption, according to the same DHS report.

    (U//FOUO) The unidentified cyber actor introduced the ransomware used against the judicial branch network through a vendor server/host; the ransomware then harvested cached credentials of high-level privileged accounts, according to the same DHS report. The actor then used the credentials to access two servers on the network and propagate the malware via server message block (SMB). Connecticut state cybersecurity officials were able to block the ransomware’s communication with external infrastructure, which prevented the encryption of additional hosts and data loss, according to the same DHS report.

    (U) GandCrab Malware

    (U) Released in late January 2018, GandCrab, also called “GrandCrab,” is a ransomware variant distributed by exploit kits that requires communication with the ransomware’s command-and-control (C2) server to encrypt files of an infected computer, according to an online technical support site. The developers of GandCrab recently upgraded the original version after Romanian police and BitDefender mitigated infections by recovering its decryption keys, according to a separate article from the same online technical support site. As of 6 March 2018, no free decryption key is available to victims of GandCrab version 2. GandCrab uses NameCoin’s .BIT as its top-level domain (TLD); therefore, variants of the ransomware using the .BIT TLD must also use a domain name server that supports .BIT, according to the same online technical support site. Upon infection, GandCrab will attempt to query the ransomware’s C2 servers on the .BIT domain to establish communication. GandCrab will not encrypt a host’s content with the .CRAB extension if communication is not established with the C2 server, according to the same online technical support site.

    U.S. Department of Homeland Security Cybersecurity Strategy

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Page Count: 35 pages
    Date: May 15, 2018
    Restriction: None
    Originating Organization: Department of Homeland Security
    File Type: pdf
    File Size: 278,548 bytes
    File Hash (SHA-256):65DED01F461679F5028AFE8C2B0FE08CBFE0EE17BD530F4815D12EF738FB3656

    Download File

    The American people are increasingly dependent upon the Internet for daily conveniences, critical services, and economic prosperity. Substantial growth in Internet access and networked devices has facilitated widespread opportunities and innovation. This extraordinary level of connectivity, however, has also introduced progressively greater cyber risks for the United States. Long-standing threats are evolving as nation-states, terrorists, individual criminals, transnational criminal organizations, and other malicious actors move their activities into the digital world. Enabling the delivery of essential services—such as electricity, finance, transportation, water, and health care—through cyberspace also introduces new vulnerabilities and opens the door to potentially catastrophic consequences from cyber incidents. The growing number of Internet-connected devices and reliance on global supply chains further complicates the national and international risk picture. More than ever, cybersecurity is a matter of homeland security and one of the core missions of the U.S. Department of Homeland Security (DHS).

    At DHS, we believe that cyberspace can be secure and resilient. We work every day across the Department and with key partners and stakeholders to identify and manage national cybersecurity risks. We do this by adopting a holistic risk management approach. Like every organization, no matter how big or small, we must minimize our organizational vulnerability to malicious cyber activity by protecting our own networks. DHS also has broader responsibilities to protect the larger federal enterprise and improve the security and resilience of other critical systems. At the same time, we seek to reduce cyber threats by preventing and disrupting cyber crimes, and to lessen the consequences of cyber incidents by ensuring an effective federal response when appropriate. Finally, we work to create conditions for more effective cyber risk management through efforts to make the cyber ecosystem more fundamentally secure and resilient. This strategy sets forth our goals, objectives, and priorities to successfully execute the full range of the Secretary of Homeland Security’s cybersecurity responsibilities.

    During the last several decades, advances in technology have fundamentally changed the world. Substantial growth in Internet access, use of Internet-enabled devices, and the availability of high speed information technology systems and large datasets have facilitated productivity, efficiencies, and capabilities across all major industries. The proliferation of technology also presents new cybersecurity challenges and leads to significant national risks. More than 20 billion devices are expected to be connected to the Internet by 2020. The risks introduced by the growing number and variety of such devices are substantial.

    The United States faces threats from a growing set of sophisticated malicious actors who seek to exploit cyberspace. Motivations include espionage, political and ideological interests, and financial gain. Nation-states continue to present a considerable cyber threat. But non-state actors are emerging with capabilities that match those of sophisticated nation-states. Criminal actors are increasingly empowered by modern information and communications technologies that enable them to grow in sophistication and transnational reach. Transnational criminal organizations also increasingly collaborate through cyberspace. Complicating the threat picture, nation-states are increasingly using proxies and other techniques that blur the distinction between state and non-state cyber activities. In a number of cases, malicious actors engaged in significant criminal cyber activity appear to have both criminal and nation-state affiliations.

    These diverse threats can impact federal and nonfederal information systems. Attempted incursions into government networks occur on a daily basis; the number of cyber incidents on federal systems reported to DHS increased more than ten-fold between 2006 and 2015. In 2015, a high-profile intrusion into a single federal agency resulted in the compromise of personnel records of over 4 million federal employees and ultimately affected nearly 22 million people. The growing interconnection of cyber and physical systems within critical infrastructure also creates the potential risk for malicious cyber activity to result in direct physical consequences; for example, the December 2015 overriding of controls in the Ukrainian electric grid resulted in widespread loss of power. Ransomware incidents such as WannaCry and NotPetya demonstrate how the rapid growth of the internet-of-things further complicates the threat as everyday devices can be targeted by malicious cyber actors with potentially far-reaching consequences.

    Guiding Principles

    DHS advances our mission and will accomplish our cybersecurity goals by aligning departmental activities according to the following guiding principles:

    1. Risk prioritization. The foremost responsibility of DHS is to safeguard the American people and we must prioritize our efforts to focus on systemic risks and the greatest cybersecurity threats and vulnerabilities faced by the American people and our homeland.

    2. Cost-effectiveness. Cyberspace is highly complex and DHS efforts to increase cybersecurity must be continuously evaluated and reprioritized to ensure the best results for investments made.

    3. Innovation and agility. Cyberspace is an evolving domain with emergent risks. Although the proliferation of technology leads to new risks, it also provides an opportunity for innovation. DHS must lead by example in researching, developing, adapting, and employing cutting-edge cybersecurity capabilities and remain agile in its efforts to keep up with evolving threats and technologies.

    4. Collaboration. The growth and development of the Internet has been primarily driven by the private sector and the security of cyberspace is an inherently cross-cutting challenge. To accomplish our cybersecurity goals, we must work in a collaborative manner across our Components and with other federal and nonfederal partners.

    5. Global approach. Robust international engagement and collaboration is required to accomplish our national cybersecurity goals. DHS must engage internationally to manage global cyber risks, respond to worldwide incidents, and disrupt growing transnational cyber threats as well as encourage other nations and foreign entities to adopt the policies necessary to create an open, interoperable, secure, and reliable Internet.

    6. Balanced equities. Cyberspace empowers people and enables prosperity worldwide. Cybersecurity is not an end unto itself, and efforts to mitigate cybersecurity risks must also support international commerce, strengthen international security, and foster free expression and innovation.

    7. National values. DHS must uphold privacy, civil rights, and civil liberties in accordance with applicable law and policy. The Department empowers our cybersecurity programs to succeed by integrating privacy protections from the outset and employing a layered approach to privacy and civil liberties oversight.

    Anderson Cooper about the notorious Russian Agents and their US Election Involvement

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Kellyanne Conway and CNN’s Anderson Cooper clashed in an interview over CNN’s reporting of the classified documents presented to President Obama and President-elect Trump including allegations that Russian operatives claim to have compromising personal and financial information about Trump.

    Russian Agents Of Shield,Russian Agents Killed,Russian Agents In The Us,Russian Agents Dying,Russian Agents Voted For Trump,Russian Agents Behind Yahoo,Russian Agents Of Influence,Russian Agents Indicted,Russian Agents Trump,Russian Agents Yahoo Hack,Russian Agents Arrested,Russian Agents Are Behind Yahoo Breach,Russian Agents In America,Russian Travel Agents Association,Russian Sleeper Agents In America,Russian Kgb Agents In America,Russian Travel Agents In Australia,Russian Visa Agents In Australia,Russian Agents Behind Yahoo,Russian Agents Behind,Russian Basketball Agents,Russian Agents Killed By Isis,Russian Agents Executed By Isis,Russian Agents Killed By Is,Russian Agents Killed By Child,Russian Agents In Britain,Russian Visa Agents In Bangalore,Russian Fsb Agents Killed By Isis,Russian Chemical Agents,Russian Sleeper Agents Cold War,Russian Estate Agents Cyprus,Russian Sleeper Agents Caught,Russian Property Agents Cyprus,Russian Real Estate Agents Chicago,Russian Agents Killed By Child,Russian Visa Agents In Chennai,Child Russian Agents,Russian Agents Dying,Russian Agents Dead,Russian Double Agents,Russian Double Agents In The Cold War,Russian Double Agents Executed,Russian Visa Agents Delhi,Russian Travel Agents Directory,Russian Real Estate Agents Dubai,Russian Visa Agents In Dubai,Russian Travel Agents In Dubai,Russian Agents Executed,Russian Agents Executed By Isis,Russian Estate Agents,Russian Estate Agents London,Russian Estate Agents In Cyprus,Russian Estate Agents In Spain,Russian Education Agents,Russian Estate Agents In Paphos,Russian Estate Agents In Limassol,Russian Estate Agents Tenerife,Russian Foreign Agents Law,Russian Football Agents,Russian Fsb Agents,Russian Free Agents,Russian Free Agents Hockey,Russian Fifa Agents,Russian Fsb Agents Killed By Isis,Russian Fsb Agents Executed,Russian Free Agents Nhl,Russian Federal Agents,Russian Gru Agents,Russian Real Estate Agents Greece,Russian Hockey Agents,Russian Hunting Agents,Russian Free Agents Hockey,Russian Holiday Agents,Russian Agents In The Us,Russian Agents Indicted,Russian Agents In America,Russian Agents In The White House,Russian Agents In Uk,Russian Agents Isis,Russian Agents In Ukraine,Russian Agents In Europe,Russian Agents In Syria,Russian Agents In Romania,Russian Agents Killed,Russian Agents Killed By Isis,Russian Agents Killed By Child,Russian Kgb Agents In America,Russian Kgb Agents,Russian Fsb Agents Killed By Isis,Famous Russian Kgb Agents,Russian Visa Agents In Kolkata,Russian Sleeper Agents Movie,Russian Estate Agents Marbella,Russian Travel Agents Melbourne,Russian Real Estate Agents Miami,Russian Visa Agents In Mumbai,Russian Nerve Agents,Russian Free Agents Nhl,Russian Real Estate Agents New York,Russian Agents Of Shield,Russian Agents Of Influence,Russian Travel Agents Outbound,Russian Property Agents,Russian Property Agents London,Russian Property Agents Cyprus,Russian Port Agents,Russian Patent Agents,Russian Agents In Poland,Russian Visa Agents In Pakistan,Russian Estate Agents In Paphos,Russian Estate Agents Selling Property In Spain,Russian Agents In Romania,Russian Sleeper Agents Real,Russian Inteligence Agents Face Risk Of Disclosure,Russian Agents Shot,Russian Agents Series,Russian Sleeper Agents,Russian Sleeper Agents 2010,Russian Sleeper Agents 2014,Russian Secret Agents,Russian Sleeper Agents Tv Series,Russian Secret Agents Arrested In Us,Russian Sleeper Agents 1980s,Russian Special Agents,Russian Agents Trump,Russian Travel Agents,Russian Travel Agents List,Russian Travel Agents Association,Russian Travel Agents Uk,Russian Travel Agents In Dubai,Russian Tour Agents,Russian Travel Agents In Australia,Russian Travel Agents Melbourne,Russian Travel Agents In San Francisco,Russian Undercover Agents,Russian Agents In Us,Russian Agents In Uk,Russian Agents In Ukraine,Russian Travel Agents Uk,Russian Estate Agents In Uk,Russian Agents Voted For Trump,Russian Visa Agents In Delhi,Russian Visa Agents In Mumbai,Russian Visa Agents In Pakistan,Russian Visa Agents In Chennai,Russian Visa Agents In Dubai,Russian Visa Agents,Russian Visa Agents In Islamabad,Russian Visa Agents In India,Russian Visa Agents In Lahore,Russian Agents Were Behind Yahoo Hack,Russian Sleeper Agents Wiki,Russian Sleeper Agents Cold War,Russian Agents Yahoo Hack,Russian Agents Yahoo,Russian Agents Yahoo Breach,

    Video – Trend Micro about Putins Cyber Espionage Troops Pawn Storm

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

     

    Cyber Espionage Definition, Cyber Espionage Cases, Cyber Espionage China, Cyber Espionage Prevention, Cyber Espionage Russia, Cyber Espionage Pdf, Cyber Espionage The Chinese Threat, Cyber Espionage History, Cyber Espionage International Law, Cyber Espionage Cases 2016, Cyber Espionage Act, Cyber Espionage Articles, Cyber Espionage Attacks, Cyber Espionage Adalah, Cyber Espionage And International Law, Cyber Espionage Australia, Cyber Espionage And Cyber Warfare, Cyber Espionage Attack Methods, Cyber Espionage Books, Cyber Espionage Beyond The Rule Of Law, Cyber Espionage Business, Cyber Espionage By China, Cyber Espionage Brazil, Cyber Espionage By Chinese Actors, Cyber Espionage Blog, Cyber Espionage By Country, Bagaimana Cyber Espionage Dapat Muncul, Best Cyber Espionage Books, Cyber Espionage Cases, Cyber Espionage China, Cyber Espionage Cases 2016, Cyber Espionage Case Study, Cyber Espionage Cases 2017, Cyber Espionage Cases In India, Cyber Espionage Campaign, Cyber Espionage China Us, Cyber Espionage Cost, Cyber Espionage Canada, Cyber Espionage Definition, Cyber Espionage Documentary, Cyber Espionage Def, Cyber Espionage Definition Pdf, Economic Cyber Espionage Definition, Bagaimana Cyber Espionage Dapat Muncul, Why Is Cyber Espionage Difficult To Prevent, Contoh Kasus Cyber Espionage Di Indonesia, How Is Cyber Espionage Done, Dragonfly Cyber Espionage, Cyber Espionage Examples, Cyber Espionage Edward Snowden, Cyber Espionage Effects, Cyber Espionage Essay, Cyber Economic Espionage, Cyber Economic Espionage Accountability Act, Cyber Espionage In Middle East, Economic Cyber Espionage And International Law, Economic Cyber Espionage Definition, Explain Cyber Espionage, Cyber Espionage Facts, Cyber Espionage Fiction, Cyber Espionage First Case, Cyber Espionage F 35, Cyber Espionage Law Firms, Fbi Cyber Espionage, France Cyber Espionage, A Theory Of Cyber Espionage For The Intelligence Community, French Cyber Espionage, Flame Cyber Espionage, Cyber Espionage Groups, Cyber Espionage Germany, Cyber Espionage Georgia, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber-espionage A Growing Threat To The American Economy, Cyber Espionage Against Georgia, Cyber Espionage Against Georgian Government, What Are Cyber Espionage Groups Stealing From The United States, Cyber Espionage To Splinter Internet Governance, Global Cyber Espionage, Cyber Espionage History, Huawei Cyber Espionage, Hellsing Cyber Espionage, Cyber Espionage International Law, Cyber Espionage Incidents, Cyber Espionage India, Cyber Espionage Is Alive And Well, South African Cyber Espionage, Cyber Espionage In China, Cyber Espionage In Middle East, Cyber Espionage Iran, Cyber Espionage In Canada, Cyber Espionage Impact, Cyber Espionage Jobs, Cyber Espionage Japan, Cyber Espionage Kenya, Kaspersky Cyber Espionage, Kasus Cyber Espionage, Kasus Cyber Espionage Di Indonesia, Kejahatan Cyber Espionage, Karakteristik Cyber Espionage, Cyber Espionage Law, Cyber Espionage Law Firms, Cyber Espionage International Law, Cyber Espionage Definition Law, Cyber Espionage Is Reaching Crisis Levels, Pengertian Dari Cyber Espionage Lengkap, Le Cyber Espionnage Definition, Cyber Espionage Meaning, Cyber Espionage Movies, Cyber Espionage Methods, Cyber-espionage Nightmare – Mit Technology Review, Cyber Espionage Attack Methods, Cyber Espionage In Middle East, Chinese Cyber Espionage Mandiant, Chinese Cyber Espionage Map, Bagaimana Cyber Espionage Dapat Muncul, Military Cyber Espionage, Cyber Espionage News, Cyber Espionage North Korea, Cyber-espionage Nightmare, Cyber Espionage National Security, Cyber Espionage Novels, Cyber Espionage Nato, Ghostnet Cyber Espionage Network, Nsa Cyber Espionage, Nortel Cyber Espionage, Cyber Espionage Operations, Cyber Espionage Red October, Cyber Espionage And Cyber Espionage, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber Espionage Prevention, Cyber Espionage Pdf, Cyber Espionage Ppt, Cyber Espionage Pronunciation, Cyber Espionage Presentation, Cyber Espionage Pictures, Cyber Espionage Problems, Cyber Espionage Purpose, Cyber Espionage Ppt Slideshare, Cyber Espionage Research Paper, Cyber Espionage Quotes, Cyber Espionage Research Questions, Cyber Espionage Russia, Cyber Espionage Research Paper, Cyber Espionage Rule Of Law, Cyber Espionage Report, Cyber Espionage Red October, Cyber Espionage Research Questions, Cyber Espionage Ring, Cyber Espionage Is Reaching Crisis Levels, Cyber Espionage Techrepublic, Russian Cyber Espionage, Cyber Espionage Statistics, Cyber Espionage Synonym, Cyber Espionage Simulator, Cyber Espionage Security Issues, Cyber Espionage Statistics 2015, Cybersecurity Espionage, Espionage In Cyberspace, Cyber Espionage Case Study, Cyber Espionage To Splinter Internet Governance, South African Cyber Espionage, Cyber Espionage The Chinese Threat, Cyber Espionage Threat, Cyber Espionage Tools, Cyber Espionage Trends, Cyber Espionage The Chinese Threat Case Study, Cyber Espionage To Splinter Internet Governance, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber Espionage Thesis, Cyber Espionage Training, Cyber Espionage Tactics, Cyber Espionage Uk, Us Cyber Espionage, Cyber Espionage Un, Cyber Espionage Us China, China’s Cyber Espionage Units, Russian Cyber Espionage Under The Microscope, China Cyber Espionage And U.s. National Security, Pla Cyber Espionage Unit, Cyber Espionage Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cyber Espionage Vs Cyber Attack, Cyber Espionage Virus, Cyber Espionage Wiki, Cyber Espionage & Warfare, Cyber Weapons Espionage, Cyber Espionage Vs Cyber Warfare, Cyber Espionage And Cyber Warfare Definition, Cyber Espionage Youtube

    Heinz Gerlachs “Erben” – GoMoPa, Medard Fuchsgruber und mutmasslich Rainer von Holst & Thomas Bremer – Cui bono ?

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Es hat lange gedauert, aber nun ist das Rätsel wohl gelöst: Wer profitiert von Gerlachs Tod ?

    • GoMoPa konnte die eigene Position massiv ausbauen
    • Medard Fuchsgruber übernahm die DFI-Seite
    • Rainer von Holst, Doreen Trampe (Ex-GoMoPa) und Pierre Gersöne stecken mutmasslich hinter der anonymen Webseite gerlachreport.com
    • Thomas Bremer mit seinem Blog-Netzwerk im “Tal der Ahnungslosen” (DDR-Witz) zu Leipzig

    In Kürze mehr…

     

    Heinz Gerlach, Heinz Gerlach Halle, Heinz Gerlach Akkordeon, Heinz Gerlach Aschaffenburg, Heinz Gerlach Bad Arolsen, Heinz Gerlach Medien Ag, Heinz Gerlach Durchbruch Bei Stalingrad, Dekan Heinz Gerlach, Heinz-dieter Gerlach, Heinz Gerlach Tanzende Finger, Heinz Gerlach Frankfurt, Heinz Gerlach Flachsmeer, Ferienwohnung Heinz Gerlach Zingst, Heinz Gerlach Halle, Karl Heinz Gerlach, Heinz Gerlach Komponist, Karl Heinz Gerlach Biebertal, Heinz Gerlach Halle Karneval, Karl-heinz Gerlach Langenhagen, Karl Heinz Gerlach Herzberg, Heinz Gerlach Licht & Sound, Karl-heinz Gerlach Langenhagen, Heinz Gerlach Niederstotzingen, Tanzende Finger Gerlach Heinz Noten, Heinz Gerlach Obernau, Heinz Gerlach Offenbach, Heinz Gerlach Pfarrer, Heinz Gerlach Stalingrad, Heinz Gerlach Schrobenhausen, Heinz Gerlach Sulingen, Heinz Gerlach Licht & Sound, Heinz Schulze Gerlach, Heinz Gerlach Durchbruch Bei Stalingrad, Heinz Gerlach Tanzende Finger, Heinz Gerlach Tot, Heinz Gerlach Winterberg, Karl Heinz Gerlach Wegberg, Heinz Gerlach Zingst, Ferienwohnung Heinz Gerlach Zingst

     

    Halloween-Scherz: Horror- Clown gibt sich als von Holst aus

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

     

     

     

    Sie kennen das: Ein Clown sendet Ihnen eine E- Mail.

    Der Clown nennt sich oder ist Rainer von Holst. Alles ohne Beweis. Was macht man damit ?  Richtig. Man fragt Google und die User.

    Die Rainer von Holst-Clown Maske mit falscher E-Mail inklusive cc an “Polizei” ohne handfeste Beweise – Ist das ein gelungener Halloween-Scherz ?  Oder sind andere Horror-Clowns noch besser ?

    a Adolf Hitler

    b Benito Mussolini

    c Rainer von Holst

    d Nero

     

    Wer hat die beste Horror-Clown-Frisur ?

    a Fury

    b Rainer von Holst

    c Flipper

    d Lassie

    You will be the Judge !

    Horror Clown Movies, Horror Clown Movies 2016, Horror Clown Makeup, Horror Clown Movie 2017, Horror Clown Videos, Horror Clown Costumes, Horror Clown Mask, Horror Clown Pics, Horror Clown Stories, Horror Clown Names, Scary Clown American Horror Story, Evil Clown American Horror Story Actor, American Horror Story Clown, Horror Movie About Clown, Horror Movie With Clown And Babysitter, Clown American Horror Story Actor, American Horror Clown Costume, American Horror Clown Mask, American Horror Clown Actor, Clown American Horror Story Trailer, Horror Clown Books, Horror Clown Birthday, Horror Clown Bilder, Horror Clown Breda, Horror Clown Blick, Horror Clown Basel, Horror Film Clown Babysitter, Horror Movie Clown Babysitter, Horror Story Clown Babysitter, American Horror Story Clown Backstory, Horror Clown Costumes, Horror Clown Costumes Adults, Horror Clown Character, Horror Clown Costume Ideas, Horror Clown Costumes Uk, Clown Horror Comedy, American Horror Clown Costume, Classic Horror Clown Costume, Womens Horror Clown Costume, Horror Movie Clown Costume, Horror Clown Drawings, Horror Clown Dolls, Horror Clown Dailymotion, Horror Clown Director, Horror Clown Deutsch, Horror Clown Deutschschweiz, Horror Dog Clown Car, Horror Dome Clown, Horror Clown Fancy Dress, Horror Clown Videos Dailymotion, Horror Clown England, Horror Clown Es, Horror Clown Eli Roth, Horror Clown Essen, Evil Clown Horror Movie, Evil Clown Horror, American Horror Story Clown Episode, Evil Clown American Horror Story, Evil Clown American Horror Story Actor, American Horror Story Clown Episode 1, Horror Clown Film, Horror Clown Face, Horror Clown Face Paint, Horror Clown Film 2015, Horror Clown Full Movie, Horror Clown Fancy Dress, Horror Clown Figurine, Horror Clown Frankrijk, Horror Clown Frankreich, Horror Clown France, Horror Clown Gifs, Horror Clown Games, Horror Clown Geschichte, Horror Clown Geschichten, Horror Clown Gesicht, Horror Clown Girl, American Horror Clown Gif, Scary Clown Horror Gif, Clown Horror Movie Gif, American Horror Story Clown Girl, Horror Clown Halloween, Horror Clown Huren, Horror Clown Images, Horror Clown In Nederland, Horror Clown In Der Schweiz, Horror Clown In Thun, Horror Clown In Frankrijk, Horror Clown In Frankreich, Horror Clown It, Horror Clown In Basel, Horror Clown In England, Horror Clown In Luxemburg, Horror Clown Jokes, Horror Clown Jack, American Horror Story Clown Jaw, Horror Clown John Wayne, Jeugdjournaal Horror Clown, Clown Horror Prank Jockiboi, Horror Clown Killer, Horror Clown Laugh, Horror Clown Luxemburg, Horror Clown Luxembourg, Horror Clown Lache, Clown Horror List, Horror Clown Movies List, Clown Horror Films List, Horror Movies Like Clown, American Horror Story Clown Lawsuit, Horror Clown Mask Latex, Horror Clown Movies, Horror Clown Movies 2016, Horror Clown Makeup, Horror Clown Movie 2017, Horror Clown Mask, Horror Clown Music, Horror Clown Movies On Netflix, Horror Clown Memes, Horror Clown Names, Horror Clown Nights, Horror Clown Night Game, Clown Horror Novels, Clown Horror Netflix, Clown Horror New, Horror Movie Clown Names, American Horror Clown Name, American Horror Clown No Mask, Horror Clown Movies New, Horror Clown Outfit, Horror Clown Movies On Netflix, Horror Movie Clown On Tricycle, Scary Clown On American Horror Story, Clown Horror Movies Online, Horror Movie With Clown On Cover, Clown Horror Watch Online, Horror Movies Of Clown, Creepy Clown On American Horror, Clown Horror Movie Watch Online, Horror Clown Pics, Horror Clown Prank, Horror Clown Props, Horror Clown Poem, Horror Clown Prosthetic, Horror Clown Photoshop, Horror Clown Pak, Horror Clown Face Paint, American Horror Clown Picture, Horror Movie Clown Puppet, Horror Clown Quotes, American Horror Story Clown Quotes, Horror Clown Real, Clown Horror Review, Clown Horror Rotten Tomatoes, Horror Film Clown Rocking Chair, American Horror Story Clown Real, American Horror Story Clown Running, American Horror Story Clown Real Person, American Horror Story Clown Real Face, Clown Horror Movie Dvd Release, Clown Horror Recensione, Horror Clown Stories, Scary Horror Clowns, Horror Story Clown Mask, Horror Clown Song, Horror Story Clown Statue, Horror Clown Sound, Horror Clown Suit, Scary Horror Clown Movies, Clown Horror Short Stories, Horror Movie Clown Scene, Horror Clown Tattoo, Horror Clown Top 10, Horror Clown Thun, Horror Clown Trailer, Horror Clown Tutorial, American Horror Clown Trailer, Horror Movie Clown Trailer, Moviepilot Horror Clown Trailer, Horror Movie The Clown, American Horror Story Clown, Horror Clown Masks Uk, Horror Clown Costumes Uk, Horror Film Clown Under Bed, Horror Movie Clown Under Bed, American Horror Story Clown Unmasked, American Horror Clown Makeup, Clown Upcoming Horror Movies, Horror Clown Makeup, Horror Clown Halloween Makeup, Horror Clown Uit Frankrijk, Horror Clown Videos, Horror Clown Videos Dailymotion, Horror Clown Verkleidung, American Horror Story Clown Video, American Horror Story Clown Vine, Halloween Horror Nights Clown Video, Horror Clown Tattoo Vorlagen, Horror Clown Versteckte Kamera, Horror Clown Vermoord, Horror Clown Verhalen, Horror Clown Wallpapers, Horror Clown Wiki, Horror Clown Woman, Horror Clown Wig, Horror Clown Womens Costume, Clown Horror Watch Online, Horror White Clown, American Horror Clown Without Mask, Horror Movie With Clown Doll, Horror Movie With Clown Killer, Horror Clown Youtube, Clown Horror Movies Youtube, American Horror Story Clown Youtube, Youtube Horror Clown Prank, Film Horror Sui Clown Yahoo, Film Horror Clown Yahoo, Horror Zombie Clown Mask, Clown Zombies Horror, Clown Horror Zwiastun, Horror Clown Zoetermeer, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther

     

    Exposed – Rainer von Holsts Cyberweapon – Pierre Gersoene

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Image result for pierre gersöne

    Pierre Gersöne

    The notorious Rainer von Holst publishes many anonymous blogs in the internet to threaten, extort, diffame and lie about his critics or victims.

    The anonymous webmaster behind his network of blogs was trying to hide for sure good reasons.

    Pierre Gersöne from East-Berlin has been exposed now

    For all fans of Rainer von Holst and him for such memorable websites like

    gomopacrime, investigoo, etc. pp

    here are the contact details:

    Pierre Gersöne

    Medienhaus Gersöne UG
    Fanningerstraße 54
    D-10365 Berlin-Lichtenberg

    Telefon: +49 (0)30 531 674 60
    Telefax: +49 (0)30 531 674 65

    http://www.medienhaus-gersoene.de

    Registergericht: Amtsgericht Berlin-Charlottenburg
    Registernummer: HRB 160218 B
    Umsatzsteuer-Identifikationsnummer gem. § 27a UStG: DE295777375

    Must See – Video – Urlaub in Dambeck

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Urlaub In English, Urlaub Meaning, Urlaub Bowen, Urlaub Accounting, Urlaub Auf Dem Bauernhof, Urlaub In Deutschland, Urlaub Translate, Urlaub German To English, Urlaub Vs Ferien, Urlaub Machen, Urlaub Accounting, Urlaub Auf Dem Bauernhof, Urlaub Am Bauernhof, Urlaub Ada Ok, Urlaub Auf Dem Bauernhof Bayern, Urlaub Am Bodensee, Urlaub Bowen, Urlaub Buchen, Urlaub Bauernhof, Urlaub Bali, Urlaub Bulgarien, Urlaub Bayern 2017, Urlaub Bayern, Urlaub Billig, Urlaub Barcelona, Urlaub Bodensee, Urlaub Costa Rica, Urlaub Checkliste, Urlaub Check 24, Urlaub Cornwall, Urlaub Curacao, Urlaub Capri, Urlaub Chiemsee, Urlaub Kroatien, Urlaub Cartoon, Urlaub Corsica, Urlaub Dentist Raleigh, Urlaub Duden, Urlaub Deutschland, Urlaub Dubai, Urlaub De, Urlaub Deals, Urlaub Deutschland 2017, Urlaub Englisch, Urlaub English, Urlaub Europa, Urlaub Express, Urlaub England, Urlaub Essay, Urlaub Elternzeit, Urlaub Etymologie, Urlaub Elba, Urlaub Email, Urlaub German, Urlaub German To English, Urlaub Gender, Urlaub Griechenland, Urlaub Guru, Urlaub Hawaii, Urlaub Holland, Urlaub Hamburg, Urlaub Holidays Pvt Ltd, Urlaub Hurghada, Urlaub Hessen, Urlaub Harz, Urlaub Hamster, Urlaub Haben, Urlaub Hamburg 2017, Urlaub In English, Urlaub In Deutschland, Urlaub In Oesterreich, Urlaub In Italien, Urlaub In Der Schweiz, Urlaub In Griechenland, Urlaub In Nordkorea, Urlaub In Kroatien, Urlaub In Spanien, Urlaub Japan, Urlaub Jordanien, Urlaub Juni, Urlaub Juni 2017, Urlaub Jamaika, Urlaub Juli, Urlaub Kroatien, Urlaub Kreta, Urlaub Kuba, Urlaub Korsika, Urlaub Kanaren, Urlaub Karibik, Urlaub Korfu, Urlaub Kos, Urlaub Last Minute, Urlaub Lanzarote, Urlaub London, Urlaub Lefkada, Urlaub Ligurien, Urlaub Leo, Urlaub La Gomera, Urlaub Los Angeles, Urlaub La Palma, Urlaub Liste, Urlaub Meaning, Urlaub Machen, Urlaub Mit Hund, Urlaub Mallorca, Urlaub Malediven, Urlaub Mit Kindern, Urlaub Mit Baby, Urlaub Malta, Urlaub Mit Kleinkind, Urlaub Marokko, Urlaub Nordsee, Urlaub Nehmen, Urlaub Norwegen, Urlaub Nrw, Urlaub Niederlande, Urlaub November, Urlaub New York, Urlaub Namibia, Urlaub Norditalien, Urlaub Ne Demek, Urlaub Or Ferien, Urlaub Ostsee, Urlaub Oman, Urlaub Online Buchen, Urlaub Ostern, Urlaub Ostern 2017, Urlaub Ostsee Hotel, Urlaub Ostsee Mit Hund, Urlaub Ostsee Mit Kindern, Urlaub Oktober Warm, Urlaub Piraten, Urlaub Plural, Urlaub Pronunciation, Urlaub Portugal, Urlaub Probezeit, Urlaub Packliste, Urlaub Planen, Urlaub Philippinen, Urlaub Polen, Urlaub Paris, Urlaub Quotes, Urlaub Questions, Urlaub Quedlinburg, Urlaub Qatar, Urlaub Quebec, Urlaub Queensland, Urlaub Katar, Urlaub Quirimbas, Urlaub Qi Gong, Urlaub Queen Mary 2, Urlaub Reisen, Urlaub Rhodos, Urlaub Sardinien, Urlaub Spanien, Urlaub Sizilien, Urlaub Santorini, Urlaub Seychellen, Urlaub Translate, Urlaub Translation German English, Urlaub Und Ferien, Urlaub Usa Visum, Urlaub Und Reisen, Urlaub Usa, Urlaub Utrecht, Urlaub Ungarn, Urlaub Umzug, Urlaub Usedom, Urlaub Ukraine, Urlaub Urlaub, Urlaub Vs Ferien, Urlaub Vom Urlaub, Urlaub Vietnam, Urlaub Verbringen, Urlaub Vokabeln, Urlaub Vertaling, Urlaub Venezuela, Urlaub Verfall, Urlaub Vergleich, Urlaub Versicherung, Urlaub Wiktionary, Urlaub Wikipedia, Urlaub Xanten, Urlaub Xxl, Urlaub Xtra, Urlaub Xxl Familie, Urlaub Yucatan, Urlaub Yoga, Urlaub Yacht, Urlaub Yoga Meditation, Urlaub Yoga Deutschland, Urlaub Ystad, Urlaub Yellowstone National Park, Urlaub Youtube, Urlaub Yosemite National Park, Urlaub Yoga Surfen, Urlaub Zypern, Urlaub Zakynthos, Urlaub Zu Hause, Urlaub Zu Zweit, Urlaub Zanzibar, Urlaub Zeeland, Urlaub Zitate, Urlaub Zum Neuen Arbeitgeber Mitnehmen, Urlaubszeit, Urlaub Zivildienst

    Firmenwelten-Bankrotteur von Holst nutzt Pleite-EEV-Vertrieb für neue Anlegerfalle “Enercrox”

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    PressReader – Hannoversche Allgemeine: 2016-02-22 – Und ewig …

    Feb 22, 2016 – Im Namen einer Firma Enercrox melden sich alte Bekannte: Eben jene „Berater“, die einst das Geld für die EEV eingesammelt haben.

    Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther, Bankrott Gehen, Bankrott Englisch, Bankrott Auf Englisch, Bankrott Anmelden, Bankrott Adjektiv, Bankrott Argentiniens Staatspleite 2001, Bankrott Anderes Wort, Bankrott Auktionen, Bankrott Argentinien, Bankrott Auktion, Bankrott Airberlin, Bankrott Auf Griechisch, Bankrott Bedeutung, Bankrott Buch, Bankrott Bost, Bankrott Bank, Bankrott Bundesland, Bankrott Brasilien, Bankrott Berlin, Bankrott Financial Crisis, American Chopper Bankrott, Cafe Bankrott, Cafe Bankrott Berlin, Commerzbank Bankrott, Colt Bankrott, Companys Bankrott, Chicago Bankrott, Cafe Bankrott Prenzlauer Allee, Caffee Bankrott, Bankrott Duden, Bankrott Definition, Bankrott Dict, Bankrott Der Ddr, Bankrott Detroit, Bankrott Durch Scheidung, Bankrott Deutsch, Bankrott Deutschland, Bankrott Deutsche Bank, Bankrott Der Bildung, Bankrott Englisch, Bankrott Gehen, Bankrott Gehen Englisch, Bankrott Griechenland, Bankrott Gehen Duden, Bankrott Griechenland Folgen, Bankrott Gegangen, Bankrott Gmbh, Bankrott Gehen Bedeutung, Bankrott Gesetz, Bankrott Gehen Rechtschreibung, Bankrott Herkunft, Bankrott Hadith, Hsv Handball Bankrott, Htc Bankrott, Hsv Bankrott, Handballclub Bankrott 2012, Hattrick Bankrott, Hardwareversand Bankrott, Bank Banker Bankrott Hamburg, Nach Dem Bankrott Habermas, Bankrott Insolvenz, Bankrott Lehman Brothers, Bankrott Machen, Bankrott Mit 4 Buchstaben, Bankrott Monopoly, Bankrott Meyer, Bankrott Machen Englisch, Bankrott Anmelden, Bankrott Machen Duden, Bankrott Magyarul, Jp Morgan Bankrott, Mexx Bankrott, Bankrott Nach Scheidung, Bankrott New York 1975, Nokia Bankrott, Nintendo Bankrott, Neckermann Bankrott, Opel Bankrott, Otto Bankrott, Occ Bankrott, Osobny Bankrott Fyzickej Osoby, O2 Bankrott, Odenwaldschule Bankrott, Pleite Oder Bankrott, Bankrott Oder Insolvent, Bankrott Gehen Oder Bankrott Gehen, Bankrott Pleite, Quiksilver Bankrott, Quelle Bankrott, Bankrott Stgb, Bankrott Synonym, Bankrott Straftat, Bankrott Stgb 283, Bankrott Schema, Bankrott Strafrecht, Bankrott Sein, Bankrott Strafe, Bankrott Tatbestand, Bankrott T Shirt, Bankrott Und Insolvenz, Bankrott Ukraine, Bankrott Usa, Bankrott Unternehmen, Bankrott Us-bundesstaat, Bankrott Usa 1971, Bankrott Usa 2015, Bankrott Ursprung, Bankrott Und Insolvenzverschleppung, Bankrott Urteil, Bankrott Wortherkunft, Bankrott Wiki, Bankrott Wikipedia, Bankrott Werden, Bankrott Was Tun, Bankrott Wiktionary, Bankrott Was Nun, Bankrott Weil Klein These, Bankrott Was Ist Das, Bankrott Was Heisst Das, Ludwig Xiv Bankrott, Yingli Bankrott, Krebs Bankrott Youtube, New York Bankrott, Bankrott New York 1975, Bankrott Zu Gehen, Zalando Bankrott, Zypern Bankrott, Zielpunkt Bankrott, Zentralbank Bankrott, Zypern Bankrott 2013

    Leserbrief: Betrogene Anlegerin Caputa will Hilfe gegen mutmaßlichen Betrüger von Holst

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Name: A Caputa

    Email: andreacaputa@xyz

    Website:

    Comment: Sehr geehrter Herr Pulch,
    es scheint ich hätte besser mal Firmenwelten, oder Enercrox gegoogelt. Dann hätten wir uns sehr viel Ärger sparen können.
    Haben Sie mehr Informationen für uns? Z.B. wie man gerichtliche Schritte einleitet?
    Van Holst und seine angebliche Tochter halten uns schon seit über einem Monat mit falschen und fadenscheinigen Versprechungen hin und zahlen weder unser Investment noch unsere Dividende aus. Van Holst versuchst sich momentan in USA zu etablieren. Man sollte dem definitiv einen Riegel vorschieben und zwar schnellstens.
    Ich hoffe ich höre von Ihnen. Es gibt bestimmt noch weiter Personen die an einer Klage, oder vielleicht sogar, Sammelklage, Interesse haben.
    MFG
    A Caputa

    Time: October 10, 2016 at 2:52 pm
    IP Address: 88.153.7.143
    Contact Form URL: https://berndpulch.org/2016/07/11/insider-nach-mutmasslicheer-pleite-von-firmenwelten-plant-von-holst-mutmassliches-erpresser-blognetzwerk/
    Sent by an unverified visitor to your site.

     

    Sehr geehrte Frau Caputa,

    ich empfehle Ihnen die internationalen Anwaltskanzleien White & Case und Freshfields sowie die Ausschöpfung aller strafrechtlichen Möglichkeiten. Von Holst ist zu 90% noch im Raum Bielefeld.

    Beste Grüsse

     

    Magister Bernd Pulch

    PS

    Ihr Leserbrief zählt zu den urheberrechtlich geschützten Werken aus § 2 Abs. 1 UrhG. Mit der Einsendung des Leserbriefes an die Redaktion haben Sie in die Veröffentlichung und zulässigen Weiterverbreitung, § 17 UrhG eingewilligt. Durch Ihre Zustimmung zur Veröffentlichung und Verbreitung hat sich Ihr Urheberrechtsschutz „erschöpft”, vgl. § 17 UrhG. Dies bedeutet, sind mit Zustimmung des Urhebers Werke oder deren Vervielfältigungsstücke in den Verkehr gebracht worden, kann der Urheber hinterher nicht mehr bestimmen, welchen weiteren Weg die Werke nehmen.

    Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther, Betrug In English, Betrug Englisch, Betrug Stgb, Betrug Schema, Betrug Meaning, Betrug Ebay Kleinanzeigen, Betrug Definition, Betrug Duden, Betrug Synonym, Betrug Melden, Betrug Auf Englisch, Betrug Airbnb, Betrug Anzeigen, Betrug Antragsdelikt, Betrug Amazon, Betrug Autokauf, Betrug Aufbau, Betrug Auf Ebay Kleinanzeigen, Betrug Autoverkauf, Betrug Anzeige, Betrug Bgb, Betrug Bei Ebay, Betrug Bei Ebay Kleinanzeigen, Betrug Beim Autokauf, Betrug Beim Autoverkauf, Betrug Bei Amazon, Betrug Bei Paypal, Betrug Bei Ebay Kleinanzeigen Was Tun, Betrug Bei Kleiderkreisel, Betrug Bei Ebay Melden, Betrug Curling, Betrug Definition, Betrug Duden, Betrug Dict, Betrug Durch Unterlassen, Betrug Durch Unterlassen Schema, Betrug Dsds 2015, Betrug Diebstahl, Betrug Durch Unterlassen Fall, Betrug Deutschland, Betrug Dsds, Betrug English, Betrug Englisch, Betrug Ebay Kleinanzeigen, Betrug Ebay, Betrug Gesetz, Betrug Geringwertig, Betrug Gewinnspiel, Betrug Haftstrafe, Betrug Hausarbeit, Betrug Hartz 4, Betrug Handyvertrag, Betrug Hauskauf, Betrug Heinrich, Betrug Handynummer, Betrug Handwerker, Betrug In English, Betrug Im Internet, Betrug Im Weissen Kittel, Betrug In Englisch, Betrug Immobilienscout, Betrug In Der Ehe, Betrug Im Internet Was Tun, Betrug Immobilienscout24, Betrug Jura, Betrug Jobcenter, Betrug Juristisch, Betrug Jusline, Betrug Juristische Person, Betrug Ja Sagen, Betrug Juraschema, Betrug Juracademy, Betrug Jura Online, Betrug Juris, Betrug Kleinanzeigen, Betrug Kreditkarte, Betrug Kleiderkreisel, Betrug Krankenkasse, Betrug Latein, Betrug Liebe, Betrug Leoni, Betrug Lebensversicherung, Betrug Lotto, Betrug Lastschrift, Betrug Meaning, Betrug Melden, Betrug Mit Paypal, Betrug Mehrzahl, Betrug Microsoft Anruf, Betrug Mit Western Union, Betrug Mobile.de, Betrug Mit Handynummer, Betrug Mit Whatsapp, Betrug Mit Paysafecard, Betrug Nachweisen, Betrug Nummer, Betrug Nebenkostenabrechnung Strafanzeige, Betrug Nigeria, Betrug Nach Stgb, Betrug Nebenkostenabrechnung, Betrug Nachsendeauftrag, Betrug Ne Demek, Betrug Nebenklage, Betrugsnummer Melden, Betrug Online Melden, Betrug Online, Betrug Onecoin, Betrug Obersatz, Betrug Ohne Schaden, Betrug Ohne Vorsatz, Betrug Online Banking, Betrug Objektiver Tatbestand, Betrug Oder Unterschlagung, Betrug Online Casino, Betrug Plural, Betrug Paypal Kleinanzeigen, Betrug Paypal, Betrug Quoka, Betrug Qualifikation, Betrug Quoka Polizei, Betrug Quizduell, Betrug Qualifikationen, Betrug Quotes, Betrug Quizsendung Schweiz, Betrug Questico, Betrug Quotenschaden, Betrug Quizsendung, Betrug Rentenversicherung, Betrug Russisch, Betrug Ris, Betrug Russische Frauen, Betrug Rechtsanwalt, Betrug Reisekostenabrechnung, Betrug Stgb, Betrug Schema, Betrug Synonym, Betrug Strafe, Betrug Schweiz, Betrug Strafantrag, Betrug Stoffgleichheit, Betrug Tatbestand, Betrug Translation, Betrug Traumdeutung, Betrug Tatbestandsmerkmale, Betrug Thermomix, Betrug Telekom Rechnung, Betrug Telekom, Betrug Tatbestandsvoraussetzungen, Betrug Trotz Paypal, Betrug Teppichreinigung, Betrug Unterschlagung, Betrug Vorsatz, Betrug Verzeihen, Betrug Wucher, Betrug Wiki, Betrug Willhaben, Betrug Was Tun, Betrug Whatsapp, Betrug Western Union, Betrug Wieder Gut Machen, Betrug Web.de, Betrug Wohnwagen Verkauf, Betrug Warenbestellung, Xtrasize Betrug, Xing Betrug, Sgb Xii Betrug, Fg Xpress Betrug, Garten Xxl Betrug, Xango Betrug, Xmile Betrug, Xcite Betrug, Xtb Betrug, Xbox Betrug, Betrug Yourfone, Betrug Youtube, Betrug Yahoo, Yotta Betrug, Yelp Betrug, Yoox Betrug, Youtradefx Betrug, Youtailor Betrug, Yokebe Betrug, Yoga Betrug, Betrug Zitate, Betrug Zermatt, Betrug Zweckverfehlung, Betrug Zum Nachteil Von Versicherungen, Betrug Zjs, Betrug Zum Nachteil, Betrug Zugunsten Dritter, Betrug Zahnarzt, Betrug Zweifel Irrtum, Betrug Zahnarzt Dessau

    Presidential Policy Directive PPD-41 on United States Cyber Incident Coordination

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    FACT SHEET: Presidential Policy Directive on United States Cyber Incident Coordination

    The new directive spells out how the Federal government will coordinate its incident response activities in the event of a large-scale cyber incidentToday, the President approved a Presidential Policy Directive (PPD) on United States Cyber Incident Coordination.  This new PPD marks a major milestone in codifying the policy that governs the Federal government’s response to significant cyber incidents.

    Since the beginning of his Administration, President Obama has emphasized that malicious cyber activity poses a serious threat to the national and economic security of the United States.  As set forth in the Cybersecurity National Action Plan, over the last seven and a half years the Administration’s cyber policy has been based on three strategic pillars:  raising the level of cybersecurity in our public, private, and consumer sectors, in both the short and the long-term; taking steps to deter, disrupt, and interfere with malicious cyber activity aimed at the United States or its allies; and responding effectively to and recovering from cyber incidents.

     

    Even as we have made progress on all three pillars, the United States has been faced with managing increasingly significant cyber incidents affecting both the private sector and Federal government.  We have applied the lessons learned from these events, as well as our experience in other areas such as counterterrorism and disaster response. That experience has allowed us to hone our approach but also demonstrated that significant cyber incidents demand a more coordinated, integrated, and structured response.  We have also heard from the private sector the need to provide clarity and guidance about the Federal government’s roles and responsibilities.   The PPD builds on these lessons and institutionalizes our cyber incident coordination efforts in numerous respects, including:

    • Establishing clear principles that will govern the Federal government’s activities in cyber incident response;
    • Differentiating between significant cyber incidents and steady-state incidents and applying the PPD’s guidance primarily to significant incidents;
    • Categorizing the government’s activities into specific lines of effort and designating a lead agency for each line of effort in the event of a significant cyber incident;
    • Creating mechanisms to coordinate the Federal government’s response to significant cyber incidents, including a Cyber Unified Coordination Group similar in concept to what is used for incidents with physical effects, and enhanced coordination procedures within individual agencies;
    • Applying these policies and procedures to incidents where a Federal department or agency is the victim; and,
    • Ensuring that our cyber response activities are consistent and integrated with broader national preparedness and incident response policies, such as those implemented through Presidential Policy Directive 8-National Preparedness, so that our response to a cyber incident can seamlessly integrate with actions taken to address physical consequences caused by malicious cyber activity.

     

    We also are releasing today a cyber incident severity schema that establishes a common framework within the Federal government for evaluating and assessing the severity of cyber incidents and will help identify significant cyber incidents to which the PPD’s coordination procedures would apply.

     

    Incident Response Principles

    The PPD outlines five principles that will guide the Federal government during any cyber incident response:

    • Shared Responsibility – Individuals, the private sector, and government agencies have a shared vital interest and complementary roles and responsibilities in protecting the Nation from malicious cyber activity and managing cyber incidents and their consequences.
    • Risk-Based Response – The Federal government will determine its response actions and  resource needs based on an assessment of the risks posed to an entity, national security interests, foreign relations, or economy of the United States or to the public confidence, civil liberties, or public health and safety of the American people.
    • Respecting Affected Entities – Federal government responders will safeguard details of the incident, as well as privacy and civil liberties, and sensitive private sector information.
    • Unity of Effort – Whichever Federal agency first becomes aware of a cyber incident will rapidly notify other relevant Federal agencies in order to facilitate a unified Federal response and ensure that the right combination of agencies responds to a particular incident.
    • Enabling Restoration and Recovery – Federal response activities will be conducted in a manner to facilitate restoration and recovery of an entity that has experienced a cyber incident, balancing investigative and national security requirements with the need to return to normal operations as quickly as possible.

     

    Significant Cyber Incidents

    While the Federal government will adhere to the five principles in responding to any cyber incident, the PPD’s policies and procedures are aimed at a particular class of cyber incident: significant cyber incidents.  A significant cyber incident is one that either singularly or as part of a group of related incidents is likely to result in demonstrable harm to the national security interests, foreign relations, or economy of the United States or to the public confidence, civil liberties, or public health and safety of the American people.

    When a cyber incident occurs, determining its potential severity is critical to ensuring the incident receives the appropriate level of attention.  No two incidents are the same and, particularly at the initial stages, important information, including the nature of the perpetrator, may be unknown.

    Therefore, as part of the process of developing the incident response policy, the Administration also developed a common schema for describing the severity of cyber incidents, which can include credible reporting of a cyber threat, observed malicious cyber activity, or both.  The schema establishes a common framework for evaluating and assessing cyber incidents to ensure that all Federal departments and agencies have a common view of the severity of a given incident, the consequent urgency of response efforts, and the need for escalation to senior levels.

    The schema describes a cyber incident’s severity from a national perspective, defining six levels, zero through five, in ascending order of severity.  Each level describes the incident’s potential to affect public health or safety, national security, economic security, foreign relations, civil liberties, or public confidence.  An incident that ranks at a level 3 or above on this schema is considered “significant” and will trigger application of the PPD’s coordination mechanisms.

     

    Lines of Effort and Lead Agencies

    To establish accountability and enhance clarity, the PPD organizes Federal response activities into three lines of effort and establishes a Federal lead agency for each:

    • Threat response activities include the law enforcement and national security investigation of a cyber incident, including collecting evidence, linking related incidents, gathering intelligence, identifying opportunities for threat pursuit and disruption, and providing attribution.   The Department of Justice, acting through the Federal Bureau of Investigation (FBI) and the National Cyber Investigative Joint Task Force (NCIJTF), will be the Federal lead agency for threat response activities.
    • Asset response activities include providing technical assets and assistance to mitigate vulnerabilities and reducing the impact of the incident, identifying and assessing the risk posed to other entities and mitigating those risks, and providing guidance on how to leverage Federal resources and capabilities.   The Department of Homeland Security (DHS), acting through the National Cybersecurity and Communications Integration Center (NCCIC), will be the Federal lead agency for asset response activities.  The PPD directs DHS to coordinate closely with the relevant Sector-Specific Agency, which will depend on what kind of organization is affected by the incident.
    • Intelligence Support and related activities include intelligence collection in support of investigative activities, and integrated analysis of threat trends and events to build situational awareness and to identify knowledge gaps, as well as the ability to degrade or mitigate adversary threat capabilities.  The Office of the Director of National Intelligence, through the Cyber Threat Intelligence Integration Center, will be the Federal lead agency for intelligence support and related activities.

    In addition to these lines of effort, a victim will undertake a wide variety of response activities in order to maintain business or operational continuity in the event of a cyber incident.  We recognize that for the victim, these activities may well be the most important.  Such efforts can include communications with customers and the workforce; engagement with stakeholders, regulators, or oversight bodies; and recovery and reconstitution efforts.   When a Federal agency is a victim of a significant cyber incident, that agency will be the lead for this fourth line of effort.  In the case of a private victim, the Federal government typically will not play a role in this line of effort, but will remain cognizant of the victim’s response activities consistent with these principles and coordinate with the victim.

     

    Coordination Architecture

    In order to facilitate the more coordinated, integrated response demanded by significant cyber incidents, the PPD establishes a three-tiered coordination architecture for handling those incidents:

    National Policy Level:  The PPD institutionalizes the National Security Council-chaired interagency Cyber Response Group (CRG).  The CRG will coordinate the development and implementation of United States Government policy and strategy with respect to significant cyber incidents affecting the United States or its interests abroad.

    National Operational Level:  The PPD directs agencies to take two actions at the national operational level in the event of a significant cyber incident.

    • Activate enhanced internal coordination procedures.  The PPD instructs agencies that regularly participate in the Cyber Response Group to develop these procedures to ensure that they can surge effectively when confronted with an incident that exceeds their day-to-day operational capacity.
    • Create a Unified Coordination Group.  In the event of a significant cyber incident, the PPD provides that the lead agencies for each line of effort, along with relevant Sector-Specific Agencies (SSAs), state, local, tribal and territorial governments, international counterparts, and private sector entities, will form a Cyber Unified Coordination Group (UCG) to coordinate response activities.  The Cyber UCG shall coordinate the development, prioritization, and execution of cyber response efforts, facilitate rapid information sharing among UCG members, and coordinate communications with stakeholders, including the victim entity.

    Field Level:  The PPD directs the lead agencies for each line of effort to coordinate their interaction with each other and with the affected entity.

     

    Integration with Existing Response Policy

    The PPD also integrates U.S. cyber incident coordination policy with key aspects of existing Federal preparedness policy to ensure that the Nation will be ready to manage incidents that include both cyber and physical effects, such as a significant power outage resulting from malicious cyber activity.  The PPD will be implemented by the Federal government consistent with existing preparedness and response efforts.

    Implementation tasks

    The PPD also directs several follow-on tasks in order to ensure its full implementation.  In particular, it requires that the Administration develop and finalize the National Cyber Incident Response Plan – in coordination with State, Local, Territorial, and Tribal governments, the private sector, and the public – to further detail how the government will manage cyber incidents affecting critical infrastructure.  It also directs DHS and DOJ to develop a concept of operations for how a Cyber UCG will operate and for the NSC to update the charter for the CRG.


    https://www.whitehouse.gov/the-press-office/2016/07/26/presidential-policy-directive-united-states-cyber-incident

    July 26, 2016

    Presidential Policy Directive — United States Cyber Incident Coordination

    July 26, 2016

    PRESIDENTIAL POLICY DIRECTIVE/PPD-41

    SUBJECT: United States Cyber Incident Coordination

    The advent of networked technology has spurred innovation, cultivated knowledge, encouraged free expression, and increased the Nation’s economic prosperity. However, the same infrastructure that enables these benefits is vulnerable to malicious activity, malfunction, human error, and acts of nature, placing the Nation and its people at risk. Cyber incidents are a fact of contemporary life, and significant cyber incidents are occurring with increasing frequency, impacting public and private infrastructure located in the United States and abroad.

    United States preparedness efforts have positioned the Nation to manage a broad range of threats and hazards effectively. Every day, Federal law enforcement and those agencies responsible for network defense in the United States manage, respond to, and investigate cyber incidents in order to ensure the security of our information and communications infrastructure. The private sector and government agencies have a shared vital interest in protecting the Nation from malicious cyber activity and managing cyber incidents and their consequences. The nature of cyberspace requires individuals, organizations, and the government to all play roles in incident response. Furthermore, effective incident response efforts will help support an open, interoperable, secure, and reliable information and communications infrastructure that promotes trade and commerce, strengthens international security, fosters free expression, and reinforces the privacy and security of our citizens.

    While the vast majority of cyber incidents can be handled through existing policies, certain cyber incidents that have significant impacts on an entity, our national security, or the broader economy require a unique approach to response efforts. These significant cyber incidents demand unity of effort within the Federal Government and especially close coordination between the public and private sectors.

    I. Scope

    This Presidential Policy Directive (PPD) sets forth principles governing the Federal Government’s response to any cyber incident, whether involving government or private sector entities. For significant cyber incidents, this PPD also establishes lead Federal agencies and an architecture for coordinating the broader Federal Government response. This PPD also requires the Departments of Justice and Homeland Security to maintain updated contact information for public use to assist entities affected by cyber incidents in reporting those incidents to the proper authorities.

    II. Definitions

    1. Cyber incident. An event occurring on or conducted through a computer network that actually or imminently jeopardizes the integrity, confidentiality, or availability of computers, information or communications systems or networks, physical or virtual infrastructure controlled by computers or information systems, or information resident thereon. For purposes of this directive, a cyber incident may include a vulnerability in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source.
    2. Significant cyber incident. A cyber incident that is (or group of related cyber incidents that together are) likely to result in demonstrable harm to the national security interests, foreign relations, or economy of the United States or to the public confidence, civil liberties, or public health and safety of the American people.

    III. Principles Guiding Incident Response

    In carrying out incident response activities for any cyber incident, the Federal Government will be guided by the following principles:

    1. Shared Responsibility. Individuals, the private sector, and government agencies have a shared vital interest and complementary roles and responsibilities in protecting the Nation from malicious cyber activity and managing cyber incidents and their consequences.
    2. Risk-Based Response. The Federal Government will determine its response actions and the resources it brings to bear based on an assessment of the risks posed to an entity, our national security, foreign relations, the broader economy, public confidence, civil liberties, or the public health and safety of the American people.
    3. Respecting affected entities. To the extent permitted under law, Federal Government responders will safeguard details of the incident, as well as privacy and civil liberties, and sensitive private sector information, and generally will defer to affected entities in notifying other affected private sector entities and the public. In the event a significant Federal Government interest is served by issuing a public statement concerning an incident, Federal responders will coordinate their approach with the affected entities to the extent possible.
    4. Unity of Governmental Effort. Various government entities possess different roles, responsibilities, authorities, and capabilities that can all be brought to bear on cyber incidents. These efforts must be coordinated to achieve optimal results. Whichever Federal agency first becomes aware of a cyber incident will rapidly notify other relevant Federal agencies in order to facilitate a unified Federal response and ensure that the right combination of agencies responds to a particular incident. State, local, tribal, and territorial (SLTT) governments also have responsibilities, authorities, capabilities, and resources that can be used to respond to a cyber incident; therefore, the Federal Government must be prepared to partner with SLTT governments in its cyber incident response efforts. The transnational nature of the Internet and communications infrastructure requires the United States to coordinate with international partners, as appropriate, in managing cyber incidents.
    5. Enabling Restoration and Recovery. Federal response activities will be conducted in a manner to facilitate restoration and recovery of an entity that has experienced a cyber incident, balancing investigative and national security requirements, public health and safety, and the need to return to normal operations as quickly as possible.

    IV. Concurrent Lines of Effort

    In responding to any cyber incident, Federal agencies shall undertake three concurrent lines of effort: threat response; asset response; and intelligence support and related activities. In addition, when a Federal agency is an affected entity, it shall undertake a fourth concurrent line of effort to manage the effects of the cyber incident on its operations, customers, and workforce.

    1. Threat response activities include conducting appropriate law enforcement and national security investigative activity at the affected entity’s site; collecting evidence and gathering intelligence; providing attribution; linking related incidents; identifying additional affected entities; identifying threat pursuit and disruption opportunities; developing and executing courses of action to mitigate the immediate threat; and facilitating information sharing and operational coordination with asset response.
    2. Asset response activities include furnishing technical assistance to affected entities to protect their assets, mitigate vulnerabilities, and reduce impacts of cyber incidents; identifying other entities that may be at risk and assessing their risk to the same or similar vulnerabilities; assessing potential risks to the sector or region, including potential cascading effects, and developing courses of action to mitigate these risks; facilitating information sharing and operational coordination with threat response; and providing guidance on how best to utilize Federal resources and capabilities in a timely, effective manner to speed recovery.
    3. Threat and asset responders will share some responsibilities and activities, which may include communicating with affected entities to understand the nature of the cyber incident; providing guidance to affected entities on available Federal resources and capabilities; promptly disseminating through appropriate channels intelligence and information learned in the course of the response; and facilitating information sharing and operational coordination with other Federal Government entities.
    4. Intelligence support and related activities facilitate the building of situational threat awareness and sharing of related intelligence; the integrated analysis of threat trends and events; the identification of knowledge gaps; and the ability to degrade or mitigate adversary threat capabilities.
    5. An affected Federal agency shall engage in a variety of efforts to manage the impact of a cyber incident, which may include maintaining business or operational continuity; addressing adverse financial impacts; protection of privacy; managing liability risks; complying with legal and regulatory requirements (including disclosure and notification); engaging in communications with employees or other affected individuals; and dealing with external affairs (e.g., media and congressional inquiries). The affected Federal agency will have primary responsibility for this line of effort.
    6. When a cyber incident affects a private entity, the Federal Government typically will not play a role in this line of effort, but it will remain cognizant of the affected entity’s response activities, consistent with the principles above and in coordination with the affected entity. The relevant sector-specific agency (SSA) will generally coordinate the Federal Government’s efforts to understand the potential business or operational impact of a cyber incident on private sector critical infrastructure.

    V. Architecture of Federal Government Response Coordination for Significant Cyber Incidents1

    In order to respond effectively to significant cyber incidents, the Federal Government will coordinate its activities in three ways:

    1. National Policy Coordination2The Cyber Response Group (CRG), in support of the National Security Council (NSC) Deputies and Principals Committees, and accountable through the Assistant to the President for Homeland Security and Counterterrorism (APHSCT) to the NSC chaired by the President, shall coordinate the development and implementation of United States Government policy and strategy with respect to significant cyber incidents affecting the United States or its interests abroad.
    2. National Operational Coordination
      1. Agency Enhanced Coordination Procedures. Each Federal agency that regularly participates in the CRG, including SSAs, shall establish and follow enhanced coordination procedures as defined in the annex to this PPD in situations in which the demands of responding to a significant cyber incident exceed its standing capacity.
      2. Cyber Unified Coordination Group. A Cyber Unified Coordination Group (UCG) shall serve as the primary method for coordinating between and among Federal agencies in response to a significant cyber incident as well as for integrating private sector partners into incident response efforts, as appropriate. A Cyber UCG shall be formed at the direction of the NSC Principals Committee, Deputies Committee, or the CRG, or when two or more Federal agencies that generally participate in the CRG, including relevant SSAs, request its formation. A Cyber UCG shall also be formed when a significant cyber incident affects critical infrastructure owners and operators identified by the Secretary of Homeland Security as owning or operating critical infrastructure for which a cyber incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.
      3. A Cyber UCG will normally consist of Federal lead agencies for threat response, asset response, and intelligence support, but will also include SSAs, if a cyber incident affects or is likely to affect sectors they represent. In addition, as required by the scope, nature, and facts of a particular significant cyber incident, a Cyber UCG may include participation from other Federal agencies, SLTT governments, nongovernmental organizations, international counterparts, or the private sector.
      4. Following the formation of a Cyber UCG, Federal agencies responding to the incident shall assign appropriate senior executives, staff, and resources to execute the agency’s responsibilities as part of a Cyber UCG. The Cyber UCG is intended to result in unity of effort and not to alter agency authorities or leadership, oversight, or command responsibilities. Unless mutually agreed upon between agency heads or their designees, and consistent with applicable legal authorities such as the Economy Act of 1932 (31 U.S.C. 1535), Federal departments and agencies will maintain operational control over their respective agency assets.
      5. Federal lead agencies. In order to ensure that the Cyber UCG achieves maximum effectiveness in coordinating responses to significant cyber incidents, the following agencies shall serve as Federal lead agencies for the specified line of effort:
        1. In view of the fact that significant cyber incidents will often involve at least the possibility of a nation-state actor or have some other national security nexus, the Department of Justice, acting through the Federal Bureau of Investigation and the National Cyber Investigative Joint Task Force, shall be the Federal lead agency for threat response activities.
        2. The Department of Homeland Security, acting through the National Cybersecurity and Communications Integration Center, shall be the Federal lead agency for asset response activities.
        3. The Office of the Director of National Intelligence, through the Cyber Threat Intelligence Integration Center, shall be the Federal lead agency for intelligence support and related activities.
      6. Drawing upon the resources and capabilities across the Federal Government, the Federal lead agencies are responsible for:
        1. Coordinating any multi-agency threat or asset response activities to provide unity of effort, to include coordinating with any agency providing support to the incident, to include SSAs in recognition of their unique expertise;
        2. Ensuring that their respective lines of effort are coordinated with other Cyber UCG participants and affected entities, as appropriate;
        3. Identifying and recommending to the CRG, if elevation is required, any additional Federal Government resources or actions necessary to appropriately respond to and recover from the incident; and
        4. Coordinating with affected entities on various aspects of threat, asset, and affected entity response activities through a Cyber UCG, as appropriate.
    3.  Field-Level CoordinationField-level representatives of the Federal asset or threat response lead agencies shall ensure that they effectively coordinate their activities within their respective lines of effort with each other and the affected entity. Such representatives may be co-located with the affected entity.

    VI. Unified Public Communications

    The Departments of Homeland Security and Justice shall maintain and update as necessary a fact sheet outlining how private individuals and organizations can contact relevant Federal agencies about a cyber incident.

    VII. Relationship to Existing Policy

    Nothing in this directive alters, supersedes, or limits the authorities of Federal agencies to carry out their functions and duties consistent with applicable legal authorities and other Presidential guidance and directives. This directive generally relies on and furthers the implementation of existing policies and explains how United States cyber incident response structures interact with those existing policies. In particular, this policy complements and builds upon PPD-8 on National Preparedness of March 30, 2011. By integrating cyber and traditional preparedness efforts, the Nation will be ready to manage incidents that include both cyber and physical effects.

    BARACK OBAMA


    1 Additional details regarding the Federal Government’s coordination architecture for significant cyber incidents are contained in an annex to this PPD.

    2 This sub-section supersedes NSPD-54/HSPD-23, paragraph 13, concerning the National Cyber Response Coordination Group.


    https://www.whitehouse.gov/the-press-office/2016/07/26/annex-presidential-policy-directive-united-states-cyber-incident

    July 26, 2016

    Annex for Presidential Policy Directive — United States Cyber Incident Coordination

    SUBJECT:  Federal Government Coordination Architecture for Significant Cyber Incidents
    I.   ScopeThis annex to PPD-41, United States Cyber Incident Coordination Policy, provides further details concerning the Federal Government coordination architecture for significant cyber incidents and prescribes certain implementation tasks.

    II.  Coordination Architecture

    A. National Policy Coordination

    The Cyber Response Group (CRG) shall be chaired by the Special Assistant to the President and Cybersecurity Coordinator (Chair), or an equivalent successor, and shall convene on a regular basis and as needed at the request of the Assistant to the President for Homeland Security and Counterterrorism and Deputy National Security Advisor.  Federal departments and agencies, including relevant cyber centers, shall be invited to participate in the CRG, as appropriate, based on their respective roles, responsibilities, and expertise or in the circumstances of a given incident or grouping of incidents.  CRG participants shall generally include senior representatives from the Departments of State, the Treasury, Defense (DOD), Justice (DOJ), Commerce, Energy, Homeland Security (DHS) and its National Protection and Programs Directorate, and the United States Secret Service, the Joint Chiefs of Staff, Office of the Director of National Intelligence, the Federal Bureau of Investigation, the National Cyber Investigative Joint Task Force, the Central Intelligence Agency, and the National Security Agency.  The Federal Communications Commission shall be invited to participate should the Chair assess that its inclusion is warranted by the circumstances and to the extent the Commission determines such participation is consistent with its statutory authority and legal obligations.

    The CRG shall:

    1. Coordinate the development and implementation of the Federal Government’s policies, strategies, and procedures for responding to significant cyber incidents;
    2. Receive regular updates from the Federal cybersecurity centers and agencies on significant cyber incidents and measures being taken to resolve or respond to those incidents;
    3. Resolve issues elevated to it by subordinate bodies as may be established, such as a Cyber Unified Coordination Group (UCG);
    4. Collaborate with the Counterterrorism Security Group and Domestic Resilience Group when a cross-disciplinary response to a significant cyber incident is required;
    5. Identify and consider options for responding to significant cyber incidents, and make recommendations to the Deputies Committee, where higher-level guidance is required, in accordance with PPD-1 on Organization of the National Security Council System of February 13, 2009, or any successor; and
    6. Consider the policy implications for public messaging in response to significant cyber incidents, and coordinate a communications strategy, as necessary, regarding a significant cyber incident.

    B. National Operational Coordination

    To promote unity of effort in response to a significant cyber incident, a Cyber UCG shall:

    1. Coordinate the cyber incident response in a manner consistent with the principles described in section III of this directive;
    2. Ensure all appropriate Federal agencies, including sector-specific agencies (SSAs), are incorporated into the incident response;
    3. Coordinate the development and execution of response and recovery tasks, priorities, and planning efforts, including international and cross-sector outreach, necessary to respond appropriately to the incident and to speed recovery;
    4. Facilitate the rapid and appropriate sharing of information and intelligence among Cyber UCG participants on the incident response and recovery activities;
    5. Coordinate consistent, accurate, and appropriate communications regarding the incident to affected parties and stakeholders, including the public as appropriate; and
    6. For incidents that include cyber and physical effects, form a combined UCG with the lead Federal agency or with any UCG established to manage the physical effects of the incident under the National Response Framework developed pursuant to PPD-8 on National Preparedness.

    SSAs shall be members of the UCG for significant cyber incidents that affect or are likely to affect their respective sectors.  As set forth in Presidential Policy Directive 21, the SSAs for critical infrastructure sectors are as follows:  DHS (Chemical, Commercial Facilities, Communications, Critical Manufacturing, Dams, Emergency Services, Government Facilities, Information Technology, Nuclear Reactors, Materials, and Waste, and Transportation Systems); DOD (Defense Industrial Base); Department of Energy (Energy); Department of the Treasury (Financial Services); Department of Agriculture (Food and Agriculture); Department of Health and Human Services (Healthcare and Public Health, and Food and Agriculture); General Services Administration (Government Facilities); Department of Transportation (Transportation Systems); and the Environmental Protection Agency (Water and Wastewater Systems).

    A Cyber UCG shall operate in a manner that is consistent with the need to protect intelligence and law enforcement sources, methods, operations, and investigations, the privacy of individuals, and sensitive private sector information.

    A Cyber UCG shall dissolve when enhanced coordination procedures for threat and asset response are no longer required or the authorities, capabilities, or resources of more than one Federal agency are no longer required to manage the remaining facets of the Federal response to an incident.

    III.  Federal Government Response to Incidents Affecting Federal Networks

    Nothing in this directive alters an agency’s obligations to comply with the requirements of the Federal Information Security Modernization Act of 2014 (FISMA) or Office of Management and Budget (OMB) guidelines related to responding to an “incident,” “breach,” or “major incident” as defined in that statute and OMB guidance.  Federal agencies shall follow OMB guidance to determine whether an incident is considered a “major incident” pursuant to FISMA.  If the cyber incident meets the threshold for a “major incident,” it is also a “significant cyber incident” for purposes of this directive and shall be managed in accordance with this directive.

    A. Civilian Federal Networks

    The Director of OMB oversees Federal agency information security policies and practices.  The Secretary of Homeland Security, in consultation with the Director of OMB, administers the implementation of Federal agency information security policies and practices and operates the Federal information security incident center.  The National Institute of Standards and Technology (NIST) develops standards and guidelines for Federal information systems that are mandatory for Federal agencies to implement.

    Federal agencies shall respond to significant cyber incidents in accordance with this directive and applicable policies and procedures, including the reporting of incidents to DHS as required by the U.S. Computer Emergency Readiness Team Federal incident notification guidelines.

    Where the effects of a significant cyber incident are limited to the operational activities of an individual Federal agency, that affected agency shall maintain primary authority over the affected assets and be responsible for managing the restoration services and related networks, systems, and applications and making the decision to restart an affected system.  DHS and other Federal agencies shall provide support as appropriate.

    Where a significant cyber incident has an impact on multiple Federal agencies or on the integrity, confidentiality, or availability of services to the public, the decision to restart an affected system rests with the owning Federal agency, but OMB and the Federal lead agencies for threat and asset response shall provide a consolidated, timely written recommendation, with appropriate caveats and conditions, to help inform that owning agency’s decision.

    B. DOD Information Network

    The Secretary of Defense shall be responsible for managing the threat and asset response to cyber incidents affecting the Department of Defense Information Network, including restoration activities, with support from other Federal agencies as appropriate.

    C. Intelligence Community Networks

    The Director of National Intelligence shall be responsible for managing the threat and asset response for the integrated defense of the Intelligence Community (IC) information environment through the Intelligence Community Security Coordination Center, in conjunction with IC mission partners and with support from other Federal agencies, as appropriate.

    IV.  Implementation and Assessment

    Federal agencies shall take the following actions to implement this directive:

    A. Charter 

    Within 90 days of the date of this directive, the National Security Council (NSC) staff shall update the CRG charter to account for and support the policy set forth herein, which shall be submitted to the President through the Assistant to the President for Homeland Security and Counterterrorism.

    B. Enhanced Coordination Procedures

    Each Federal agency that regularly participates in the CRG, including SSAs, shall ensure that it has the standing capacity to execute its role in cyber incident response.  To prepare for situations in which the demands of a significant cyber incident exceed its standing capacity, each such agency shall, within 90 days of the date of this directive, establish enhanced coordination procedures that, when activated, bring dedicated leadership, supporting personnel, facilities (physical and communications), and internal processes enabling it to manage a significant cyber incident under demands that would exceed its capacity to coordinate under normal operating conditions.

    Within 90 days of the date of this directive, the SSAs shall develop or update sector-specific procedures, as needed and in consultation with the sector(s), for enhanced coordination to support response to a significant cyber incident, consistent with this directive.

    Enhanced coordination procedures shall identify the appropriate pathways for communicating with other Federal agencies during a significant cyber incident, including the relevant agency points-of-contact, and for notifying the CRG that enhanced coordination procedures were activated or initiated; highlight internal communications and decisionmaking processes that are consistent with effective incident coordination; and outline processes for maintaining these procedures.

    In addition, each Federal agency’s enhanced coordination procedures shall identify the agency’s processes and existing capabilities to coordinate cyber incident response activities in a manner consistent with this directive.  The procedures shall identify a trained senior executive to oversee that agency’s participation in a Cyber UCG.  SSAs shall have a trained senior executive for each of the sectors for which it is the designated SSA under Presidential Policy Directive 21.

    Within 120 days of the date of this directive, the SSAs shall coordinate with critical infrastructure owners and operators to synchronize sector-specific planning consistent with this directive.

    C. Training 

    Within 150 days of the date of this directive, the Federal Emergency Management Agency shall make necessary updates to its existing Unified Coordination training to incorporate the tenets of this directive.

    Within 150 days of the date of this directive, Federal agencies shall update cyber incident coordination training to incorporate the tenets of this directive.

    Federal agencies shall identify and maintain a cadre of personnel qualified and trained in the National Incident Management System and Unified Coordination to manage and respond to a significant cyber incident.  These personnel will provide necessary expertise to support tasking and decisionmaking by a Cyber UCG.

    D. Exercises 

    Within 180 days of the date of this directive, Federal agencies shall incorporate the tenets of this policy in cyber incident response exercises.  This will include exercises conducted as part of the National Exercise Program.  Exercises shall be conducted at a frequency necessary to ensure Federal agencies are prepared to execute the plans and procedures called for under this directive.  When appropriate, exercises shall consider the effectiveness of the end-to-end information sharing process.

    E. Cyber UCG Post-Incident Review 

    Upon dissolution of each Cyber UCG, the Chair of the CRG shall direct a review of a Cyber UCG’s response to a significant cyber incident at issue and the preparation of a report based on that review to be provided to the CRG within 30 days.  Federal agencies shall modify any plans or procedures for which they are responsible under this directive as appropriate or necessary in light of that report.

    F. National Cyber Incident Response Plan

    Within 180 days of the date of this directive, DHS and DOJ, in coordination with the SSAs, shall submit a concept of operations for the Cyber UCG to the President, through the Assistant to the President for Homeland Security and Counterterrorism and the Director of OMB, that is consistent with the principles, policies, and coordination architecture set forth in this directive.  This concept of operations shall further develop how the Cyber UCG and field elements of the Federal coordination architecture will work in practice for significant cyber incidents, including mechanisms for coordinating with Federal agencies managing the physical effects of an incident that has both cyber and physical elements and for integration of private sector entities in response activities when appropriate.  The Secretary of Homeland Security shall, as appropriate, incorporate or reference this concept of operations in the Cyber Incident Annex required by section 205 of the Cybersecurity Act of 2015.

    Within 180 days of the date of this directive, the Secretary of Homeland Security, in coordination with the Attorney General, the Secretary of Defense, and the SSAs, shall submit a national cyber incident response plan to address cybersecurity risks to critical infrastructure to the President, through the Assistant to the President for Homeland Security and Counterterrorism and the Director of OMB, that is consistent with the principles, policies, and coordination architecture set forth in this directive.  The Secretary of Homeland Security shall ensure that the plan satisfies section 7 of the National Cybersecurity Protection Act of 2014.  This plan shall be developed in consultation with SLTT governments, sector coordinating councils, information sharing and analysis organizations, owners and operators of critical infrastructure, and other appropriate entities and individuals.  The plan shall take into account how these stakeholders will coordinate with Federal agencies to mitigate, respond to, and recover from cyber incidents affecting critical infrastructure.

    Presidential Directive 5, Presidential Directive 51, Presidential Directive 59, Presidential Directive 8, Presidential Directive 62, Presidential Directive 21, Presidential Directive Definition, Presidential Directive 58, Presidential Directive 40, Presidential Directive 25, Presidential Directive Active Shooter, Presidential Policy Directive Africa, Presidential Directive For Age Relaxation, Presidential Directive Mass Atrocities, Presidential Directive On Arctic Region Policy, Difference Between Presidential Directive And Executive Order, Is A Presidential Directive A Law, Presidential Study Directive 11 August 2010, Presidential Decision Directive 62 And 63, Afghanistan Presidential Directive 62, Presidential Directive Cyber Security, Presidential Directive Cyber Security Critical Infrastructure, Presidential Directive Cuba, Presidential Directive Critical Infrastructure, Presidential Directive Coal, Presidential Directive Christmas Eve, Presidential Directive Carrying The Force Of Law, Presidential Directive To Coal India, Presidential Directive 20 Cyber, Presidential Directive Data Center Consolidation, Presidential Directive Definition, Presidential Directive Data Center Consolidation, Presidential Directive Decision, Presidential Directive Decision 25, Presidential Directive Drones, Presidential Decision Directive 39, Presidential Decision Directive 63, Presidential Decision Directive 67, Presidential Decision Directive 62, Presidential Decision Directive 51, Presidential Directive Emergency Management, Presidential Directive Electronic Records, Presidential Directive Vs Executive Order, Presidential Directive Christmas Eve, Presidential Policy Directive Executive Order 13636, Presidential Directive For Records Management, Presidential Directive For Nims, Presidential Directive For Age Relaxation, Presidential Directive Fema, Presidential Flag Directive, Presidential Policy Directive For Sub-saharan Africa, Presidential Directive On Reservation For Obc In Pses, Presidential Directive Carrying The Force Of Law, Which Presidential Directive(s) Focused On Cyberspace Security, Presidential Policy Directive 21 Federal Register, Presidential Directive On Government Contracting, Presidential Directive Managing Government Records, Presidential Policy Directive Global Development, Presidential Policy Directive On Global Development (Ppd-6), Presidential Directive Hspd 12, Presidential Directive Hspd-5, Presidential Directive Hspd-7, Presidential Directive Homeland Security, Presidential Directive That Has The Force Of Law, National Security Presidential Directive Human Trafficking, Presidential Directive Nspd 51 Hspd 20, Presidential Directive Meaning In Hindi, Homeland Presidential Directive 8, Hs Presidential Directive 7, Presidential Directive Insider Threat, Presidential Directive Immigration, Presidential Directive India, Presidential Directive Ics, Presidential Directive Critical Infrastructure, Presidential Directive On Information Sharing, Presidential Policy Directive Immigration, Presidential Directive Meaning In Hindi, Presidential Directive To Coal India, Presidential Policy Directive 19 In October 2012, Presidential Directive List, Presidential Policy Directive List, Presidential Directive M-12-18, Presidential Directive Mass Atrocities, Presidential Directive Meaning In Hindi, Presidential Directive Emergency Management, Presidential Policy Directive 18 Maritime Security, Presidential Study Directive On Mass Atrocities, Presidential Directive Nims, Presidential Directive Nsc-63, Presidential Directive Not Requiring Congressional Approval, Presidential Directive Nspd 51 Hspd 20, Presidential Directive Number 54, Presidential Decision Directive Nsc-12, Presidential Decision Directive\/nsc-63, Presidential Directive Safeguarding National Security, Presidential Decision Directive Nstc-7, Presidential Policy Directive National Preparedness, Presidential Directive On Government Contracting, Presidential Directive On Cuba, Presidential Directive On Cyber Security, Presidential Directive On Managing Government Records, Presidential Directive On Information Sharing, Presidential Directive On Immigration, Presidential Directive Open Data, Presidential Directive On Reservation For Obc In Pses, Presidential Directive On Insider Threat, Presidential Directive On Climate Change, Presidential Directive Philippines, Presidential Directive Pdd-63, Presidential Directive Pdd 51, Presidential Directive Paperless, Presidential Directive Ppd-21, Presidential Directive Peacekeeping, Presidential Policy Directive 20, Presidential Policy Directive 8, Presidential Policy Directive, Presidential Policy Directive 28, Presidential Directive Records Management, Presidential Review Directive 5, Presidential Review Directive, Presidential Directive On Reservation For Obc In Pses, Presidential Directive Not Requiring Congressional Approval, Presidential Directive For Age Relaxation, Presidential Directive On Arctic Region Policy, Presidential Directive Safeguarding National Security, Presidential Study Directive 11, Presidential Study Directive, Presidential Study Directive-11 Or Psd-11, Presidential Study Directive 1, Presidential Study Directive 10, Presidential Study Directive 9, Presidential Study Directive-11 Pdf, Presidential Study Directive 11 August 2010, Presidential Study Directive 8, Presidential Directive Trump, Presidential Directive To Coal India, Presidential Directive Telework, Presidential Directive To Cil, Presidential Directive That Has The Force Of Law, A Presidential Directive To An Agency That Orders, Presidential Directive Insider Threat, Presidential Directive Carrying The Force Of Law, Presidential Directive 51 Text, Us Presidential Directive, Presidential Directive Vs Executive Order, Presidential Directive W199i, Presidential Directive Wmd, Presidential Decision Directive W199i, Presidential Policy Directive Wiki, Presidential Directive 59 Wiki, Presidential Policy Directive What Is, Which Presidential Directive(s) Focused On Cyberspace Security, Presidential Policy Directive 8 White House, Presidential Policy Directive 8 Wiki, Presidential Policy Directive 20 Washington Post, National Security Presidential Directive Zero Tolerance, Cybercrime Definition, Cybercrime Statistics, Cybercrime Prevention, Cybercrime Articles, Cybercrime Jobs, Cybercrime Law, Cybercrime Statistics 2017, Cyber Crime Cases, Cyber Crime News, Cybercrime Topics, Cybercrime Articles, Cybercrime And Security, Cybercrime As A Service, Cybercrime And Digital Forensics An Introduction, Cybercrime And Digital Forensics, Cybercrime And Society, Cybercrime And Terrorism, Cybercrime Attacks, Cybercrime Act, Cybercrime Against Businesses, Cyber Crime Batman, Cyber Crime Book, Cybercrime Blog, Cybercrime Bill, Cybercrime Banks, Cybercrime Background, Cyber Crime By Country, Cybercrime Bangalore, Cybercrime Billion Dollar Industry, Cybercrime Background Information, Cyber Crime Cases, Cybercrime Certification, Cybercrime Convention, Cybercrime Careers, Cybercrime Cost, Cybercrime Cafe, Cybercrime Cost 2016, Cybercrime China, Cybercrime Conference, Cybercrime Conclusion, Cybercrime Definition, Cybercrime Definition Computer, Cybercrime Definition Fbi, Cyber Crime Data, Cybercrime Degrees, Cybercrime Definition Pdf, Cybercrime Database, Cyber Crime Detective, Cyber Crime Documentary, Cyber Crime Department, Cybercrime Example, Cyber Crime Essay, Cybercrime Effects, Cybercrime Events, Cybercrime Enforcement, Cybercrime Economy, Cyber Crime Ethics, Cybercrime Effects On Business, Cybercrime Ecosystem, Cybercrime Enforcement Training Assistance Act, Cybercrime Facts, Cybercrime Fbi, Cybercrime Forensics, Cybercrime Forum, Cybercrime Forensics Training Center, Cybercrime Federal Laws, Cyber Crime Fiction, Cybercrime Financial Services, Cybercrime Future Trends, Cybercrime Fiji, Cybercrime Gets Personal Money Magazine, Cybercrime Gets Personal, Cybercrime Growth, Cyber Crime Graph, Cybercrime Groups, Cybercrime Government, Cybercrime Global Statistics, Cyber Crime Gov, Cyber Crime Games, Cybercrime Gif, Cybercrime Hacking, Cyber Crime History, Cybercrime Help, Cybercrime Healthcare, Cybercrime Hyderabad, Cybercrime How To Report, Cyber Crime Hotline, Cybercrime Hacking News, Cyber Crime Head Office India, Cybercrime Hacking And Cracking, Cybercrime Identity Theft, Cybercrime In The Us, Cyber Crime Investigation, Cybercrime Images, Cyber Crime Insurance, Cybercrime Is Also Known As, Cybercrime Investigating High-technology Computer Crime, Cybercrime Infographic, Cybercrime Information, Cyber Crime In Russia, Cybercrime Jobs, Cybercrime Jurisdiction, Cybercrime Journal Articles, Cybercrime Job Description, Cybercrime Jobs Salary, Cybercrime Job Openings, Cybercrime Jobs In Chennai, Cybercrime Job Qualification, Cybercrime Journal Articles Pdf, Cyber Crime Jamaica, Cybercrime Kenya, Cybercrime Key Issues And Debates, Cybercrime Kuwait, Cybercrime Ki Dhara, Cybercrime Key Issues And Debates Pdf, Cybercrime Kasus, Cyber Crime Karnataka, Cybercrime Kartu Kredit, Cybercrime Kolkata, Cyber Crime Karachi, Cybercrime Law, Cybercrime Laws In Usa, Cybercrime Law Enforcement, Cybercrime Laws Of The United States, Cybercrime List, Cybercrime Legislation Us, Cybercrime Laws In Florida, Cybercrime Legal Issues, Cybercrime Law Outline, Cyber Crime Lesson Plans, Cybercrime Meaning, Cyber Crime Movies, Cybercrime Methods, Cybercrime Methodology, Cyber Crime Money, Cybercrime Markets, Cyber Crime Magazine, Cyber Crime Most Wanted, Cybercrime Meaning In Tamil, Cybercrime Masters Degree, Cyber Crime News, Cyber Crime News Articles, Cyber Crime News Articles 2017, Cyber Crime Netflix, Cybercrime Nigeria, Cyber Crime Novels, Cybercrime Number, Cybercrime Nhs, Cyber Crime News Philippines, Cybercrime Nbi, Cybercrime Or Cyber Crime, Cybercrime Organizations, Cybercrime On The Rise, Cybercrime On The High Seas, Cybercrime Offenses, Cyber Crime Outline, Cybercrime Office, Cybercrime Office In Ahmedabad, Cybercrime Office In Patna, Cybercrime Office In Nashik, Cybercrime Quotes, Cyber Crime Quizlet, Cybercrime Questions, Cyber Crime Quiz, Cybercrime Questionnaire, Cybercrime Question Paper, Cybercrime Qatar, Cybercrime Question And Answers, Cybercrime Report, Cybercrime Research Paper, Cyber Crime Rates, Cyber Crime Recent, Cybercrime Research Topics, Cybercrime Research, Cybercrime Reported To The Ic3, Cybercrime Resources, Cybercrime Riding Tax Season Tides, Cyber Crime Report 2016, Cybercrime Statistics, Cybercrime Statistics 2017, Cyber Crime Stories, Cybercrime Spyware, Cybercrime Statistics 2015, Cybercrime Security, Cybercrime Solutions, Cybercrime Salary, Cybercrime Small Business, Cyber Crime Synonym, Cybercrime Topics, Cybercrime Trends, Cybercrime Tracker, Cybercrime Treaty, Cyber Crime Types, Cybercrime Training, Cybercrime Threats, Cybercrime Tools, Cybercrime Terms, Cybercrime The Transformation Of Crime In The Information Age, Cyber Crime Unit, Cybercrime Us, Cybercrime Uk, Cybercrime Uae, Cybercrime University, Cybercrime Un, Cyber Crime Unit Mauritius, Cyber Crime Unit Malta, Cybercrime Uc, Cybercrime Unodc, Cybercrime Victims, Cybercrime Vs Traditional Crime, Cybercrime Videos, Cybercrime Vs Traditional Crime Statistics, Cybercrime Virus, Cyber Crime Vocabulary, Cybercrime Vs Traditional Crime Punishment, Cybercrime Vs Computer Crime, Cybercrime Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cybercrime Wiki, Cybercrime Worm, Cybercrime World Wide War 3.0, Cyber Crime Websites, Cyber Crime Worksheet, Cybercrime Wallpaper, Cyber Crime Worldwide, Cybercrime Working Group, Cyber Crime What Is It, Cybercrime Wikipedia Indonesia, Cybercrime X-remote Download, Tedx Cybercrime, Cyber Crime Youtube, Cyber Crime Yahoo, Cyber Crime Yahoo Answers, Cyber Crime Yesterday, Cyber Crime Youth, Cybercrime Yang Menyerang Hak Cipta, Cybercrime Yar, Youth Cyber Crime, Cyber Crime Yogyakarta, Cybercrime Yang Menyerang Pemerintah, Cybercrime Zimbabwe, Cybercrime Zeus, Cybercrime Zimbra, Zurich Cyber Crime, Zimbabwe Cybercrime Bill, Cyber Crime In Zambia, New Zealand Cyber Crime, Los Zetas Cybercrime, Cybercrime Law In Zambia, Cyber Crime Cases In Zambia, Cyber Espionage Definition, Cyber Espionage Cases, Cyber Espionage China, Cyber Espionage Prevention, Cyber Espionage Russia, Cyber Espionage Pdf, Cyber Espionage The Chinese Threat, Cyber Espionage History, Cyber Espionage International Law, Cyber Espionage Cases 2016, Cyber Espionage Act, Cyber Espionage Articles, Cyber Espionage Attacks, Cyber Espionage Adalah, Cyber Espionage And International Law, Cyber Espionage Australia, Cyber Espionage And Cyber Warfare, Cyber Espionage Attack Methods, Cyber Espionage Books, Cyber Espionage Beyond The Rule Of Law, Cyber Espionage Business, Cyber Espionage By China, Cyber Espionage Brazil, Cyber Espionage By Chinese Actors, Cyber Espionage Blog, Cyber Espionage By Country, Bagaimana Cyber Espionage Dapat Muncul, Best Cyber Espionage Books, Cyber Espionage Cases, Cyber Espionage China, Cyber Espionage Cases 2016, Cyber Espionage Case Study, Cyber Espionage Cases 2017, Cyber Espionage Cases In India, Cyber Espionage Campaign, Cyber Espionage China Us, Cyber Espionage Cost, Cyber Espionage Canada, Cyber Espionage Definition, Cyber Espionage Documentary, Cyber Espionage Def, Cyber Espionage Definition Pdf, Economic Cyber Espionage Definition, Bagaimana Cyber Espionage Dapat Muncul, Why Is Cyber Espionage Difficult To Prevent, Contoh Kasus Cyber Espionage Di Indonesia, How Is Cyber Espionage Done, Dragonfly Cyber Espionage, Cyber Espionage Examples, Cyber Espionage Edward Snowden, Cyber Espionage Effects, Cyber Espionage Essay, Cyber Economic Espionage, Cyber Economic Espionage Accountability Act, Cyber Espionage In Middle East, Economic Cyber Espionage And International Law, Economic Cyber Espionage Definition, Explain Cyber Espionage, Cyber Espionage Facts, Cyber Espionage Fiction, Cyber Espionage First Case, Cyber Espionage F 35, Cyber Espionage Law Firms, Fbi Cyber Espionage, France Cyber Espionage, A Theory Of Cyber Espionage For The Intelligence Community, French Cyber Espionage, Flame Cyber Espionage, Cyber Espionage Groups, Cyber Espionage Germany, Cyber Espionage Georgia, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber-espionage A Growing Threat To The American Economy, Cyber Espionage Against Georgia, Cyber Espionage Against Georgian Government, What Are Cyber Espionage Groups Stealing From The United States, Cyber Espionage To Splinter Internet Governance, Global Cyber Espionage, Cyber Espionage History, Huawei Cyber Espionage, Hellsing Cyber Espionage, Cyber Espionage International Law, Cyber Espionage Incidents, Cyber Espionage India, Cyber Espionage Is Alive And Well, South African Cyber Espionage, Cyber Espionage In China, Cyber Espionage In Middle East, Cyber Espionage Iran, Cyber Espionage In Canada, Cyber Espionage Impact, Cyber Espionage Jobs, Cyber Espionage Japan, Cyber Espionage Kenya, Kaspersky Cyber Espionage, Kasus Cyber Espionage, Kasus Cyber Espionage Di Indonesia, Kejahatan Cyber Espionage, Karakteristik Cyber Espionage, Cyber Espionage Law, Cyber Espionage Law Firms, Cyber Espionage International Law, Cyber Espionage Definition Law, Cyber Espionage Is Reaching Crisis Levels, Pengertian Dari Cyber Espionage Lengkap, Le Cyber Espionnage Definition, Cyber Espionage Meaning, Cyber Espionage Movies, Cyber Espionage Methods, Cyber-espionage Nightmare – Mit Technology Review, Cyber Espionage Attack Methods, Cyber Espionage In Middle East, Chinese Cyber Espionage Mandiant, Chinese Cyber Espionage Map, Bagaimana Cyber Espionage Dapat Muncul, Military Cyber Espionage, Cyber Espionage News, Cyber Espionage North Korea, Cyber-espionage Nightmare, Cyber Espionage National Security, Cyber Espionage Novels, Cyber Espionage Nato, Ghostnet Cyber Espionage Network, Nsa Cyber Espionage, Nortel Cyber Espionage, Cyber Espionage Operations, Cyber Espionage Red October, Cyber Espionage And Cyber Espionage, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber Espionage Prevention, Cyber Espionage Pdf, Cyber Espionage Ppt, Cyber Espionage Pronunciation, Cyber Espionage Presentation, Cyber Espionage Pictures, Cyber Espionage Problems, Cyber Espionage Purpose, Cyber Espionage Ppt Slideshare, Cyber Espionage Research Paper, Cyber Espionage Quotes, Cyber Espionage Research Questions, Cyber Espionage Russia, Cyber Espionage Research Paper, Cyber Espionage Rule Of Law, Cyber Espionage Report, Cyber Espionage Red October, Cyber Espionage Research Questions, Cyber Espionage Ring, Cyber Espionage Is Reaching Crisis Levels, Cyber Espionage Techrepublic, Russian Cyber Espionage, Cyber Espionage Statistics, Cyber Espionage Synonym, Cyber Espionage Simulator, Cyber Espionage Security Issues, Cyber Espionage Statistics 2015, Cybersecurity Espionage, Espionage In Cyberspace, Cyber Espionage Case Study, Cyber Espionage To Splinter Internet Governance, South African Cyber Espionage, Cyber Espionage The Chinese Threat, Cyber Espionage Threat, Cyber Espionage Tools, Cyber Espionage Trends, Cyber Espionage The Chinese Threat Case Study, Cyber Espionage To Splinter Internet Governance, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber Espionage Thesis, Cyber Espionage Training, Cyber Espionage Tactics, Cyber Espionage Uk, Us Cyber Espionage, Cyber Espionage Un, Cyber Espionage Us China, China’s Cyber Espionage Units, Russian Cyber Espionage Under The Microscope, China Cyber Espionage And U.s. National Security, Pla Cyber Espionage Unit, Cyber Espionage Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cyber Espionage Vs Cyber Attack, Cyber Espionage Virus, Cyber Espionage Wiki, Cyber Espionage & Warfare, Cyber Weapons Espionage, Cyber Espionage Vs Cyber Warfare, Cyber Espionage And Cyber Warfare Definition, Cyber Espionage Youtube

    Im “GoMoPa”-Netzwerk: Doggiestyle Fan: Mark “GoMoPa”-Vize Vornkahl

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

     

    Die Verurteilung von Klaus Maurischat und Mark Vornkahl wegen Betruges am eigenen Anleger

    Klaus Maurischat und Mark Vornkahl, Betreiber vonwww.gomopa.net: Am 24. April 2006 war die Verhandlung am Amtsgericht Krefeld in der Betrugssache: Mark Vornkahl / Klaus Maurischat ./. Dehnfeld. Aktenzeichen: 28 Ls 85/05 Klaus MaurischatLange Straße 3827313 Dörverden.Das in diesem Verfahren ausschließlich diese Betrugsache verhandelt wurde, ist das Urteil gegen Klaus Maurischat recht mäßig ausgefallen.Zusammenfassung der Verhandlung vom 24.04.2006 vor dem Schöffengericht des AG Krefeld in der Sache gegen Klaus Maurischat und Mark Vornkahl.Zur Hauptverhandlung erschienen:Richter Dr. Meister, 2 Schöffen,Staatsanwalt, Angeklagter Klaus Maurischat, vertr. durch RA Meier, Berlin; aus der U-Haft zur Verhandlung überführt.1. Eine Gerichtsvollzieherin stellt unter Ausschuss der Öffentlichkeit eine Urkunde an den Angeklagten Maurischat zu.2. Bei Mark Vornkahl wurde im Gerichtssaal eineTaschenpfändung vorgenommen.Beginn der HauptverhandlungDie Beklagten verzichten auf eine Einlassung zu Beginn.Nach Befragung des Zeugen Denfeld zum Sachverhalt wurde dieVerhandlung auf Wunsch der Staatsanwaltschaft und den Verteidigern unterbrochen.Der Angeklagte Maurischat gab nach Fortsetzung derHauptverhandlung Folgendes zu Protokoll:Er sähe ein, dass das Geld auf das falsche Konto gegangen sei und nicht dem eigentlichen Verwendungszweck zugeführt wurde. Das Geld sei aber zurückgezahlt worden und er distanziere sich ausdrücklich von einem Betrug.Schließung der BeweisaufnahmeDer Staatsanwalt verließt sein PlädoyerEr halte am Vorwurf des Betruges fest. Mit Hinweis auf die einschlägigen Vorstrafen des Angekl. Maurischatund auf laufende Ermittlungsverfahren, beantrage er ein Strafmaß von 1 Jahr und 6 Monaten.Er halte dem Angeklagten zu Gute, dass dieserWiedergutmachung geleistet habe, und dass dieser geständig war. Zudem läge die letzte Verurteilung wegen Betruges 11 Jahre zurück. Auch sei der Geschädigte nicht in existentielle Not geraten, wobei der Staatsanwalt nicht über noch laufende Verfahren hinweg sehen könne. Er läge aber dem Angeklagten Maurischat nahe, keine weiteren Aktivitäten im Bezirk der Staatsanwaltschaft Krefeld auszuüben, insbesondere möchte er, dass keine weiteren Anleger im Bezirk der Staatsanwaltschaft Krefeld durch GoMoPa akquiriert werden.Die Freiheitsstrafe soll zur Bewährung ausgesetzt werden.Plädoyer des Verteidigers des Angekl. Maurischat, Herrn RA MeierEr schließe sich, wie (in der Unterbrechung) vereinbart, dem Staatsanwalt an.Es stimme, dass sein Mandant Fehler in seiner Vergangenheit gemacht habe, und dass er auch diesmal einen Fehler begangen haben könnte, jedoch sei der Hinweis wichtig, dass sein Mandant aus diesen Fehlern gelernt habe.Der Angeklagte haben das letzte Wort.Maurischat sagt, es sei bereits alles gesagt worden.Unterbrechung zu Hauptverhandlung. Der Richter zieht sich mit den Schöffen zur Beratung zurück.Urteilsverkündung:Der Angeklagte wird des gemeinschaftlichen Betrugs für schuldig befunden.Der Angeklagte Klaus Maurischat wird zu einerFreiheitsstrafe von 1 Jahr und 6 Monaten verurteilt. Diese wird zur Bewährung ausgesetzt.Die Bewährungszeit wird auf 3 Jahre festgesetzt.Der Haftbefehl gegen Klaus Maurischat wird aufgehoben.Der Angeklagte trage die Kosten des Verfahrens.UrteilsbegründungDer Richter erklärt, dass eine Täuschung des Geschädigtenvorliegt und somit keine Untreue in Betracht kommen kann.Die Fragen, ob es sich um einen Anlagebetrug handele sei irrelevant. Er hält den Angeklagten die geleistete Wiedergutmachung zu Gute.Ebenso ist das Geständnis für die Angeklagten zu werten. Zudem liegt die letzte Verurteilung des Angeklagten Maurischat 11 Jahre zurück.Die Parteien verzichten auf Rechtsmittel. Das Urteil ist somit rechtskräftig.Mit dem heutigen Urteil endet ein Kapitel in derBetrugssache Goldman Morgenstern & Partners, Klaus Maurischat und Mark Vornkahl.Alle GoMoPa.net Verantwortlichen, Maurischat, Vornkahl und Henneberg sind nun vorbestrafte Abzocker und Betrüger und die Zukunft der Pseudoklitsche GoMoPa.net sieht duster aus.

    Mit dem Geständnis der beiden ABZOCKER MAURISCHAT UND VORNKAHL vor Gericht bricht ein jahrelang aufrechterhaltenes Lügengeflecht von einigen primitiven Betrügern zusammen. Gewohnheitsverbrecher und Denunzianten,die rechtschaffene Personen und Firmen in ihren Verbrecherforen kriminalisierten.

    Aktz. Eintragung
    HRB 161099 B AG Charlottenburg (Berlin)
     

    03.09.2014: HRB 161099 B: Scoredex GmbH, Niederlassung Deutschland, Berlin, Tempelhofer Ufer 23/14, 10963 Berlin. Firma: Scoredex GmbH, Niederlassung Deutschland; Sitz / Zweigniederlassung: Berlin; Geschäftsansch…

    HRB 114153 B AG Charlottenburg (Berlin)
     

    03.03.2011: GoMoPa GmbH, Berlin, Unter den Linden 21, 10117 Berlin. Nicht mehr Geschäftsführer:; 1. Reski, Peter; Geschäftsführer:; 2. Vornkahl, Mark, *XX.XX.XXXX, New York/USA; mit der Befugnis die Gesellschaft …

    “GOMOPA”-NETZWERK: Hanffreund und “GoMoPa”-Beirat Schillo

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Matthias Schillo

    Matthias Schillo

    1949 im Saarland geboren, war er als Redakteur bei der Augsburger Allgemeinen Zeitung und Mitarbeiter des Senders Freies Berlin tätig. In München und Berlin studierte er Jura, und war bis 1996, mit Zwischenstationen in Ministerien und bei der Treuhandanstalt, als Richter zuletzt am Kammergericht (Oberlandesgericht) Berlin tätig. Seit 1996 ist Matthias Schillo als Rechtsanwalt in Potsdam ansässig.

    Mitte und Ende der Neunziger vertrat Schillo die Deutsch-Koreanerin Mun-ju Kim, die in Berlin lebt. Wie viele Asiaten kann Kim weder Wein, Bier noch sonstige alkoholhaltige Getränke konsumieren, da ihr das entscheidende Enzym fehlt, um den Alkohol auch wieder abzubauen. Kiffen ist für sie die einzige Alternative. Die Klage scheiterte letztlich an der langen Verfahrensdauer und den benötigten finanziellen Mitteln. Weiterhin engagierte sich Schillo im Nutzhanfbereich mit der Treuhanf AG und war Vorsitzender der Hanfgesellschaft e.V.
    Aktuell klagt der Cannabispatient Günther Weiglein mit Schillo gegen das BfArM, um eine Genehmigung (§3 BtMG) für den Anbau von Cannabis für den medizinischen Eigenbedarf zu erhalten. Aktuell bereiten sie sich auf die 2. Instanz vor, weil das BMG die Niederlage vor dem Landgericht nicht hinnehmen will.

    http://www.hanfmuseum.de/wiedersehen-mit-der-hanfbewegung-anno-1994-04-12-2014

    Unveiled – Boston Fusion Center Bulletin: Terror Attacks on Entertainment Venues

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Terror Attacks on Entertainment Venues

    Page Count: 6 pages
    Date: February 3, 2016
    Restriction: Not for Public Release
    Originating Organization: Boston Regional Intelligence Center
    File Type: pdf
    File Size: 539,409 bytes
    File Hash (SHA-256): D63AB6330CC5F99C768B72209992850F0AA1D6B7170D6E7E71871DCB394628DD

    Download File

    Several recent incidents underline the possibility that soft targets, including entertainment venues such as bars and restaurants, are increasingly chosen over hard targets that may hold more significance to the victims and the attacking person or group. Using analysis of recent events and data from the START Global Terrorism Database, the BRIC completed the following study to raise awareness regarding the targeting of entertainment venues by violent extremist groups.

    (U//NP) OVERVIEW

    The 13 November 2015 Paris attack materialized recent messaging by violent extremist groups such as the Islamic State of Iraq and the Levant (ISIL) and al-Qa’ida in the Arabian Peninsula (AQAP) that emphasizes attacks against targets of opportunity. ISIL propaganda openly encourages sympathizers to strike wherever possible with whatever means the attacker has available to him or her. Entertainment venues, bars, and restaurants can be found everywhere in the US and are publicly accessible or lightly defended, making them a logical choice for a would-be attacker inspired by this type of propaganda.

    Though most attacks against entertainment venues during the time period studied in this analysis (1990-2014) were committed by violent Islamist groups such as al-Qa’ida and its affiliates, it should be noted that extremist groups and individuals motivated by a number of distinct ideologies have also selected entertainment venues as targets. Irish Republican Army (IRA) attacks in the UK and the American anti-abortion extremist group Army of God illustrate the different motivations of terrorist groups that have chosen to target bars, restaurants, and other lightly secured places where people gather.

    Though North America and Western Europe have seen lower numbers of entertainment venue attacks in recent years, there is concern several factors may increase the vulnerability of these locations. Extensive media attention given to recent attacks such as the November attack in Paris, the prevalence of terrorist propaganda suggesting these venues as targets, and the prevalence of frequent smaller attacks committed by inspired groups and individuals all suggest that entertainment venues are likely to be considered as potential targets by violent extremist groups in the near future.

    (U//NP) ANALYSIS

    This analysis used data from 1990 to 2014 from the START Global Terrorism Database. Analysts chose to limit the years studied to 1990-2014 to focus on more recent trends.

    From 1990-2014, the Database recorded 100,964 total terror attacks throughout the world. Of those attacks, 1,510 were on entertainment venues.

    BRIC-EntertainmentVenueAttacks-1

     

     

    Boston Market, Boston Celtics, Boston Red Sox, Boston Terrier, Boston Weather, Boston University, Boston Globe, Boston Market Menu, Boston Proper, Boston College, Boston Airport, Boston Aquarium, Boston Accent, Boston Acoustics, Boston Area Code, Boston Apartments, Boston Airport Map, Boston Attractions, Boston Augustana, Boston Album, Boston Bruins, Boston Bombing, Boston Band, Boston Bomber, Boston Baked Beans, Boston Butt, Boston Bruins Roster, Boston Beer Company, Boston Bombing Movie, Boston Baked Beans Candy, Boston Celtics, Boston College, Boston Com, Boston Cooler, Boston Celtics News, Boston Celtics Roster, Boston Cream Pie, Boston Celtics Score, Boston Consulting Group, Boston Calling, Boston Dynamics, Boston Duck Tours, Boston Drummer, Boston Dte, Boston Detroit, Boston Doctors Murdered, Boston Dynamics Stock, Boston Demographics, Boston Dynamics Robot, Boston Discography, Boston Edison, Boston Edison Homes For Sale, Boston Express, Boston Edison Home Tour, Boston Events, Boston Edison Apartments, Boston Express Schedule, Boston Ems, Boston Edison Detroit Zillow, Boston England, Boston Fern, Boston Freedom Trail, Boston Fire, Boston Flights, Boston Forecast, Boston Food, Boston Fire Department, Boston Fish Market, Boston Fern Cats, Boston Flag, Boston Globe, Boston George, Boston Globe Sports, Boston Garden, Boston Globe Obituaries, Boston Game, Boston Gear, Boston Group, Boston Greatest Hits, Boston Go Card, Boston Herald, Boston Hotels, Boston Harbor Hotel, Boston Harbor, Boston Heights Ohio, Boston Hockey, Boston Hospitals, Boston Harbor Islands, Boston Hostel, Boston Hotel Deals, Boston Ivy, Boston Interiors, Boston Ivf, Boston International, Boston Iced Tea, Boston In Concert, Boston Images, Boston Intercontinental, Boston In The Fall, Boston Irish, Boston Jobs, Boston Joan Jett Dte, Boston Joan Jett, Boston Jersey, Boston Jokes, Boston June 2017, Boston Jazz Clubs, Boston Jr Bruins, Boston Jane, Boston July 4th, Boston Kreme, Boston Kreme Donut, Boston Killer, Boston Key, Boston Korea, Boston Ky, Boston King, Boston Koa, Boston Kitchen, Boston Keratoprosthesis, Boston Legal, Boston Logan Airport, Boston Lettuce, Boston Lager, Boston Legal Cast, Boston Latin School, Boston Lyrics, Boston Lead Singer, Boston Logan Airport Map, Boston Leather, Boston Market, Boston Market Menu, Boston Massacre, Boston Marathon, Boston Market Near Me, Boston Massachusetts, Boston Marathon Bombers, Boston Market Coupons, Boston Marathon Movie, Boston Marathon Qualifying Times, Boston News, Boston Newspaper, Boston Neighborhoods, Boston New York, Boston North End, Boston Nba, Boston Naming Test, Boston Nightlife, Boston Neighborhood Map, Boston Nicknames, Boston Opera House, Boston Ohio, Boston Omni Parker House Hotel, Boston On Map, Boston Orioles Bird, Boston Oriole, Boston Overlap Brace, Boston Orchestra, Boston On Tour, Boston Ottawa, Boston Proper, Boston Public, Boston Park Plaza, Boston Public Library, Boston Population, Boston Pizza, Boston Pops, Boston Proper Coupon Codes, Boston Public Schools, Boston Pizza Near Me, Boston Qualifying Times 2018, Boston Qualifying Times 2017, Boston Qualifying Marathons, Boston Quincy Market, Boston Quotes, Boston Quincy Marriott, Boston Qualifying Pace, Boston Quincy, Boston Qualifier Shirt, Boston Quackie, Boston Red Sox, Boston Red Sox Schedule, Boston Red Sox Roster, Boston Red Sox Tickets, Boston Rob, Boston Russell, Boston Red Sox Trade Rumors, Boston Roll, Boston Restaurants, Boston Red Sox News, Boston Sports Journal, Boston Scientific, Boston Songs, Boston Score, Boston Strangler, Boston Stoker, Boston Store, Boston Skyline, Boston Subway Map, Boston Subway, Boston Terrier, Boston Tea Room, Boston Tea Party, Boston Terrier Puppies, Boston Time, Boston To Detroit, Boston Tour, Boston Things To Do, Boston The Band, Boston Terrier Puppies Michigan, Boston University, Boston University Acceptance Rate, Boston University Tuition, Boston University Ranking, Boston University School Of Medicine, Boston University Pa Program, Boston University Campus, Boston University Medical School, Boston University Address, Boston University Online, Boston Vs Washington, Boston Vs Chicago, Boston Vs Cleveland, Boston Vs, Boston Vs Wizards, Boston Vacation, Boston Vs Bulls, Boston Vs Cavs, Boston Valve, Boston Vs Celtics, Boston Weather, Boston Whaler, Boston Whaler For Sale, Boston Weather Radar, Boston Whaler Outrage, Boston Washington, Boston Weather Today, Boston Whaler For Sale Michigan, Boston Whale Watching, Boston White Sox, Boston Xo, Boston Xo2, Boston X, Boston Xfinity Center, Boston Celtics, Boston Xv Beacon, Boston Xb2, Boston Xb4, Boston Xfinity, Boston Xb6, Boston Youtube, Boston Yacht Haven, Boston Ymca, Boston Yacht Club, Boston Yelp, Boston Yoga, Boston Yanks, Boston Yearly Weather, Boston Youth Hostel, Boston Yorkie, Boston Zip Code, Boston Zoo, Boston Zillow, Boston Zip Codes List, Boston Z Scores, Boston Zoning Map, Boston Zoning Code, Boston Zoning, Boston Zipcar, Boston Zipline, Terror Attacks In Poland, Terror Attacks In The Us, Terror Attacks In Europe, Terror Attacks 2017, Terror Attacks Today, Terror Attacks In France, Terror Attacks By Religion, Terror Attacks In London, Terror Attacks In Germany, Terror Attacks In Japan, Terror Attacks Around The World, Terror Attacks April 2017, Terror Attacks After 9\/11, Terror Attacks Australia, Terror Attacks Abroad, Terror Attacks At Concert, Terror Attacks America, Terror Attacks Around The World 2017, Terror Attacks Africa, Terror Attacks Around The World Today, Terror Attacks By Religion, Terror Attacks By Refugees, Terror Attacks By Ideology, Terror Attacks By Country, Terror Attacks By Isis, Terror Attacks By Refugees In Europe, Terror Attacks By Year, Terror Attacks By Syrian Refugees, Terror Attacks By Christian Groups, Terror Attacks By American Citizens, Terror Attacks Committed By Refugees, Terror Attacks Committed By Refugees In Europe, Terror Attacks Canada, Terror Attacks China, Terror Attacks Chart, Terror Attacks Claimed By Isis, Terror Attacks Committed By Immigrants, Terror Attacks Caught On Camera, Terror Attacks Caught On Video, Terror Attacks Caused By Refugees, Terror Attacks During Ramadan, Terror Attacks During Ramadan 2017, Terror Attacks During Ramadan 2016, Terror Attacks Database, Terror Attacks Dubai, Terror Attacks December 2016, Terror Attacks Documentary, Terror Attacks Data, Terror Attacks Dates, Terror Attacks Done By Refugees, Terror Attacks Europe, Terror Attacks England, Terror Attacks Europe Map, Terror Attacks Europe 2017, Terror Attacks Egypt, Terror Attacks England 2017, Terror Attacks Europe Poland, Terror Attacks Europe Statistics, Terror Attacks Egypt 2017, Terror Attacks Election, Terror Attacks France, Terror Attacks From Refugees, Terror Attacks France 2016, Terror Attacks France 2017, Terror Attacks Fox News, Terror Attacks Foiled, Terror Attacks Facts, Terror Attacks False Flag, Terror Attacks From Banned Countries, Terror Attacks Foiled Uk, Terror Attacks Germany, Terror Attacks Graph, Terror Attacks Germany 2017, Terror Attacks Greece, Terror Attacks Great Britain, Terror Attacks Germany 2016, Terror Attacks Globally, Terror Attacks Glasgow, Terror Attacks Guardian, Terror Attacks General Election, Terror Attacks History, Terror Attacks Happening On The 22nd, Terror Attacks Hungary, Terror Attacks High Alert, Terror Attacks Hoax, Terror Attacks Houses Of Parliament, Terror Attacks Happening On 22nd Of Each Month, Terror Attacks Happening On The 22nd Of The Month, Terror Attacks In Poland, Terror Attacks In The Us, Terror Attacks In Europe, Terror Attacks In France, Terror Attacks In 2017, Terror Attacks In London, Terror Attacks In Germany, Terror Attacks In Japan, Terror Attacks In Poland Snopes, Terror Attacks In Europe Map, Terror Attacks June 2017, Terror Attacks Japan, Terror Attacks June 2015, Terror Attacks Jordan, Terror Attacks July 2016, Terror Attacks June 2016, Terror Attacks January 2017, Terror Attacks June 3rd, Terror Attacks June 3, Terror Attacks Jerusalem, Terror Attacks Kenya, Terror Attacks Kabul, Terror Attacks Kuwait, Terror Attacks Kill At Least 28 In Brussels, Terror Attacks Kenya 2015, Terror Attacks Kuala Lumpur, Terror Attacks Karachi, Terror Attacks Kashmir, Terror Attacks Kl, Terror Attacks In Kolkata, Terror Attacks London, Terror Attacks List, Terror Attacks Last Week, Terror Attacks London 2017, Terror Attacks London Bridge Video, Terror Attacks London Bridge Youtube, Terror Attacks London Bridge Fox News, Terror Attacks London Bridge Suspects, Terror Attacks Last Year, Terror Attacks Las Vegas, Terror Attacks May 2017, Terror Attacks Map, Terror Attacks Muslim, Terror Attacks March 2017, Terror Attacks Middle East, Terror Attacks Manchester, Terror Attacks Morocco, Terror Attacks Map Poland, Terror Attacks Map 2017, Terror Attacks March 22 2017, Terror Attacks Netherlands, Terror Attacks News, Terror Attacks Near London Bridge, Terror Attacks Nice, Terror Attacks Not Muslim, Terror Attacks New York, Terror Attacks Nyc, Terror Attacks Now, Terror Attacks New Zealand, Terror Attacks Number 22, Terror Attacks On Us Soil, Terror Attacks On The Us, Terror Attacks Of 2017, Terror Attacks On Us Soil Since 9\/11, Terror Attacks Over Time, Terror Attacks On 3\/22, Terror Attacks On The 22nd, Terror Attacks On American Soil, Terror Attacks On The Rise, Terror Attacks Of 2016, Terror Attacks Poland, Terror Attacks Paris, Terror Attacks Part And Parcel, Terror Attacks Prior To 9\/11, Terror Attacks Per Year, Terror Attacks Prevented Since 9\/11, Terror Attacks Poland Map, Terror Attacks Per Country, Terror Attacks Per Religion, Terror Attacks Paris 2017, Terror Attacks Qatar, Terror Attacks Quotes, Paris Terror Attacks Quotes, Terror Attacks Al Qaeda, Paris-terror-attacks-al-qaeda-posts-recipe-for-invisible-bomb, Terror Attacks Recent, Terror Attacks Ramadan, Terror Attacks Russia, Terror Attacks Rome, Terror Attacks Ramadan 2017, Terror Attacks Ramadan 2016, Terror Attacks Reddit, Terror Attacks Rising, Terror Attacks Refugees, Terror Attacks Statistics, Terror Attacks Since 9\/11, Terror Attacks Spain, Terror Attacks Since 2001, Terror Attacks Since 2010, Terror Attacks Sweden, Terror Attacks Switzerland, Terror Attacks Strike Central London, Terror Attacks Since 2015, Terror Attacks Statistics 2016, Terror Attacks Today, Terror Attacks This Week, Terror Attacks Timeline, Terror Attacks This Month, Terror Attacks Today In Usa, Terror Attacks This Year, Terror Attacks Turkey, Terror Attacks This Weekend, Terror Attacks Today In London, Terror Attacks Tokyo, Terror Attacks Us, Terror Attacks Uk, Terror Attacks Usa 2017, Terror Attacks Us 2017, Terror Attacks Using Vehicles, Terror Attacks Uk 2017, Terror Attacks United States 2017, Terror Attacks Uk Parliament, Terror Attacks United States 2016, Terror Attacks Us Vs Europe, Terror Attacks Videos, Terror Attacks Vs Gun Deaths, Terror Attacks Victims, Terror Attacks Vauxhall, Terror Attacks Video Clips, Terror Attacks Vienna, 911 Terror Attacks Video, France Terror Attacks Video, Brussels Terror Attacks Victims, French Terror Attacks Video, Terror Attacks Worldwide, Terror Attacks Wikipedia, Terror Attacks Worldwide Since 9\/11, Terror Attacks Worldwide By Religion, Terror Attacks Worldwide 2017, Terror Attacks With Trucks, Terror Attacks Worldwide 2016, Terror Attacks Westminster, Terror Attacks World, Terror Attacks World Map, X Com Terror Attacks, Terror Attacks Yesterday, Terror Attacks Youtube, Terror Attacks Yesterday In London, Paris Terror Attacks Youtube, Terror Attacks By Year, Terror Attacks New York, New Year’s Eve Terror Attacks, Terror Attacks Per Year, Dr Terror Attacks You, Terror Attacks New Year, Terror Attacks New Zealand, Zionist Terror Attacks, Zeppelin Terror Attacks, Zanzibar Terror Attacks, Entertainment Venue Definition, Entertainment Venue Jobs, Entertainment Venue Near Me, Entertainment Venue Security, Entertainment Venue Crossword Clue, Entertainment Venue Synonym, Entertainment Venue Permit, Entertainment Venue For Sale, Entertainment Venue Association, Entertainment Venue Atlanta, Entertainment And Venue Management, Entertainment And Venue, Checkmates Entertainment Venue Adelaide Sa, Chalmers Entertainment Venue Alloa, Meal Entertainment And Venue Hire Benefits, Entertainment Industry And Venue Management, Silverstone Entertainment And Venue Guide, Meal Entertainment And Venue Hire, Entertainment Venue Business Plan, Entertainment Venue Brisbane, Entertainment Venue Blackpool, Throne Entertainment Venue Brampton, Entertainment Venue Permit Brisbane, Sands Entertainment Venue Blackpool, New Entertainment Venue Brisbane, Entertainment Venue Review Harrys Bar Quesada, Bridges Entertainment Venue & Carvery Worcester, Brisbane Entertainment Venue Map, Entertainment Venue Crossword Clue, Entertainment Venue Contract, Entertainment Venue Chicago, Entertainment Centre Venue Map, Venue Entertainment Complex Memphis Tn, Entertainment Centre Venue, Bridges Entertainment Venue & Carvery Worcester, Bridges Entertainment Venue & Carvery, Evening Entertainment Venue Crossword, Family Entertainment Venue Coming To Hamilton County, Entertainment Venue Definition, Entertainment Venue Design, Entertainment Venue Deutsch, Entertainment Dining Venue, Massey’s Entertainment Venue Danville Ky, Entertainment Venue Manager Job Description, Entertainment At The Venue Dudley, Dj Entertainment Venue, Entertainment Venue Epping, Nissi’s Entertainment Venue & Event Center, Esibayeni Entertainment Venue, Evening Entertainment Venue Crossword Clue, Evening Entertainment Venue Crossword, E Entertainment Venue, Entertainment Venue For Sale, Ambiance Entertainment Venue Fayetteville Nc, Flipside Entertainment Venue, Farm Entertainment Venue, Farm Entertainment Venue Selma Nc, Family Entertainment Venue Coming To Hamilton County, Family Entertainment Venue, Venue For Entertainment, Guildford Entertainment Venue, Silverstone Entertainment And Venue Guide, Golf Entertainment Venue, Gl1 Entertainment Venue, Bridges Entertainment Venue Hindlip Lane, Entertainment Quarter Venue Hire, Entertainment Venue Muswell Hill, Entertainment Venue Review Harrys Bar Quesada, Meal Entertainment And Venue Hire Benefits, Sydney Entertainment Centre Venue Hire, Adelaide Entertainment Centre Venue Hire, Meal Entertainment And Venue Hire, Meal Entertainment And Venue Hire Changes, Logan Entertainment Centre Venue Hire, Entertainment Venue In North London, Entertainment Venue Ideas, Entertainment Venue Insurance, Venue Entertainment In Atlanta, Largest Entertainment Venue In The World, Wedding Venue Entertainment Ideas, Ink Entertainment Venue, Entertainment Venue In Italiano, Live Entertainment Venue Management Inholland, Entertainment Venue Jobs, Entertainment Venue Jobs Melbourne, Entertainment Venue Jobs London, Entertainment Venue Manager Job Description, Entertainment Venue Manager Jobs, Jindalee Entertainment Venue, Bliss Entertainment Venue Knoxville, Entertainment Venue Wichita Ks, Massey’s Entertainment Venue Danville Ky, Entertainment Venue London, Entertainment Venue Licence, Entertainment Venue Licence Sa, Entertainment Venue License, Entertainment Venue Lancashire, Entertainment Venue North London, Entertainment Venue Jobs London, Bridges Entertainment Venue Hindlip Lane, Limelight Entertainment Venue, Largest Entertainment Venue In The World, Entertainment Venue Management, Entertainment Venue Muswell Hill, Entertainment Venue Manager Job Description, Entertainment Venue Manager Jobs, Entertainment Venue Meaning, Entertainment Venue Madison Wi, Entertainment Centre Venue Map, Brisbane Entertainment Venue Map, Newcastle Entertainment Venue Map, Entertainment Venue Jobs Melbourne, Entertainment Venue Near Me, Entertainment Venue North London, Entertainment Venue Noise, Entertainment Venue Noise Victoria, Entertainment Venue News, Entertainment Venue Naics, Throne Entertainment Venue Nightclub, Entertainment Venue Wilmington Nc, Entertainment Venue Raleigh Nc, Ink Entertainment New Venue, Outdoor Entertainment Venue, Entertainment Venue Permit, Entertainment Venue Partners, Entertainment Venue Perth, Entertainment Venue Business Plan, Printworks Entertainment Venue, Banquet & Entertainment Venue York Pa, Public Entertainment Venue, Premier Entertainment Venue, Entertainment Quarter Venue Hire, Entertainment Quarter Venue, Entertainment Venue Review Harrys Bar Quesada, Entertainment Venue Review Harrys Bar Quesada, Entertainment Venue Raleigh Nc, Ambiance Entertainment Venue Reviews, Corus Entertainment Venue Rental, Entertainment Venue With Thrilling Rides And Sideshows, Entertainment Venue Security, Entertainment Venue Synonym, Entertainment Venue For Sale, Farm Entertainment Venue Selma Nc, Entertainment Venue Licence Sa, Entertainment Venues Sydney, Entertainment Venues Setting Stakes In San Antonio, Entertainment Venues Southampton, Entertainment Venues Surrey, Entertainment Venues San Antonio, Entertainment Venue That Is Loud And Inequitable Crossword Clue, Entertainment Venue Tamworth, Entertainment Venue Trends, Entertainment Venue Traduzione, Entertainment Venue With Thrilling Rides And Sideshows, Entertainment At The Venue Dudley, Throne Entertainment Venue, Venue Entertainment Complex Memphis Tn, Largest Entertainment Venue In The World, Thabong Entertainment Venue, Entertainment Venue Noise Victoria, Entertainment Venue With Thrilling Rides And Sideshows, Entertainment Venue Wichita Ks, Entertainment Venue Wilmington Nc, Bridges Entertainment Venue Worcester, Entertainment Venue Madison Wi, Thabong Entertainment Wedding Venue, Corus Entertainment Wedding Venue, Woodbine Entertainment Venue, Venue With Entertainment, Banquet & Entertainment Venue York Pa

    Mutmasslicher Bankrott-Tourist-Scharlatan von Holst steckt wohl hinter Überfall auf dubiose “GoMoPa”und Einbruch

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    FirmenweltenNach mir exklusiv vorliegenden Informationen ist wohl mutmaßlich der von englischen Medien als “Bankrott-Tourist” bezeichnete Rainer von Holst Auftraggeber eines Einbruches bei GoMoPa  sowie eines Überfalles auf den mutmasslich kriminellen “GoMoPa”-Boss Klaus Maurischat (siehe Photo unten), sowie mutmaßlich auf RA Thomas Schulte, wohl Pate des Konglomerates.

    Bei dem Einbruch wurde Material entwendet, das später auf der mutmasslich von Holst zuzuordnenden Webseite Gomopacrime.org und dann auf Investigoo.com (ebenfalls vwohl von Holst) publiziert wurde. Dieses Material ist zweifelsfrei echt. Die Informationen zeigen die kriminelle Organisation GoMoPa von innen.

    Nachdem von Holst von Maurischat mit Mord und Totschlag erpresst wurde, verschwandt dieses Material, das ich dann wieder publiziert habe, nachdem es auf den Wahrheitsgehalt geprüft wurde.

    verpruegelt-05-jpg.jpg (940×470)

    Von Holst hat neben diesem Material, das durchaus aufklärungswirksam ist, Falschinformationen publiziert.

    Zudem ist das Geschäftsmodel derer von  Holst illegal:

    Ein Insider urteilt: “Die von Rainer von Holst angebotenen Partnerschaftsmodelle sind in Deutschland verboten. Derartige Partnerschaftsmodelle mit USA und UK-Firmen sind gar keine Partnerschaften. Zudem gibt es diese Firmen nur auf dem Papier. Die Anmeldung einer solchen Firma kostet 15 € und man kann das Share Capital selbst bestimmen, so z.B. auch 100 Mio. Pfund. Dann nennt Rainer von Holst das auch noch Bankhaus, auch ein Begriff den es im englischen nicht gibt.

    Betrug durch und durch.”

     

    Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther, Bankrott Gehen, Bankrott Englisch, Bankrott Auf Englisch, Bankrott Anmelden, Bankrott Adjektiv, Bankrott Argentiniens Staatspleite 2001, Bankrott Anderes Wort, Bankrott Auktionen, Bankrott Argentinien, Bankrott Auktion, Bankrott Airberlin, Bankrott Auf Griechisch, Bankrott Bedeutung, Bankrott Buch, Bankrott Bost, Bankrott Bank, Bankrott Bundesland, Bankrott Brasilien, Bankrott Berlin, Bankrott Financial Crisis, American Chopper Bankrott, Cafe Bankrott, Cafe Bankrott Berlin, Commerzbank Bankrott, Colt Bankrott, Companys Bankrott, Chicago Bankrott, Cafe Bankrott Prenzlauer Allee, Caffee Bankrott, Bankrott Duden, Bankrott Definition, Bankrott Dict, Bankrott Der Ddr, Bankrott Detroit, Bankrott Durch Scheidung, Bankrott Deutsch, Bankrott Deutschland, Bankrott Deutsche Bank, Bankrott Der Bildung, Bankrott Englisch, Bankrott Gehen, Bankrott Gehen Englisch, Bankrott Griechenland, Bankrott Gehen Duden, Bankrott Griechenland Folgen, Bankrott Gegangen, Bankrott Gmbh, Bankrott Gehen Bedeutung, Bankrott Gesetz, Bankrott Gehen Rechtschreibung, Bankrott Herkunft, Bankrott Hadith, Hsv Handball Bankrott, Htc Bankrott, Hsv Bankrott, Handballclub Bankrott 2012, Hattrick Bankrott, Hardwareversand Bankrott, Bank Banker Bankrott Hamburg, Nach Dem Bankrott Habermas, Bankrott Insolvenz, Bankrott Lehman Brothers, Bankrott Machen, Bankrott Mit 4 Buchstaben, Bankrott Monopoly, Bankrott Meyer, Bankrott Machen Englisch, Bankrott Anmelden, Bankrott Machen Duden, Bankrott Magyarul, Jp Morgan Bankrott, Mexx Bankrott, Bankrott Nach Scheidung, Bankrott New York 1975, Nokia Bankrott, Nintendo Bankrott, Neckermann Bankrott, Opel Bankrott, Otto Bankrott, Occ Bankrott, Osobny Bankrott Fyzickej Osoby, O2 Bankrott, Odenwaldschule Bankrott, Pleite Oder Bankrott, Bankrott Oder Insolvent, Bankrott Gehen Oder Bankrott Gehen, Bankrott Pleite, Quiksilver Bankrott, Quelle Bankrott, Bankrott Stgb, Bankrott Synonym, Bankrott Straftat, Bankrott Stgb 283, Bankrott Schema, Bankrott Strafrecht, Bankrott Sein, Bankrott Strafe, Bankrott Tatbestand, Bankrott T Shirt, Bankrott Und Insolvenz, Bankrott Ukraine, Bankrott Usa, Bankrott Unternehmen, Bankrott Us-bundesstaat, Bankrott Usa 1971, Bankrott Usa 2015, Bankrott Ursprung, Bankrott Und Insolvenzverschleppung, Bankrott Urteil, Bankrott Wortherkunft, Bankrott Wiki, Bankrott Wikipedia, Bankrott Werden, Bankrott Was Tun, Bankrott Wiktionary, Bankrott Was Nun, Bankrott Weil Klein These, Bankrott Was Ist Das, Bankrott Was Heisst Das, Ludwig Xiv Bankrott, Yingli Bankrott, Krebs Bankrott Youtube, New York Bankrott, Bankrott New York 1975, Bankrott Zu Gehen, Zalando Bankrott, Zypern Bankrott, Zielpunkt Bankrott, Zentralbank Bankrott, Zypern Bankrott 2013, Bankruptcy Chapter 7, Bankruptcy Definition, Bankruptcy Lawyers, Bankruptcy Chapter 11, Bankruptcy Court, Bankruptcy Fraud, Bankruptcy Discharge, Bankruptcy Code, Bankruptcy Forms, Bankruptcy Law, Bankruptcy Attorney, Bankruptcy Attorney Near Me, Bankruptcy And Student Loans, Bankruptcy Automatic Stay, Bankruptcy And Taxes, Bankruptcy And Divorce, Bankruptcy Auto Loans, Bankruptcy Attorney Orlando, Bankruptcy And Child Support, Bankruptcy Auction, Bankruptcy Basics, Bankruptcy Blog, Bankruptcy Benefits, Bankruptcy Business, Bankruptcy Barrel, Bankruptcy Before Divorce, Bankruptcy Bar Association, Bankruptcy Bar Date, Bankruptcy Bill, Bankruptcy Business Definition, Bankruptcy Chapter 7, Bankruptcy Chapter 11, Bankruptcy Court, Bankruptcy Code, Bankruptcy Chapters, Bankruptcy Cost, Bankruptcy Chapter 13 Definition, Bankruptcy Car Loan, Bankruptcy Court Records, Bankruptcy Chapter 7 Forms, Bankruptcy Definition, Bankruptcy Discharge, Bankruptcy Definition Economics, Bankruptcy Dismissal, Bankruptcy Documents, Bankruptcy Discharge Date, Bankruptcy Database, Bankruptcy Due To Medical Bills, Bankruptcy Data, Bankruptcy Delaware, Bankruptcy Exemptions, Bankruptcy Estate, Bankruptcy Eu4, Bankruptcy Exemptions By State, Bankruptcy Explained, Bankruptcy Ecf, Bankruptcy Effects, Bankruptcy Edny, Bankruptcy Eligibility, Bankruptcy Eastern District Of Missouri, Bankruptcy Fraud, Bankruptcy Forms, Bankruptcy Filings, Bankruptcy For Dummies, Bankruptcy Filing Fees, Bankruptcy Forum, Bankruptcy Florida, Bankruptcy Fees, Bankruptcy Form 410, Bankruptcy Filing Search, Bankruptcy Guidelines, Bankruptcy Georgia, Bankruptcy Government Definition, Bankruptcy Gander Mountain, Bankruptcy Garnishment, Bankruptcy Gif, Bankruptcy Greeley Co, Bankruptcy Greenville Sc, Bankruptcy Gambling, Bankruptcy Guide, Bankruptcy Hotline, Bankruptcy Homes, Bankruptcy Hearing, Bankruptcy Homestead Exemption, Bankruptcy Hawaii, Bankruptcy House, Bankruptcy How Long, Bankruptcy History, Bankruptcy Home Loan, Bankruptcy How To File, Bankruptcy In Spanish, Bankruptcy Information, Bankruptcy In Texas, Bankruptcy In Florida, Bankruptcy In California, Bankruptcy In Ohio, Bankruptcy In Illinois, Bankruptcy In Michigan, Bankruptcy In Pa, Bankruptcy Indiana, Bankruptcy Judge, Bankruptcy Jurisdiction, Bankruptcy Jobs, Bankruptcy Judge Salary, Bankruptcy Jokes, Bankruptcy Judge Definition, Bankruptcy Judgement, Bankruptcy Judge Term, Bankruptcy Judgeship Act Of 2017, Bankruptcy Jackson Ms, Bankruptcy Keep House, Bankruptcy Keep Car, Bankruptcy Kansas, Bankruptcy Kit, Bankruptcy Kentucky, Bankruptcy Knoxville, Bankruptcy Keep House And Car, Bankruptcy Kansas City, Bankruptcy Keep Home, Bankruptcy Kansas City Mo, Bankruptcy Lawyers, Bankruptcy Law, Bankruptcy Lawyer Near Me, Bankruptcy Loans, Bankruptcy Lawyer Salary, Bankruptcy Lookup, Bankruptcy Lawyer Nj, Bankruptcy Las Vegas, Bankruptcy Law Center, Bankruptcy Liquidation, Bankruptcy Meaning, Bankruptcy Means Test, Bankruptcy Medical Bills, Bankruptcy Management Solutions, Bankruptcy Mortgage, Bankruptcy Mn, Bankruptcy Meme, Bankruptcy Michigan, Bankruptcy Maryland, Bankruptcy Missouri, Bankruptcy Near Me, Bankruptcy News, Bankruptcy Nj, Bankruptcy Noticing Center, Bankruptcy Northern District Of Texas, Bankruptcy Number, Bankruptcy Nc, Bankruptcy New Jersey, Bankruptcy Notice, Bankruptcy Nevada, Bankruptcy Options, Bankruptcy Online, Bankruptcy Ohio, Bankruptcy On Student Loans, Bankruptcy Oklahoma, Bankruptcy Office, Bankruptcy Oregon, Bankruptcy Outline, Bankruptcy On Credit Report, Bankruptcy Online Course, Bankruptcy Protection, Bankruptcy Process, Bankruptcy Payments, Bankruptcy Petition, Bankruptcy Proof Of Claim, Bankruptcy Public Records, Bankruptcy Puerto Rico, Bankruptcy Paperwork, Bankruptcy Paralegal, Bankruptcy Petition Preparer, Bankruptcy Questions, Bankruptcy Qualifications, Bankruptcy Quizlet, Bankruptcy Questionnaire, Bankruptcy Quotes, Bankruptcy Quiz, Bankruptcy Questions And Answers, Bankruptcy Qualification Calculator, Bankruptcy Qualifications Texas, Bankruptcy Quiz Questions, Bankruptcy Records, Bankruptcy Rules, Bankruptcy Rule 3001(c)(2)(a), Bankruptcy Rule 2002, Bankruptcy Remote, Bankruptcy Rule 2004, Bankruptcy Rule 9014, Bankruptcy Rule 3002.1, Bankruptcy Rule 7004, Bankruptcy Requirements, Bankruptcy Search, Bankruptcy Software, Bankruptcy Student Loans, Bankruptcy Stay, Bankruptcy Score, Bankruptcy Statistics, Bankruptcy Status, Bankruptcy Southern District Of Florida, Bankruptcy Synonym, Bankruptcy Schedules, Bankruptcy Trustee, Bankruptcy Types, Bankruptcy Texas, Bankruptcy Terms, Bankruptcy Timeline, Bankruptcy Taxes, Bankruptcy Test, Bankruptcy Trustee Definition, Bankruptcy The Office, Bankruptcy Tax Return, Bankruptcy Utah, Bankruptcy Unclaimed Funds, Bankruptcy Uk, Bankruptcy Us, Bankruptcy Utility Bills, Bankruptcy Used In A Sentence, Bankruptcy Ucc, Bankruptcy Us Trustee, Bankruptcy Utah Court, Bankruptcy Utilities, Bankruptcy Vs Foreclosure, Bankruptcy Venue, Bankruptcy Virginia, Bankruptcy Vs Default, Bankruptcy Vs Debt Consolidation, Bankruptcy Vancouver Wa, Bankruptcy Video, Bankruptcy Vs Charge Off, Bankruptcy Verification Line, Bankruptcy Va Loan, Bankruptcy Website, Bankruptcy Wiki, Bankruptcy Wisconsin, Bankruptcy Wichita Ks, Bankruptcy What Is It, Bankruptcy Washington State, Bankruptcy Worksheet, Bankruptcy Western District Of Pa, Bankruptcy Western District Of Texas, Bankruptcy Watch, Bankruptcy Xenia Ohio, Bankruptcy X, Xinergy Bankruptcy, Xerox Bankruptcy, Xccent Bankruptcy, Xco Bankruptcy, Xerium Bankruptcy, Xyience Bankruptcy, Xi3 Bankruptcy, Xom Bankruptcy, Bankruptcy Years, Bankruptcy Yakima, Bankruptcy Youtube, Bankruptcy Years On Credit Report, Bankruptcy Yuma Az, Bankruptcy Youngstown Ohio, Bankruptcy Yesterday, Bankruptcy Yourself, Bankruptcy York Pa, Bankruptcy Yelp, Bankruptcy Z Score, Bankruptcy Zanesville Ohio, Bankruptcy Z Score Calculator, Bankruptcy Zuckerberg, Bankruptcy Zero Balance Credit Card, Bankruptcy Zero Tax Code, Bankruptcy Z Value, Bankruptcy Z List Case, Bankruptcy Zephyrhills, Bankruptcy Zimbabwe

    Der Firmenwelten-Boss von Holst und mutmassliche “GoMoPacrime”-Erfinder in Bilddokumenten

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Firmenwelten Gruppe

    Nach der Publikation zu der mutmasslichen Person, die hinter “GoMoPacrime” steckt, wurde zweimal versucht, digital in meine Webseiten einzubrechen.

    Honi soit qui mal y pense…

    Hier finden Sie nun die Bilddokumente zu von Holst.

    Rainer von Holst

    Rainer von Holst (1)

     

    Gomopa Gmbh, Gomopa Crime, Gomopa Wikipedia, Gomopa Erpressung, Gomopa Wirecard, Gomopa Berlin, Gomopa Ndr, Gomopa Die Zeit, Gomopa S&k, Gomopa Control Inc, Gomopa Autark, Gomopa Ard, Gomopa Account, Gomopa Alexander Stephan, Gomopa Ascent, Anti Gomopa, Gomopa Ogi Ag, Eev Ag Gomopa, Die Akte Gomopa, Gomopacrime, Gomopa Control Inc, Gomopa Cosma, Gomopa Creditsafe, Gomopa Captura, Gomopa Care Energy, Gomopa Curatio, Gomopa Consortis, Gomopa Carsten Simon, Gomopa Die Zeit, Gomopa Diebewertung, Gamepad Dolphin, Gomopa Deutschland, Gomopa Dr. Schulte, Gomopa Erfahrungen, Gomopa Erpressung, Gomopa Eev, Gomopa Eci, Gomopa Elbfonds, Gomopa Erfahrungsbericht, Gomopa Care Energy, Gomopa Facebook, Gomopa Forum, Gomopa Finanznachrichtendienst, Gomopa Fonds Finanz, Gomopa Fuchsgruber, Gomopa Fidentum, Gomopa Faz, Gomopa Foren, Gomopa Gmbh, Gomopa Gmbh Berlin, Gomopa Gmbh Hamburg, Gomopa Hamburg, Gomopa Haz, Gomopa Handelsregister, Gomopa Mega Holdings, Handelsblatt Gomopa, Gomopa Gmbh Hamburg, Gomopa Von Holst, Gomopa Invensys, Gomopa Insolvent, Gomopa Impressum, Gomopa Control Inc, Was Ist Gomopa, Gomopa Junginger, Gomopa Juwi, Gomopa Kreditkarte, Gomopa Klaus Maurischat, Gomopa Kritik, Gomopa Lopoca, Gomopa Login, Thomas Lloyd Gomopa, Gomopa Mastercard, Gomopa Maurischat, Gomopa Mega Holdings, Gomopa Massat, Gomopa Mafia, Gomopa Klaus Maurischat, Mega Holdings Gomopa, Frank Maiwald Gomopa, Erfahrungen Mit Gomopa, Gomopa Net, Gomopa Ndr, Gomopa Net Warnliste, Gomopa News, Gomopa Nachrichten, Gomopa New York, Gomopa Net Pressemitteilung, Gomopa Net Finanzforum, Gomopa Offline, Gomopa Ogi Ag, Gomopa Opfer, Onecoin Gomopa, Gomopa Zeit Online, Michael Oehme Gomopa, Gomopa Pressemitteilungen, Gomopa Pim, Gomopa Pleite, Gomopa Pro Ventus, Gomopa Profi User, Gomopa Probleme, Gomopa Patio, Gomopa Publity, Pulch Gomopa, Gomopa Net Pressemitteilung, Gomopa Queensgold, Gomopa Resch, Gomopa Relom, Gomopa Rwb, Renew Gomopa Profi User, Peter Reski Gomopa, Gomopa Tagesschau, Gomopa Twitter, Gomopa Verklagen, Gomopa Vnr, Gomopa Volz, Gomopa Von Holst, Gomopa Verbrecher, Gomopa Pro Ventus, Mark Vornkahl Gomopa, Gomopa Warnliste, Gomopa Wikipedia, Gomopa Wirecard, Gomopa Wellstar, Gomopa Wiki, Gomopa Net Warnliste, Robert Wallis Gomopa, Www.gomopa.net Forum, Wallis Gomopa, Andreas Wohlers Gomopa, Gomopa New York, Gomopa Zapp, Gomopa Zeit, Gomopa Zeit Online, Gomopa Die Zeit, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Usa, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst, Rainer Von Holst Bank, Rainer Von Holst Politico, Rainer Von Holst Augsburg, Rainer Von Holst Augsburg, Rainer Von Holst Bank, Rainer Von Holst Firmenwelten, Rainer Von Holst Gerlachreport, Rainer Von Holst Gerlach, Rainer Von Holst Gomopa, Rainer Von Holst Iserlohn, Rainer Von Holst Politico, Rainer Von Holst Princeton, Rainer Von Holst Usa, Rainer Von Holst Werther

    Insider – Verfassungsschutz kümmert sich um “GoMoPa”-Nazi-Ableger “Berlin Journal”

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Sympathieträger Neo-Nazi

    Insider der Investigativ-Plattform INVESTIGOO berichten:

    “Die Internetseite berlinjournal.biz steht im Visier des deutschen Verfassungsschutzes. Hintergrund sind „fremdenfeindliche Berichte, Rassenhass, Diskriminierung und rechtsradikale Propaganda“.

     

    Sympathieträger Maurischat im Foto oben

    Verantwortliche dieses „Machwerkes“ sind der Herausgeber des „Finanznachrichtendienstes“ gomopa.net, Klaus-Dieter Maurischat und sein Chefredakteur Frank Maiwald. Maurischat, der von der Augsburger Staatsanwaltschaft in einer Erpressungsstrafsache per Haftbefehl gesucht wird, lebt in Berlin im feudalen Untergrund: Unter den Linden 19 in einer 4000-teuren Penthousewohnung.
    Der Chef des maroden „Finanznachrichtendienstes“ Gomopa bastelt seit Monaten an einer Nachfolgelösung für sein in Not geratenes Schiff. Angriffe auf ihn persönlich und die Strukturen von Gomopa haben aus der ehemaligen größten deutschen Drecksschleuder eine lahme Ente gemacht. Internetspezialisten überwachen inzwischen jeden Arbeitsschritt des „Finanznachrichtendienstes“, dessen einzige Aufgabe darin bestand Unternehmer, Unternehmen und Unschuldige zu erpressen.

    Sympathieträger und Ex-STASI-Agent Maiwald im Bild oben

    Hilfe bei seinem neuen Projekt „Berlin Journal“ bekommt er dabei von Gomopa-Chefredakteur Frank Maiwald. Gegen den ehemaligen Redakteur der Berliner B.Z. ermittelt die Staatsanwaltschaft Neuruppin unter dem Aktenzeichen 332 Js 17877/15 wegen Bankrotts, Sozialbetrugs und Steuerhinterziehung. Maiwald hat als Hartz IV-Empfänger regelmässig bis zu 7.000 Euro von Gomopa schwarz bezogen und war an dem Erpressungssystem des Unternehmens direkt beteiligt.
    Die B.Z. hatte ihn wegen Spesenbetrugs gefeuert.
    Unter diesem Vorzeichen ist die „Berichterstattung“ von Berlin Journal besonders widerwärtig. Die Internetseite wird ausschließlich von Maiwald geschrieben. Er arbeitet unter vielen Namen, am liebsten wahlweise unter dem Namen Bodo Hering oder Max Wolf. Das ergibt sich aus Protokollen des Internetverkehrs. Maiwald hat unter dem Titel „Flüchtlinge erhalten Essen für 16 Euro, Hartz-IV-Empfänger für 4,72 Euro“ einen Artikel veröffentlicht, der nicht nur faktisch unwahr ist, sondern seine nationalsozialistische Gesinnung offenbart. Maiwald (Foto), ein ehemaliger Stasi-Informant, kann wohl auch hier seine wahre Herkunft nicht verleugnen.

    Mit einer Welle der Empörung und auch Zustimmung wurde auf der Internetseite auf diesen Bericht reagiert. Dabei konnte sich der Pöbel nach Herzenslust austoben. Das ist auch nach dem Geschmack von Klaus-Dieter Maurischat, dessen politischer Weitblick am Ende des Biertisches endet. Presserechtlich ist das „Organ“ für Ermittlungsbehörden offiziell nicht greifbar. Das Impressum weist als Verantwortlichen für den Inhalt „Bodo Hering“, also Frank Maiwald, aus. Die Redaktion hat keine ladungsfähige Adresse, so dass eigentlich juristisch nicht gegen die Publikation angegangen werden kann.
    Doch so einfach wie noch vor 15 Jahren, als gomopa.net die deutsche Finanz- und Maklerszene in helle Aufregung versetzte, ist die Welt heute nicht mehr. Durch umfassende Recherchen konnten die presserechtlich Verantwortlichen für das Berlin Journal identifiziert werden. Damit die Verantwortlichen durch Geschädigte in die Haftung genommen werden können, veröffentlichen wir hier die entsprechenden Personaldaten:
    MaurischatBJ
    · Klaus-Dieter Maurischat, geb. 12. April 1956
    Lange Straße 38, 27313 Dörverden, Hülsen, 2. OG
    Unter den Linden 19, 10117 Berlin
    Barnstedt 11, 27313 Dörverden
    · Frank Maiwald, alias Bodo Hering, alias Max Wolf, geb. 6. Mai 1959
    Nordweg 150
    16516 Oranienburg
    Derzeit wird versucht, die tatsächlichen Spuren zu verwischen. Klaus-Dieter Maurischat ist dabei auf die Idee gekommen, etwaige Haftungsfragen gleich rund 7.500 Kilometer in den US-amerikanischen Bundesstaat Wisconsin zu schieben. Hier ist die US-amerikanische Zeitschriftengruppe „Berlin Journal Newspapers“ aus Berlin (Wisconsin) ansässig. Das offensichtliche Kalkül von Maurischat und Maiwald: Die Gruppe aus Berlin in Wisconsin stehe hinter der Internetplattform. Damit wäre eine Haftung nach deutschen Recht nahezu unmöglich. Im Amerika gilt ein weitaus liberaleres Presserecht als in Deutschland.
    Dumm nur, dass die beiden erwischt wurden: Die Verlagsleitung der „Berlin Journal Newspapers“ in Wisconsin hat strafrechtliche Schritte gegen Maurischat und Maiwald eingeleitet. Das geht, da Klaus-Dieter Maurischat die Internetseite tatsächlich über die in Delaware angemeldete Firma „Berlin Journal Inc.“ steuert. Damit ist die strafrechtliche Würdigung auch in den USA möglich. Gegen Klaus-Dieter Maurischat und seinen Gomopa-Vize Mark Vornkahl liegen wegen der erheblichen Vorwürfe der Erpressung, Nötigung, Steuerhinterziehung, gewerbsmässigen Betrugs und Nutzung einer US-Körperschaft für kriminelle Handlungen ohnehin schon Haftbefehle in den USA vor.
    berlinjournal.biz gibt vor, mehr als 14.000 tägliche Leser zu haben. Tatsächlich wurden bei Facebook 10.000 „Likes“ für 790 Euro gekauft. So ist auch zu erklären, dass es diese Resonanzen auf die Berichterstattung gibt. Damit aber nicht genug: Über die sozialen Netzwerke wurde der Artikel dann von rechtsradikalen Organisationen wie „Pro Deutschland“ oder AfD verbreitet. Da waren sich Maurischat und Maiwald sicher, die richtigen Mengen an Leser zu finden.
    Denn das Berlin Journal, so der Plan, soll in 2016 den Finanznachrichtendienst Gomopa als Plattform für Erpressung, Nötigung, üble Nachrede, Verunglimpfung als Drecksschleuder ablösen. Jetzt kommt noch eine andere Qualität dazu: menschenverachtender radikalfaschistischer Journalismus.
    Aber nicht alle Leser sind blöd. Mohammed Hadi Al Khafaji bringt es auf den Punkt: „jetzt ist es amtlich: Berlin Journal ist ein Nazi-Blatt!“”

    INVESTIGOO ist derzeit offline – wohl wegen der brisanten Inhalte.

    Die Liquidation der GoMoPa enthüllt

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Name Bereich Information V.-Datum Relevanz
    GoMoPa GmbH
    Hamburg
    Gesellschaftsbekanntmachungen Liquidation 20.02.2015

    GoMoPa GmbH

    Hamburg

    Die Gesellschaft ist aufgelöst. Die Gläubiger der Gesellschaft werden aufgefordert, sich bei ihr zu melden.

     

    Der Liquidator

    https://www.bundesanzeiger.de/ebanzwww/wexsservlet?session.sessionid=37eadd890bad0b1b61f24b7b78b81b31&page.navid=detailsearchlisttodetailsearchdetail&fts_search_list.selected=bec34c7f4779677f&fts_search_list.destHistoryId=65127

     

    QUELLE: BUNDESANZEIGER

    Exposed – Chinese Cyber Espionage Against U.S. Government and Business Networks

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    FBI-ChinaCyberEspionage

     

    FBI Cyber Division FLASH Notification

    • 6 pages
    • TLP: GREEN
    • March 18, 2015

    Download

    The FBI is providing the following information with HIGH confidence: The FBI has obtained information regarding one or more groups of cyber actors who have compromised and stolen sensitive business information from US commercial and government networks through cyber espionage. Analysis indicates a significant amount of the computer network exploitation activities emanated from infrastructure located within China. Any activity related to these groups detected on a network should be considered an indication of a compromise requiring extensive mitigation and contact with law enforcement.

    Technical Details

    The FBI is providing the following information with HIGH confidence:

    These groups have been observed across a variety of intrusions leveraging a diverse selection of tools and techniques to attempt to gain initial access to a victim including using VPN credentials acquired during previous intrusions. These groups have also been observed scanning for web-facing devices which are not fully patched and for which there are publically known vulnerabilities. These groups also continue to use malicious documents in spearphishing emails which leverage older vulnerabilities such as CVE-2011-0611 and CVE-2012-0158.

    Following such an exploit, such groups have been observed recently using a more sophisticated variant of the 9002 Remote Access Trojan which was previously observed in Operation Aurora and the SunShop Campaign. The most recent variant employed a DLL load order hijacking technique and was named ws2_32.dll on the infected system. The DLL load order hijacking technique enabled the 9002 variant to load and gain persistence on the system when a susceptible application attempted to load the legitimate ws2_32.dll. The 9002 variant, which created a mutex named ‘xws2_32′, contained the same export functions as the legitimate ws2_32.dll which facilitates the redirection of legitimate API calls. The 9002 variant decoded malicious sections of code at runtime which were not written to disk. The initial beacon was transmitted as a POST request with a dynamic 4 byte XOR key starting at offset 0 that changed with each subsequent beacon and was Base64 encoded prior to transmission. The behavior of this 9002 variant was similar to the ‘Diskless 9002 RAT’ referenced in open source reporting.

    These groups leverage their initial accesses to gain further access to protected information resources on other systems by collecting legitimate credentials or even misusing legitimate certificates introduced into
    that compromised system or endpoint. In some cases these groups established automated maintenance routines using standard system administration tools to collect and exfiltrate password hashes on a regular
    schedule without outside intervention. In other cases, specific tools designed to hijack PKI credentials such as the “Sykipot” malware enabled their ability to harvest and misuse legitimate user certificates. See the SANS report at http://www.sans.org/reading-room/whitepapers/malicious/detailed-analysis-sykipot-smartcard-proxy-variant-33919.

    File Information:
    Name: 256438747bae78c9101c9a0d4efe5572
    MD5:256438747BAE78C9101C9A0D4EFE5572
    Beaconing traffic to: cache.dnsde.com
    Details: HOMEUNIX/9002 malware binary encrypted with password “NeverSayDie!”

    If the presence of such tools is detected, it should be immediately flagged, given priority for enhanced mitigation and reported to FBI CYWATCH.

    Recommended Steps for Initial Mitigation

    The FBI and NSA recommend the following mitigation measures be taken within the first 72 hours of detection:

    Prepare Your Environment for Incident Response

    • Establish Out-of-Band Communications methods for dissemination of intrusion response plans and activities, inform NOCs/CERTs according to institutional policy and SOPs
    • Maintain and actively monitor centralized host and network logging solutions after ensuring that all devices have logging enabled and their logs are being aggregated to those centralized solutions
    • Disable all remote (including RDP & VPN) access until a password change for all accounts has been completed
    • Turn on enhanced monitoring functionality with high-powered analytics to detect known security events and changes in adversary behavior.
    • Monitor accounts and devices determined to be part of the compromise to prevent reacquisition attempts

    STASI-“GoMoPa” wegen Ruf – MORD an Journalisten im Visier der ARD/NDR

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Liebe Leser

    Journalisten, die kritisch über das Portal “GoMoPa” berichteten, wurden oft diskreditiert. Jetzt liegen dem ARD-Magazin ZAPP (NDR) neue Unterlagen zum dubiosen Geschäftsgebaren der Firma vor.

    Mit STASI-Methoden agieren, die aus der STASI von Oberst Stelzer stammenden, Cyber-Stalker:

    Rufmord, Justiz-Mord, Wirtschaftskriminalität, Glykol und Toxdat gehören zu ihrem Arsenal – und die deutsche Justiz unternimmt nichts.

    Im Gegenteil bei einigen Personen wie Beate Porten (Staatsanwältin)  und Thomas Porten (Gesellschafter/Chefredakteur IZ), und dem “GoMoPa”-Genossen Peter Ehlers (SJB-Fondsgesellschaft, “Der Fonds”/”Das Investment”) liegt der Verdacht nahe mit “GoMoPa” eng zu kooperieren, um eigene (mutmaßlich finanzielle) Interessen zu optimieren. Schön, wenn man dann noch einen ähnlichen Background hat…

    Nach unseren Recherchen sind die weiteren Schlüsselpersonen mutmaßlich

    – RA Jochen  und Manfred Resch, eng liiert mit dem STASI-Obersten und dem Mord-Experten Nr.1 der DDR, Oberst Ehrenfried Stelzer,

    – der “GoMoPa”-“CTO” aus Dresden, nunmehr Berlin, Sven Schmidt,

    – Jan Mucha, IZ,  (Familienbackground aus der kommunistischen “CSFR”)

    – Isabella Colonius, IZ, mutmaßliche “GoMoPa”-Konfidentin

    – der “GoMoPa”CEO” und President, der unter verschiedenen Decknamen agierende und mit mysteriöser Biographie ausgestattete “Klaus-Dieter Maurischat”

    – der dubiose vor 1989 dem Fall der DDR – ebensowenig wie sein Kompagnon, der dubiose “Peter Ehlers”  in Erscheinung getretene SJB-Fonds-Vermittler “Gerd Bennewirtz”, derzeit Grevenbroich/Neuss

    – der Hitler-“Biograph Rainer Zitelmann (aus Darmstadt wie “Porten & Porten”)

    Insider berichten, daß “GoMoPa” von den oben genannten Personen und Institutionen mutmaßlich Informationen zugespielt bekommen.

    Honi soit qui mal y pense !

    Herzlichst Ihr

    Magister Bernd Pulch

    DHS Intelligence Assessment: Malicious Cyber Actors Target US Universities and Colleges

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    DHS-UniversityCyberThreats

    Malicious Cyber Actors Target US Universities and Colleges

    • 5 pages
    • For Official Use Only
    • January 16, 2015

    Download

    (U//FOUO) We assess that the primary cyber threat to US university and college networks is cybercrime and unwitting hosting of malicious activity, likely because the regular turnover of student network users and requirements for accessibility to the networks make the networks difficult to monitor and secure.

    (U//FOUO) We assess malicious cyber actors targeting intellectual property and research are the emerging cyber threat facing university and college networks. Cutting-edge research and sensitive US government and cleared defense contractor projects are appealing targets for cyber actors looking to gain access to sensitive research programs and information.

    (U//FOUO) University Networks Face Common Cyber Threats

    (U//FOUO) Malicious cyber actors have targeted US universities and colleges with typical cybercrime activities, such as spear phishing students and faculty with university-themed messages, creating fake university websites, and infecting computers with malicious software, likely in an attempt to gain access to student and faculty e-mail and bank accounts. We have no indication that cybercriminals target university systems and users more than any other cybercrime victims.

    » (U//FOUO) According to sensitive DHS reporting, several different types of malware designed to gather personally identifiable information (PII) and exploit computer systems for financial gain—ransomware, clickfraud malware, and  credential-harvesting malware—were found on computer systems of an identified US university in late August 2014. We do not know if PII was compromised or exfiltrated as a result of these infections.

    » (U//FOUO) In February 2014, unknown cyber actors targeted departments at an identified US university with phishing messages containing malicious links, according to FBI reporting. Computers of recipients that responded were infected with ransomware requiring victims to pay between $50 and $500 to decrypt their computers, according to FBI reporting.

    » (U//FOUO) In early 2014, malicious cyber actors successfully executed an e-mail phishing attack against 166 employees at an identified US university. The phishing message was embedded with a malicious link to a fraudulent university website that, when accessed, prompted employees to provide PII associated with their financial accounts. The actors successfully compromised the financial accounts of two employees, changing their direct deposit information so that money was delivered to an unspecified US bank, resulting in financial losses for the employees, according to an FBI contact with excellent access.

    (U//FOUO) US universities and colleges have extensive computer networks and infrastructure making them ideal targets for unwitting hosting of malicious cyber operations, including denial-of-service (DoS) attacks and undetected storage of malware. As with cybercrime, we have no indication that malicious cyber actors target university and college networks for these activities any more than other networks.

    » (U//FOUO) In early 2014, an unidentified cyber actor leveraged a supercomputer at an identified US university to initiate a DoS attack against the servers of several identified US businesses that host servers for gaming activities, according to an FBI source with indirect access. The attack used about 98 percent of the university’s bandwidth.

    » (U//FOUO) Unidentified cyber actors used a named US university’s web server as a file repository for distributing malicious tools, according to sensitive DHS reporting. Analysis of the web server confirmed that a number of malicious tools had been uploaded to the system, as of mid-2014.

    (U//FOUO) University Networks May Be Target for Cyberespionage

    (U//FOUO) While malicious cyber actors looking to exploit university and college networks for PII remain a consistent threat, we assess that the emerging cyber threat facing US university and college networks is cyberespionage actors seeking information and intellectual property. In addition to in-house, cutting-edge research, numerous US universities and colleges are involved in sensitive US government and cleared defense contractor research projects. These associations are very appealing to cyberespionage actors looking to gain access to sensitive research programs to exfiltrate information. University networks, which often have multiple levels of connectivity and accessibility to fuel collaboration, may present an easier target for cyberespionage actors than sensitive government or private industry networks. We have only a few examples of data exfiltration from university networks, but those we have lead us to judge that this activity does target research information and intellectual property.

    » (U) According to reporting from a US cybersecurity firm, likely Iranian cyber actors, as part of a global espionage campaign, targeted universities in the United States, India, Israel, and South Korea from 2012 to late 2014. The cyber actors targeted research efforts, student information, student housing, and financial aid systems. According to the security firm, the cyber actors reportedly harvested confidential critical infrastructure documents from major educational institutions around the world.

    » (U) A late-2013 review of the infrastructure associated with a probable foreign cyberespionage campaign indicated broad targeting of university computer systems, including those in the United States, the United Kingdom, and Israel, according to DHS reporting. The unknown actors successfully exfiltrated sensitive research information associated with university-affiliated medical organizations, including passwords and passport images.

    Cyber Attack Map, Cyber Attack 2017, Cyber Attack On Electrical Grid, Cyber Attack 2016, Cyber Attack Definition, Cyber Attack Statistics 2016, Cyber Attack Types, Cyber Attack Statistics, Cyber Attack News, Cyber Attack May 2017, Cyber Attack Articles, Cyber Attack Act Of War, Cyber Attack Ap Style, Cyber Attack Attribution, Cyber Attack April 2017, Cyber Attack Ap, Cyber Attack America, Cyber Attack Amazon, Cyber Attack Associated Press, Cyber Attack Airlines, Cyber Attack By North Korea, Cyber Attack Bank Of America, Cyber Attack Book, Cyber Attack Bitcoin, Cyber Attack Britain, Cyber Attack Bank, Cyber Attack Business, Cyber Attack British, Cyber Attack By Russia, Cyber Attack British Health Facilities, Cyber Attack Costs, Cyber Attack Consequences, Cyber Attack Case Study, Cyber Attack Cases, Cyber Attack Cry, Cyber Attack Chain, Cyber Attack Comcast, Cyber Attack Causes Physical Damage, Cyber Attack Cartoon, Cyber Attack China, Cyber Attack Definition, Cyber Attack Data, Cyber Attack Defense, Cyber Attack Detection, Cyber Attack Database, Cyber Attack Documentary, Cyber Attack Dallas, Cyber Attack Define, Cyber Attack Dictionary, Cyber Attack Ddos, Cyber Attack Examples, Cyber Attack Estonia, Cyber Attack Electrical Grid, Cyber Attack Effects, Cyber Attack Europe, Cyber Attack England, Cyber Attack Election, Cyber Attack Essay, Cyber Attack Ecmc, Cyber Attack Events, Cyber Attack Facts, Cyber Attack From North Korea, Cyber Attack Fedex, Cyber Attack Friday, Cyber Attack Fbi, Cyber Attack Florida, Cyber Attack France, Cyber Attack Future, Cyber Attack Facebook, Cyber Attack Fox, Cyber Attack Google, Cyber Attack Graph, Cyber Attack Government, Cyber Attack Grid, Cyber Attack Gif, Cyber Attack Graphic, Cyber Attack Groups, Cyber Attack Georgia, Cyber Attack Global Map, Cyber Attack Going On Now, Cyber Attack Healthcare, Cyber Attack Headlines, Cyber Attack Hospital, Cyber Attack Hyphen, Cyber Attack History, Cyber Attack Heat Map, Cyber Attack Homeland Security, Cyber Attack Hits Fedex, Cyber Attack Hostage, Cyber Attack Hero, Cyber Attack Insurance, Cyber Attack Images, Cyber Attack In Spanish, Cyber Attack Iran, Cyber Attack Icon, Cyber Attack In Usa, Cyber Attack In The Us, Cyber Attack Infrastructure, Cyber Attack International Law, Cyber Attack Insurance Coverage, Cyber Attack June 2017, Cyber Attack Jobs, Cyber Attack June 14 2017, Cyber Attack Japan, Cyber Attack June 13 2017, Cyber Attack Jokes, Cyber Attack June, Cyber Attack James Paget Hospital, Cyber Attack Jordan, Cyber Attack Jamaica, Cyber Attack Kill Chain, Cyber Attack Korea, Cyber Attack Killswitch, Cyber Attack Kansas, Cyber Attack Kaspersky, Cyber Attack Kaiser Permanente, Cyber Attack Kya Hai, Cyber Attack Kenya, Cyber Attack Kuwait, Cyber Attack Kings Mill Hospital, Cyber Attack Lifecycle, Cyber Attack Live Map, Cyber Attack Last Week, Cyber Attack List, Cyber Attack Laws, Cyber Attack London, Cyber Attack Live, Cyber Attack Losses, Cyber Attack Lifecycle Mitre, Cyber Attack Last Friday, Cyber Attack Map, Cyber Attack May 2017, Cyber Attack Map Norse, Cyber Attack Meaning, Cyber Attack Movie, Cyber Attack Methods, Cyber Attack Monitor, Cyber Attack Map Live, Cyber Attack Merriam Webster, Cyber Attack Meme, Cyber Attack News, Cyber Attack North Korea, Cyber Attack News Today, Cyber Attack Names, Cyber Attack Notification, Cyber Attack News 2016, Cyber Attack Netflix, Cyber Attack Now, Cyber Attack Nhs, Cyber Attack North Korea Missile, Cyber Attack On Electrical Grid, Cyber Attack Or Cyber-attack, Cyber Attack On North Korea, Cyber Attack On Us Power Grid, Cyber Attack On Us, Cyber Attack On Iran, Cyber Attack On Sony, Cyber Attack On Target, Cyber Attack On Healthcare, Cyber Attack On Usa, Cyber Attack Power Grid, Cyber Attack Prevention, Cyber Attack Phases, Cyber Attack Policy, Cyber Attack Pictures, Cyber Attack Phishing, Cyber Attack Prediction, Cyber Attack Protection, Cyber Attack Pdf, Cyber Attack Prevention Plan, Cyber Attack Quotes, Cyber Attack Qatar, Cyber Attack Questions, Cyber Attack Quora, Cyber Attack Queens Hospital Romford, Cyber Attack Qld Health, Cyber Attack Queensland Health, Cyber Attack Queensland, Cyber Attack Queens Hospital Burton, Cyber Attack Quiz, Cyber Attack Ransomware, Cyber Attack Response Plan, Cyber Attack Report, Cyber Attack Ransom, Cyber Attack Russia, Cyber Attack Recovery, Cyber Attack Right Now, Cyber Attack Real Time, Cyber Attack Recent, Cyber Attack Risks, Cyber Attack Statistics 2016, Cyber Attack Statistics, Cyber Attack Statistics 2017, Cyber Attack Stories, Cyber Attack Simulation, Cyber Attack Scenario, Cyber Attack Surface, Cyber Attack Statistics By Country, Cyber Attack Synonym, Cyber Attack Statistics 2015, Cyber Attack Types, Cyber Attack Trends, Cyber Attack Today, Cyber Attack Target, Cyber Attack Today 2017, Cyber Attack Timeline, Cyber Attack Threats, Cyber Attack Tools, Cyber Attack This Week, Cyber Attack Tracker, Cyber Attack Us Power Grid, Cyber Attack Us, Cyber Attack Uk, Cyber Attack Ukraine, Cyber Attack Usa, Cyber Attack Usa Today, Cyber Attack Usa 2017, Cyber Attack Us Companies, Cyber Attack Utilities, Cyber Attack Underway, Cyber Attack Vectors, Cyber Attack Visualization, Cyber Attack Vs Data Breach, Cyber Attack Video, Cyber Attack Virus, Cyber Attack Vs Cyber Attack, Cyber Attack Vulnerability, Cyber Attack Verizon, Cyber Attack Viewer, Cyber Attack Video Youtube, Cyber Attack Wanna Cry, Cyber Attack Wiki, Cyber Attack Website, Cyber Attack World Map, Cyber Attack Wells Fargo, Cyber Attack Wanna, Cyber Attack Worm, Cyber Attack Washington Post, Cyber Attack Wisconsin, Cyber Attack Whaling, Cyber Attack Xbox, Cyber Attack Xp, Cyber Attack Xp Patch, Cyber Attack Xp Only, Cyber Attack Xbox Live, Cyber Attack Team Xbox, Cyber Attack On Xbox And Playstation, Cat Cyber Attack Team Xbox, Cyber Sub Zero X Ray Attack, Xbox Cyber Attack Christmas, Cyber Attack Yahoo, Cyber Attack Youtube, Cyber Attack Yesterday, Cyber Attack Yorkshire, Cyber Attack York Hospital, Cyber Attack York, Cyber Attack Yeovil Hospital, Cyber Attack York Nhs, Cyber Attack Yesterday Hindi, Cyber Attack Uk, Cyber Attack Zomato, Cyber Attack Zee News, Cyber Attack Zero Day, Cyber Attack Zoho, Cyber Attack Zeus, Cyber Attack Ziggo, Cyber Zombie Attack, Cyber Attack New Zealand, Cyberbully Zombie Attack, Zappos Cyber Attack,

    Unveiled – As done by “GoMoPa” – Cyber Bulletin: Korean Malware Potentially Used in Sony Pictures Attack

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

     

    The following bulletin was posted on the document sharing website Scribd by Politico Cybersecurity Editor Shaun Waterman.  The bulletin refers to Korean malware used by “unknown computer network exploitation (CNE) operators” that is believed to have been used in the recent attack on Sony Pictures Entertainment.  These actions ressemble to the “GoMoPa” cyber-attacks. The bulletin was first reported by Reuters on December 1, 2014.

    FBI-KoreanMalware

    FBI Liaison Alert System #A-000044-mw

    • 5 pages
    • TLP: GREEN
    • December 1, 2014

    Download

    The FBI is providing the following information with HIGH confidence:

    Destructive malware used by unknown computer network exploitation (CNE) operators has been identified. This malware has the capability to overwrite a victim host’s master boot record (MBR) and all data files. The overwriting of the data files will make it extremely difficult and costly, if not impossible, to recover the data using standard forensic methods. Analysis of this malware is presented to provide the computer network defense (CND) community with indicators of this malware.

    TECHNICAL DETAILS

    The FBI is providing the following information with HIGH confidence:

    This group uses some custom tools that should be immediately flagged if detected, reported to FBI CYWATCH, and given highest priority for enhanced mitigation.
    The aforementioned actors have used identified domains names and IP addresses as both source and/or destination IPs. The FBI is distributing the indicators associated with this attack to enable network defense activities and reduce the risk of similar attacks in the future. The FBI has high confidence that these indicators are being used by CNE operators for further network exploitation. The FBI recommends that your organization help victims identify and remove the malicious code.

    Below are descriptions of malware and associated malware signatures:

    The malware has the following characteristics:

    File: d1c27ee7ce18675974edf42d4eea25c6.bin
    Size: 268579 bytes (262.3 KB)
    MD5: D1C27EE7CE18675974EDF42D4EEA25C6
    PE Compile Time: 2014-11-22 00:06:54
    Language pack of resource section: Korean

    The original filename of this file is unknown, but it was likely “diskpartmg16.exe”. This file serves as a dropper. It drops destructive malware, “igfxtrayex.exe”. When the dropper file was executed, it started a second instance of itself with “-i” as an argument, then terminated.

    The second instance of the dropper file installed itself as the “WinsSchMgmt” service with “-k” as a command line argument, started the service, then terminated.

    The “WinsSchMgmt” service executed the file with “-k” as an argument, which started another instance of the file using “-s” as an argument.

    The “-s” instance dropped and executed “igfxtrayex.exe”, created “net_ver.dat”, and began generating network traffic over TCP ports 445 and 139 to victim IP addresses.

    The following files were added:
    C:\Documents and Settings\User\Desktop\igfxtrayex.exe
    C:\WINDOWS\system32\net_ver.dat

    The following strings of interest were in this dropper file:

    – – – BEGIN STRINGS – – –
    recdiscm32.exe
    taskhosts64.exe
    taskchg16.exe
    rdpshellex32.exe
    mobsynclm64.exe
    comon32.exe
    diskpartmg16.exe
    dpnsvr16.exe
    expandmn32.exe
    hwrcompsvc64.exe
    cmd.exe /q /c net share shared$ /delete
    \\%\admin$\syswow64
    \\%s\admin$\system32
    cmd.exe /q /c net share shared$=%SystemRoot%
    cmd.exe /q /c net share shared$=%SystemRoot% /GRANT:everyone, FULL
    RasSecurity
    RasMgrp
    cmd.exe /c wmic.exe /node: ”%s” /password: “%s” PROCESS CALL CREATE “%s” >
    %s
    WinsSchMgmt
    Windows Schedule Management Service
    – – -END STRINGS – – –

    File: net_ver.dat
    Size: 4572 bytes (4.5 KB)
    MD5: 93BC819011B2B3DA8487F964F29EB934

    This is a configuration file containing what appear to be hostnames, IP addresses, and the number 2. Entries in the file have the structure “HOSTNAME | IP Address | 2”. The victim IP addresses in this file correspond with the victim IP addresses listed under the file with MD5 hash D1C27EE7CE18675974EDF42D4EEA25C6 (noted above).

    File: igfxtrayex.exe
    Size: 249856 bytes (244.0 KB)
    MD5: 760c35a80d758f032d02cf4db12d3e55
    PE Compile Time: 2014-11-24 04:11:08
    Language pack of resource section: Korean

    This file is destructive malware: a disk wiper with network beacon capabilities. If “igfxtrayex.exe” is run with no parameters, it creates and starts a copy of itself with the “–i” argument. After 10 minutes, the “igfxtrayex.exe” makes three copies of itself and places them in the same directory it was executed from. These copies are named according to the format “taskhostXX.exe” (where X is a randomly generated ASCII character). These copies are then executed, each with a different argument (one being “-m”, one being “-d” and the other “-w”). Network connection attempts are made to one of three hard-coded IP addresses in a random order to either port 8080 or 8000. If a connection to the IP address cannot be made, it attempts to connect to another of the three IP addresses, until connections to all three IP addresses have been attempted. The following command-line string is then executed: “cmd.exe /c net stop MSExchangeIS /y”. A 120 minute (2 hour) sleep command is issued after which the computer is shutdown and rebooted.

    File: iissvr.exe
    Size: 114688 bytes (112.0 KB)
    MD5: e1864a55d5ccb76af4bf7a0ae16279ba
    PE Compile Time: 2014-11-13 02:05:35
    Language pack of resource section: Korean

    This file when executed starts a listener on localhost port 80. It has 3 files contained in the resource section, all xor’d with 0x63.

    File: usbdrv3_32bit.sys
    Size: 24280 bytes (23.7 KB)
    MD5: 6AEAC618E29980B69721158044C2E544
    PE Compile Time: 2009-08-21 06:05:32

    This SYS file is a commercially available tool that allows read/write access to files and raw disk sectors for user mode applications in Windows 2000, XP, 2003, Vista, 2008 (32-bit). It is dropped from resource ID 0x81 of “igfxtrayex.exe”.

    File usbdrv3_64bit.sys
    Size: 28120 bytes (27.5 KB)
    MD5: 86E212B7FC20FC406C692400294073FF
    PE Compile Time: 2009-08-21 06:05:35

    This SYS file is a also a commercially available tool that allows read/write access to files and raw disk sectors for user mode applications in Windows 2000, XP, 2003, Vista, 2008 (64-bit). It is dropped from resource ID 0x83 of “igfxtrayex.exe”.

    RECOMMENDED STEPS FOR INITIAL MITIGATION

    The following Snort signature can be used to detect the beacon traffic, though by the time the beacons occur, the destructive process of wiping the files has begun:

    Alert tcp any any – > [88.53.215.64, 217.96.33.164, 203.131.222.102] [8080, 8000] (msg: “wiper_callout”; dsize:42; content: “|ff ff ff ff|”; offset: 26; depth: 4; sid: 314;)

    The following YARA signatures will detect this malware on the host:

    rule unknown_wiper_str{

    meta: unique string in wiper malware

    strings:

    $STR1 = “#99E2428CCA4309C68AAF8C616EF3306582A64513E55C786A864BC83DAFE0C78585B692047273B0E55275102C66” fullword nocase

    $MZ = “MZ”

    condition:

    $MZ at 0 and $STR1

    }

    rule unknown_wiper_IPs{

    meta: unique IPs in wiper malware

    strings:

    $IP1 = “203.131.222.102” fullword nocase
    $IP2 = “217.96.33.164” fullword nocase
    $IP3 = “88.53.215.64” fullword nocase
    $MZ = “MZ”

    condition:

    $MZ at 0 and all of them

    }

    rule unknown_wiper_error_strings{

    meta: unique custom error debug strings discovered in the wiper malware

    strings:

    $ERR1 = “$MFT Record read failed.” fullword nocase
    $ERR2 = “Drive Boot Sector read failed.” fullword nocase
    $ERR3 = “SetFilePointer failed.” fullword nocase
    $MZ = “MZ”

    condition:

    $MZ at 0 and all of them

    }

    Reporting Notice

    The FBI encourages recipients who identify the use of tool(s) or techniques discussed in this document to report information to their local FBI field office or the FBI’s 24/7 Cyber Watch (CyWatch). Field office contacts can be identified at http://www.fbi.gov/contact-us/field. CyWatch can be contacted by phone at 855-292-3937 or by e-mail at CyWatch@ic.fbi.gov. When available, each report submitted should include the date, time, location, type of activity, number of people, and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact.

    Korean Malware, North Korea Malware, South Korea Malware Attack, South Korea Malware Attack, North Korea Malware, South Korea Malware Attack,

     

    US Financial Crimes Enforcement Network – Secret Document

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Financial Crimes Enforcement Network; Notice of Proposed Rulemaking; Cross-Border Electronic Transmittals of Funds

    • 81 pages

    Download

    FinCEN, a bureau of the Department of the Treasury (Treasury), to further its efforts against money laundering and terrorist financing, and as required by 31 U.S.C. § 5318(n), is proposing to issue regulations that would require certain banks and money transmitters to report to FinCEN transmittal orders associated with certain cross-border electronic transmittals of funds (CBETFs). FinCEN is also proposing to require an annual filing with FinCEN by all banks of a list of taxpayer identification numbers of accountholders who transmitted or received a CBETF.

    Implications and Benefits of Cross-Border Funds Transmittal Reporting

    • 169 pages
    • January 2006

    Download

    Section 6302 of the Intelligence Reform and Terrorism Prevention Act of 2004 requires, among other things, that the Secretary of the Treasury study the feasibility of “requiring such financial institutions as the Secretary determines to be appropriate to report to the Financial Crimes Enforcement Network certain cross-border electronic transmittals of funds, if the Secretary determines that reporting of such transmittals is reasonably necessary to conduct the efforts of the Secretary against money laundering and terrorist financing.”

    Under current FinCEN regulation, 31 C.F.R. § 103.33 (the “recordkeeping rule”), financial institutions are generally required to collect and retain records of certain specified data regarding funds transfers they process of $3,000 or more. Because the recordkeeping rule does not distinguish between domestic and international funds transfers, financial institutions must make and maintain records on all transmittals of at least $3,000. Further, the rule states that while institutions need not retain the information in any particular manner, their records must be in a format that is retrievable. The recordkeeping rule does not require financial institutions to report to the Financial Crimes Enforcement Network (FinCEN) the information they maintain, but only requires that the data be available upon request to FinCEN, to law enforcement, and to regulators to whom FinCEN has delegated Bank Secrecy Act (BSA) compliance examination authority through the examination process.

    In January 2007, FinCEN released a report on the Feasibility of a Cross-Border Electronic Funds Transfer Reporting System under the Bank Secrecy Act (BSA), hereafter referred to as “The Feasibility Study.” The Feasibility Study concluded that the collection of Cross-Border Funds Transmittal (CBFT) data would be feasible. However, at the time, it was also determined that further analysis would be needed to assess the implications of CBFT reporting to the financial industry and the benefits to law enforcement.


    Feasibility of a Cross-Border Electronic Funds Transfer Reporting System under the Bank Secrecy Act

    • 187 pages
    • October 2006

    Download

    We propose an incremental development and implementation process. If the concerns noted above or any as-yet unidentified issues would impede the project or cause it to be infeasible, this incremental approach provides the opportunity to alter or halt the effort before FinCEN or the U.S. financial services industry incurs significant costs. As discussed in greater detail in this Report, the first phase in this project will comprise:

    Engaging with partners in the law enforcement, regulatory and intelligence communities to develop detailed user requirements to meet the most central needs of those who access BSA data.

    Engaging in a detailed discussion with representatives of the U.S. financial services industry, along with representatives of the major payment systems and members of the Canadian and Australian financial services industries. These discussions would focus on quantifying the cost the proposed requirement would impose on reporting institutions and the potential impact on the day-to-day operation of the payment systems.

    Engaging outside support to obtain and analyze a sizable sample of cross-border funds transfer data and exploring means of extracting value from the data, and identifying means to effectively and intelligently use the data to advance efforts to combat money laundering and illicit finance.

    Based on these efforts, FinCEN will create a development plan that incorporates a series of milestones and would permit pilot testing of different aspects of the reporting system. This incremental development approach will enable FinCEN to build the system in manageable stages and to test the system’s functionality at each stage before moving on to the next.

    SECRET – FBI Cyber Bulletin: Malicious Actors Targeting Protected Health Information

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    FBI-TargetingHealthcare

    FBI Liaison Alert System #A-000039-TT

    • 1 page
    • August 19, 2014

    Download

    The FBI is providing the following information with HIGH confidence. The FBI has observed malicious actors targeting healthcare related systems, perhaps for the purpose of obtaining Protected Healthcare Information (PHI) and/or Personally Identifiable Information (PII). These actors have also been seen targeting multiple companies in the healthcare and medical device industry typically targeting valuable intellectual property, such as medical device and equipment development data.

    TECHNICAL DETAILS

    The FBI has received the following information pertaining to a recent intrusion into a health care system that resulted in data exfiltration. Though the initial intrusion vector is unknown, we believe that a spear phish email message was used to deliver the initial malware. Typically, these actors use Information Technology themed spear-phishing messages which contain a malicious link that may connect to a new VPN site/service/client or a new Webmail site/software. Once access is obtained, the actors may collect and use legitimate account credentials to connect to the targeted system, usually through VPN.

    The following are indicators of possible compromise:

    Network-Based Indicator

    Outgoing traffic through standard HTTP/HTTPS ports 80, 443 (and possibly others), but obfuscates traffic by XORing the traffic with 0×36. The below is a SNORT signature related to this activity:
    alert tcp any any -> any any (content:”|6E|”; depth: 1; content:”|36 36 36 58 36 36 36|”; offset: 3; depth: 7; msg: “Beacon C2″; sid: 1000000001; rev:0)

    Host-Based Indicator

    The malware runs as a Windows service “RasWmi (Remote Access Service)” from the malicious .dll C:\Windows\system32\wbem\raswmi.dll. The implant is installed from an executable file (the file has been observed under a variety of names) which drops the raswmi.dll file into the same directory and sets it to run as a service.

    Revealed – Feds Issue Bulletin on Google Dorking

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

     

     

    An examples

    A bulletin issued by the Department of Homeland Security, the FBI and the National Counterterrorism Center earlier this month warns law enforcement and private security personnel that malicious cyber actors can use “advanced search techniques” to discover sensitive information and other vulnerabilities in websites.  The bulletin, titled “Malicious Cyber Actors Use Advanced Search Techniques,” describes a set of techniques collectively referred to as “Google dorking” or “Google hacking” that use “advanced operators” to refine search queries to provide more specific results.  Lists of these operators are provided by Google and include the following examples:

    allintext: / intext: Restricts results to those containing all the query terms you specify in the text of the page
    allintitle: / intitle: Restricts results to those containing all the query terms you specify in the title
    allinurl: / inurl: Restricts results to those containing all the query terms you specify in the URL
    filetype:suffix Limits results to pages whose names end in suffix
    site: Using the site: operator restricts your search results to the site or domain you specify
    Minus sign  ( – ) to exclude Placing  a minus sign immediately before a word indicates that you do not want pages that contain this word to appear in your results
    Phrase search (using double quotes, “…” ) By putting double quotes around a set of words, you are telling Google to consider the exact words in that exact order without any change

    Here is an example of a query constructed from these operators:

    “sensitive but unclassified” filetype:pdf site:publicintelligence.net

    The bulletin warns that malicious cyber actors can use these techniques to “locate information that organizations may not have intended to be discoverable by the public or to find website vulnerabilities for use in subsequent cyber attacks.”  Hackers searching for “specific file types and keywords . . . can locate information such as usernames and passwords, e-mail lists, sensitive documents, bank account details, and website vulnerabilities.”  Moreover, “freely available online tools can run automated scans using multiple dork queries” to discover vulnerabilities.  In fact, the bulletin recommends that security professionals use these tools “such as the Google Hacking Database, found at http://www.exploit-db.com/google-dorks, to run pre-made dork queries to find discoverable proprietary information and website vulnerabilities.”

    Several security breaches related to the use of “advanced search techniques” are also referenced in the bulletin.  One incident in August 2011 resulted in the compromise of the personally identifiable information of approximately 43,000 faculty, staff, students and alumni of Yale University.  The information was located in a spreadsheet placed on a publicly accessible File Transfer Protocol (FTP) server and was listed in Google search results for more than ten months prior to being discovered.  Another incident in October 2013 involved attackers using Google dorking to discover websites running vulnerable versions of vBulletin message board software prior to running automated tools that created administrator accounts on the compromised sites.  As many as 35,000 websites were believed to have been compromised in the incident.

    Steckt der “Kinderfreund” RA Jochen Resch alias “Onkel Jochen” hinter dem “GoMoPa”-Kinderportal ?

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    onkel jochenwolf-im-schafspelz

    Nach dem von uns dokumentierten Frankfurter Puffbesuch des “GoMoPa-Präsidenten Klaus-Dieter Maurischat” sagen Insider , daß wohl der eigentliche “GoMoPa”Boss RA Jochen Resch, der erwiesene “Kinderfreund”, Initiator des “GoMoPa”-Kinderportals ist, daß offiziell vom Netz genommen wurde, nachdem wir berichteten,  aber in anderer Form in den Darkrooms des Internets weiter existiert…Dies erklärt Vieles !!!!

    Hier noch einmal die Screenshots von “Onkel Jochens Kinderportal” mit “Sexualaufklärung”

    Cybercrime – FBI Blackshades Remote Access Tool Private Sector Bulletins and Domain List

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    FBI Private Industry Notification: FBI led takedown of “Blackshades Remote Access Tool” purchasers, developers Download
    FBI Liaison Alert System #R-000029-MW Download
    Blackshades Domain List Download XLSView TXT

    (U) On 13 May 2014, FBI NY initiated a coordinated takedown focusing on individuals who purchased the Blackshades malware. Field offices across the United States, as well as foreign partners, engaged in subject interviews, searches, hardware seizures, and arrests. The FBI seized the primary domain utilized to purchase Blackshades products.

    (U) Impact

    (U) Blackshades has several products marketed for $5 to $40 USD, most of which are malware. These products include Blackshades Remote Access Tool (RAT), Blackshades Password Recovery, Blackshades Stealth, Blackshades Fusion, Blackshades Commander, Blackshades Crypter, and Blackshades Virtual Private Network (VPN). The most popular and versatile product sold by Blackshades is the Blackshades RAT. These are purchased as “off the shelf” products with a wide variety of features that allow a cyber criminal to use as they desire. Once the victim computer is infected, common uses for Blackshades include: access to victims’ computers; theft of passwords and credentials; key-logging ability; and Distributed Denial of Service attacks.

    (U) Prior to the coordinated actions, two subjects associated with the Blackshades organization were arrested. Alex Yucel was identified as the developer of the Blackshades malware. Yucel not only wrote software code behind the malware, but also was responsible for improvements and updates to the malware and control of the Blackshades server. Yucel was arrested by Moldovan authorities in November 2013 and is currently awaiting extradition to the United States. Michael Hogue, a known seller and “customer service advisor” in the Blackshades organization was arrested in June 2012 and subsequently pled guilty to the charges against him.

    (U) How Blackshades Connects to Victim’s Computers:

    (U) In order for a connection to be established, the malware on a victim computer must know the IP address and listening port on the command and control computer. Given that many users have a dynamic IP address controlled and assigned by their Internet Service Provider, the malware is programmed to call to a unique domain names created by the Blackshades user. The Blackshades user associated this name with their IP address using any domain hosting service of their choice. In this manner, when the malware calls to the established domain, standard DNS protocols will route the malware to the Blackshades user’s IP address.

    (U) The FBI is providing approximately 13,600 domains used by Blackshades users, which have been observed receiving status updates or have participated in previous attacks. These URLs are located within the United States and worldwide. The FBI is distributing these indicators to enable identification of Blackshades infections on their networks. The FBI has high confidence that these indicators were involved in past Blackshades related activity. The FBI recommends that your organization help victims identify and remove the malicious code.

    Notes on Domain List: Computers infected with Blackshades may make DNS queries for these domains and attempt to connect to the corresponding IP addresses (usually on destination port 3080, 3333 or 4444). Disclaimer: these domains may be used for legit traffic.

    FBI-BlackshadesAlert-1

    Urteil wird Suchmaschinen-Terror der STASI-GoMoPa brechen

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Das aktuelle Urteil in Sachen Google wird bei Anwendung den Suchmaschinen-Terror der alten STASI-Clique der GoMoPa und deren  IM , Partner und Auftraggeber stoppen. Das ist das Urteil:

     

    Das Urteil des Europäischen Gerichtshofs (EuGH) hat das Zeug, das Internet zu verändern. Es räumt den Europäern das Recht ein, von Google vergessen zu werden. Dies kann eingeklagt werden, wenn die Ergebnisse der Suchmaschine das Recht auf Privatsphäre verletzen. Experten erwarten eine Klagewelle.

    Das Urteil aus Luxemburg fiel überraschend aus. Das vorausgegangene Gutachten, dem das Gericht sonst oft folgt, hatte unter Verweis auf die Meinungsfreiheit ein Recht auf das Vergessenwerden bestritten. Nun aber erklären die Richter eindeutig: Ein Suchmaschinenbetreiber ist für die von ihm aggregierten Suchergebnisse verantwortlich (Rechtssache C-131/12).

    Im Umkehrschluss heißt das: Google und im Prinzip auch andere Betreiber, können dazu verpflichtet werden, Links auf Webseiten zu löschen. Dies gilt aber nur unter der Voraussetzung, dass die Suchergebnisse das Persönlichkeitsrecht verletzen, also sensible persönliche Daten ausspielen, die das Recht auf Privatsphäre tangieren.

    Was das bedeutet, lässt sich am Beispiel des konkreten Falles erahnen, der gegen Google vor Gericht gezogen war. Der Spanier Mario Costeja González hatte geklagt, weil Google bei der Eingabe seines Namens bis heute einen für ihn unangenehmen Artikel ausspielt: Darin berichtet eine katalanische Tageszeitung über die Pfändung seines Hauses im Jahr 1998.

    Der Kläger befand, dieses Kapitel in seiner Biographie habe sich inzwischen vollständig erledigt und verdiene keine Erwähnung mehr. Der Ärger ist nachvollziehbar. Das Suchergebnis ließ zweifellos Costeja González zweifellos in einem ungünstigen Licht erscheinen.

    Ein spanisches Gericht hatte den Fall zur grundsätzlichen Klärung an den EuGH überwiesen. Dessen Urteil lässt Costeja González nun hoffen.

    Google, die Krake

    Zur Begründung seiner Entscheidung verweist das Gericht auf die EU-Datenschutzrichtlinie. In ihr sind die Mindeststandards für den Datenschutz geregelt, ausformuliert durch die Mitgliedstaaten. Dabei spielt auch die sogenannte Verarbeitung personenbezogener Daten eine Rolle, aus denen sich beispielsweise Persönlichkeitsprofile herstellen lassen.

    Fraglich blieb lange, ob auch Suchmaschinen wie Google Daten verarbeiten. Die Betreiber argumentierten, man verweise doch nur auf ohnehin im Netz verfügbare Informationen. Nun aber stellt der EuGH fest: Auch ein Suchmaschinenbetreiber für die Verarbeitung von Daten verantwortlich. Pointiert formuliert: Die Richter sehen in Google die Datenkrake, die durch die Ansammlung von Informationen das Gesamtbild über eine Person und ihr Leben herstellt.

    Wörtlich heißt es in einer Mitteilung zum Urteil:

    “In seinem heutigen Urteil stellt der Gerichtshof zunächst fest, dass der Betreiber einer Suchmaschine , indem er automatisch, kontinuierlich und systematisch im Internet veröffent lichte Informationen aufspürt , eine “Erhebung” von Daten im Sinne der Richtlinie vornimmt, Daten, die er dann mit seinen Indexierprogrammen “ausliest”, “speichert” und “organisiert”, auf seinen Servern “aufbewahrt” und gegebenenfalls in Form von Ergebnislisten an seine Nutzer “weitergibt” und diesen “bereitstellt”.

    Zur Begründung heißt es weiter: Mit der Eingabe eines Namens bei einer Suchmaschine könne ein Nutzer “ein mehr oder weniger detailliertes Profil der gesuchten Personen erstellen”. Dies sei ein Eingriff in die Rechte der Person. Die Ergebnisse seien nichts anderes als eine Verarbeitung von personenbezogenen Daten.

    Das EU-Recht verlange daher einen Ausgleich zwischen den Interessen der Nutzer und denen der betroffenen Person. “Wegen seiner potenziellen Schwere kann ein solcher Eingriff nicht allein mit dem wirtschaftlichen Interesse des Suchmaschinenbetreibers an der Verarbeitung der Daten gerechtfertigt werden”, heißt es.

    Experten erwarten eine Flut an Beschwerden

    Experten gehen davon aus, dass Verbraucher Google nun mit einer Flut an Löschanfragen überschwemmen. “Das Urteil hat das Potenzial, die Funktionsfähigkeit von Suchwerkzeugen erheblich einzuschränken und damit auch die Auffindbarkeit von Inhalten im Netz zu beeinträchtigen”, schrieb in einer Reaktion Rechtsanwalt Thomas Stadler, ein Experte für Internetrecht.

    Google teilte zu dem Urteil mit: “Dies ist ein sehr enttäuschendes Urteil für Suchmaschinenbetreiber und Online-Verleger.” Das Unternehmen hatte in dem Verfahren argumentiert, es sei laut EU-Datenschutzrichtlinie nicht verantwortlich dafür, dass personenbezogene Daten auf den jeweiligen Webseiten gemäß der Richtlinie verarbeitet werden.

    Google könne nicht einmal zwischen personenbezogenen und anderen Daten unterscheiden. Deshalb könne auch eine nationale Datenschutzbehörde die Suchmaschine nicht verpflichten, bestimmte Informationen aus ihrem Index zu entfernen.

     

    Der für Google zuständige Landesdatenschutzbeauftragte von Hamburg, Johannes Caspar, rät den Bürgern, nach dem neuen Urteil des Europäischen Gerichtshofs gegen Google frühere Einträge löschen zu lassen. Caspar sagte unserer Redaktion: “Wir können die Bürger nur auffordern, ihr Recht auf informationelle Selbstbestimmung eigenständig zu verfolgen. Es kann damit gerechnet werden, dass sich viele Betroffene an Google wenden werden, um für sie belastende Einträge aus früheren Zeiten tilgen zu lassen. Wir gehen davon aus, dass Google dies auch konstruktiv im Sinne des Urteils umsetzt.”

    Glenn Greenwald – Wie die Cyber-STASI das Internet zur Reputations-Zerstörung einsetzt

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

     

    https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/

    Revealed – DHS National Cybersecurity and Communications Integration Center Heartbleed Advisories

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    The following advisories were issued by the National Cybersecurity and Communications Integration Center on April 10, 2014.  Both notices are marked with distribution restrictions based on US-CERT Traffic Light Protocol.  The advisory marked with TLP: GREEN is not intended for public distribution.

    “Heartbleed” OpenSSL Vulnerability TLP: GREEN 4 pages Download
    “Heartbleed” OpenSSL Vulnerability TLP: WHITE 2 pages Download

    Security researchers from Google Security recently discovered a vulnerability with the Heartbeat extension (RFC6520) to OpenSSL’s Transport Layer Security (TLS) and the Datagram Transport Layer Security (DTLS) protocols. According to open source reports, the vulnerability has existed within certain OpenSSL frameworks since at least 2012. The Heartbeat extension is functionally a “keep-alive” between end-users and the secure server. It works by sending periodic “data pulses” of 64KB in size to the secure server and once the server receives that data; it reciprocates by re-sending the same data at the same size. The out-of-bounds “read” vulnerability exists because the Heartbeat extension in OpenSSL versions 1.0.1 through and 1.0.2-beta (including 1.0.1f and 1.0.2-beta1) do not properly validate the data being sent from the end-user. As a result, a malicious actor could send a specially-crafted heartbeat request to the vulnerable server and obtain sensitive information stored in memory on the server. Furthermore, even though each heartbeat only allows requests to have a data size limited to 64KB segments, it is possible to send repeated requests to retrieve more 64KB segments, which could include encryption keys used for certificates, passwords, usernames, and even sensitive content that were stored at the time. An attacker could harvest enough data from the 64KB segments to piece together larger groupings of information which could help an attacker develop a broader understanding of the information being acquired.

    According to a Trusted Third Party, exploit code written in Python Script has been observed in publicly available online outlets. There have also been a number of underground forums discussing the vulnerability, which indicates interest from nefarious actors. Internal Trusted Third Party assessments reveal that the code is 100% effective against the specific versions of SSL protocol noted above. However, at this time it has not been observed having the capability to compromise all SSL protocols. It is also important to note that at this time there have been no reported malicious attacks that exploit this vulnerability.

    The following vendors and products may include vulnerable OpenSSL versions within their product distributions:8
    • CentOS Project – CentOS 6
    • Debian Project – Debian GNU/Linux 7.0
    • FreeBSD Project – FreeBSD 10.0 and prior
    • Gentoo Foundation – Gentoo releases through 8 April 2014
    • Novell, Inc – openSUSE 12.3 and 13.1
    • Red Hat Inc – Fedora 19 and 20, Enterprise Linux/Desktop/HPC Node/Server/Workstation v.6; Enterprise Linux Server AUS v.6.5; Enterprise Linux Sever EUS v.6.5.z Enterprise Virtualization 3; and Storage Server 2.1
    • Android mobile devices
    • Third Party code using Python/Perl/Ruby
    • OpenVPN
    • Aruba Networks: ArubeOS 6.3.x and 6.4.x; ClearPass 6.1.x, 6.2.x, and 6.3.x
    • Check Point Software Technologies: All versions of Security Gateway, Security Management, Multi-Domain Management/Provider-1, Data Center Security appliances, Endpoint Security Server, Endpoint Connect and SSL Network Extender, Gaia, Gaia Embedded, SecurePlatform 2.6, SecurePlatform Embedded, IPSO 4.x, IPSO 5.x, IPSO 6.2
    • Cisco Systems: AnyConnect Secure Mobility Client for iOSl Desktop Collaboration Experience DX650, Unified 7900, 8900, 9900 series IP Phones, TelePresence Video Communication Server (VCS)
    • Fortinet Inc: FortiGate (FortiOS) 5.0 and higher, FortiAuthenticator 3.0 and higher, FortiMail 5.0 and higher, FortiVoice, and FortiRecorder
    • Juniper Networks: JUNOS OS 13.3R1, Odyssey Client 5.6r5 and later, IVEOS 7.4r1 and later as well as 8.0r1 and later, UAD 4.4ra and layer as well as 5.0r1 and later, JUNOS Pulse (Desktop) 4.0r5 and later as well as 5.0r1 and later, Network Connect 7.4r5 through 7.4r9.1 and 8.0r1 through 8.0r3.1, JUNOS Pulse (Mobile) for Android and iOS 4.2r1 and later
    • F5 Networks: BIG-IP AAM 11.5.0 – 11.5.1; BIG-IP AFM 11.5.0 – 11.5.1; BIG-IP Analytics 11.5.0 – 11.5.1; BIG-IP APM 11.5.0 – 11.5.1; BIG-IP ASM 11.5.0 – 11.5.1; BIG-IP Edge Clients for Apple iOS 1.0.5, 2.0.0 – 2.0.1; BIG-IP Edge Clients for Linux 7080 – 7101; BIG-IP Edge Clients for MAC OS X 7080 – 7101; BIG-IP Edge Clients for Windows 7080 – 7101; BIG-IP GTM 11.5.0 – 11.5.1; BIG-IP Link Controller 11.5.0 – 11.5.1; BIG-IP LTM 11.5.0 – 11.5.1; BIG-IP PEM 11.5.0 – 11.5.1; BIG-IP PSM 11.5.0 – 11.5.1

    Many of the vulnerable vendors noted above have already begun issuing patches and have information posted on their websites and portals addressing the vulnerability and a plan of action.

    On a more positive note, the web browsers Firefox, Chrome, and Internet Explorer on Windows OS all use Windows cryptographic implementation, not OpenSSL.

    The nature of this vulnerability is such that if encryption keys are captured by a malicious actor, then previously captured transmissions including usernames, passwords, and other sensitive content could be obtained and decrypted. From an end-user’s perspective, changing passwords before system patches have been implemented could still leave SSL transmissions vulnerable. Until patches are fully implemented, closely monitoring email accounts, bank accounts, social media accounts, and other assets are strongly recommended. End-users can set their web browsers so that they automatically detect revoked certificates; Firefox does this automatically.

    Can I share this product?

    Recipients may share TLP: GREEN information with peers and partner organizations within their sector or community, but not via publicly accessible channels.

    DER GoMoPa-STASI-STIL IM INTERNET NUN AUCH BEIM BRITISCHEN GEHEIMDIENST

    Become a Patron!
    True Information is the most valuable resource and we ask you to give back.

    Neue Dokumente aus dem Fundus von US-Whistleblower Edward Snowden zeigen Methoden der westlichen Geheimdienste zu verdeckten Onlineaktionen gegen Personen, Gruppen und Unternehmen. Eine Präsentation des britischen GCHQ trägt den Titel “Die Kunst der Täuschung” und will “Cyber-Zauberer” ausbilden. Andere Dokumente beschreiben, wie Personen oder Unternehmen mit falschen Angaben gezielt diskreditiert werden können. Der amerikanische Enthüllungsjournalist Glenn Greenwald veröffentlichte das Material in seinem neuen Portal The Intercept. Aktivisten wie Jacob Appelbaum und Frank Rieger verwiesen über Twitter unter anderem unter Hastags wie #stasi, #zersetzung und #Mfs auf frappierende Parallelen zu einer entsprechenden Richtlinie der Stasi aus dem Jahr 1976.

    Hinter den Konzepten steht eine neu gebildete Einheit des GCHQ, die Joint Threat Research Intelligence Group (JTRIG). Diese führte auch DDoS-Angriffe gegen Aktivisten von Anonymous aus. Nach Darstellung Greenwalds richten sich die Infiltrationstechniken nicht gegen normale Spionageziele wie feindliche Staaten und deren Führer, sondern anstelle strafrechtlicher Ermittlungen gegen verdächtige Hacktivisten, die weder angeklagt noch verurteilt seien. Ein Dokument trägt die Überschrift: “Neue Möglichkeiten und Aktionen gegen Hacktivismus eröffnen.”

     

    Gezielte Rufschädigung

    Die Methoden der Rufschädigung sind rabiat: So soll über soziale Netzwerke das Vertrauen von Zielpersonen erschlichen werden, um sich dann auf einem Blog als Opfer dieser Personen darstellen zu können. Der Familie sowie Freunden und Bekannten sollen E-Mails oder SMS geschrieben werden. Um Unternehmen zu diskreditieren, sollen vertrauliche Informationen an die Presse weitergegeben werden. Auf einschlägigen Foren soll negativ über die Firma berichtet werden. Darüber hinaus sollen Geschäfte beendet und Geschäftsbeziehungen ruiniert werden. In der erwähnten Richtlinie der Stasi wurden vergleichbare “bewährte Formen der Zersetzung” genannt: “systematische Diskreditierung des öffentlichen Rufes, des Ansehens und des Prestiges auf der Grundlage miteinander verbundener wahrer, überprüfbarer und diskreditierender sowie unwahrer, glaubhafter, nicht widerlegbarer und damit ebenfalls diskreditierender Angaben; systematische Organisierung beruflicher und gesellschaftlicher Mißerfolge zur Untergrabung des Selbstvertrauens einzelner Personen”.

    Die Geheimdienste bedienen sich dabei auch Erkenntnissen aus Psychologie und Sozialwissenschaften, um Aktivistengruppen nicht nur zu verstehen, sondern auch um sie zu kontrollieren. Eine “Humanwissenschaftliche Operationszelle” soll sich dabei “Strategischer Beeinflussung und Störungen” widmen. Einzelne Dokumente tragen dabei Titel wie “Die psychologischen Bausteine der Täuschung” oder die “Zehn Prinzipien der Beeinflussung”. Die Präsentation beschreibt zudem die “Feststellung und Ausnutzung von Bruchstellen” in Gruppen. Als Methoden der Störung sind dabei sieben Operationen genannt, darunter “Falsche Flagge”, “Falsche Rettung”, Infiltration und List.

    Das GCHQ wollte auf Anfrage Greenwalds keine Stellung zu den Dokumenten nehmen. Der Nachrichtendienst gab die Standardantwort, wonach keine geheimdienstlichen Themen kommentiert würden. Zudem erfolge jede Tätigkeit “in einem strikten rechtlichen und polizeilichen Rahmen, der garantiere, dass die Aktivitäten autorisiert, notwendig und angemessen sind”. Ob und in welchem Umfang die Methoden tatsächlich angewandt wurden, bleibt offen.

     

    Die Dokumente sind hier:

     

    https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/

    SECRET – U.S. Army Cyber Electromagnetic Activities (CEMA) Manual

    The following manual was released by the U.S. Army on February 12, 2014.  The manual was first reported by Steven Aftergood of the Federation of American Scientists.

    FM 3-38 Cyber Electromagnetic Activities

    • 96 pages
    • February 12, 2014

    Download

    FM 3-38, Cyber Electromagnetic Activities, provides overarching doctrinal guidance and direction for conducting cyber electromagnetic activities (CEMA). This manual describes the importance of cyberspace and the electromagnetic spectrum (EMS) to Army forces and provides the tactics and procedures commanders and staffs use in planning, integrating, and synchronizing CEMA.

    This manual provides the information necessary for Army forces to conduct CEMA that enable them to shape their operational environment and conduct unified land operations. It provides enough guidance for commanders and their staffs to develop innovative approaches to seize, retain, and exploit advantages throughout an operational environment. CEMA enable the Army to achieve desired effects in support of the commander’s objectives and intent.

    The principal audience for FM 3-38 is all members of the profession of arms. Commanders and staffs of Army headquarters serving as joint task force or multinational headquarters should see applicable joint or multinational doctrine concerning cyberspace operations, electronic warfare (EW), and spectrum management operations (SMO). Trainers and educators throughout the Army will also use this manual.

    CYBER ELECTROMAGNETIC ACTIVITIES DEFINED
    1-1. Cyber electromagnetic activities are activities leveraged to seize, retain, and exploit an advantage over adversaries and enemies in both cyberspace and the electromagnetic spectrum, while simultaneously denying and degrading adversary and enemy use of the same and protecting the mission command system (ADRP 3-0). CEMA consist of cyberspace operations (CO), electronic warfare (EW), and spectrum management operations (SMO) (see figure 1-1 on page 1-2).

    1-2. Army forces conduct CEMA as a unified effort. Integration is the arrangement of military forces and their actions to create a force that operates by engaging as a whole (JP 1-02). Synchronization is the arrangement of military actions in time, space, and purpose to produce maximum relative combat power at a decisive place and time (JP 1-02). CEMA integrates and synchronizes the functions and capabilities of CO, EW, and SMO to produce complementary and reinforcing effects. Conducting these activities independently may detract from their efficient employment. If uncoordinated, these activities may result in conflicts and mutual interference between them and with other entities that use the electromagnetic spectrum (EMS). CO, EW, and SMO are synchronized to cause specific effects at decisive points to support the overall operation.

    1-3. The CEMA element is responsible for planning, integrating, and synchronizing CO, EW, and SMO to support the commander’s mission and desired end state within cyberspace and the EMS. During execution the CEMA element is responsible for synchronizing CEMA to best facilitate mission accomplishment. (See chapter 2 for more information on the CEMA element.)

    1-4. Cyberspace operations, EW, and SMO are essential to the conduct of unified land operations. While these activities differ in their employment and tactics, their functions and capabilities must be integrated and synchronized to maximize their support to unified land operations. The integration of these activities requires an understanding of the functions and capabilities being employed.

    CYBERSPACE OPERATIONS

    1-5. Cyberspace operations are the employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace (JP 3-0). Cyberspace operations consist of three functions: offensive cyberspace operations, defensive cyberspace operations, and Department of Defense information network operations (see chapter 3).

    ELECTRONIC WARFARE

    1-6. Electronic warfare is any military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy (JP 3-13.1). EW consists of three functions: electronic attack, electronic protection, and electronic warfare support. These functions are referred to as divisions in joint doctrine (see chapter 4).

    SPECTRUM MANAGEMENT OPERATIONS

    1-7. SMO are the interrelated functions of spectrum management, frequency assignment, host-nation coordination, and policy that enable the planning, management, and execution of operations within the electromagnetic operational environment during all phases of military operations. SMO are the management portions of electromagnetic spectrum operations (EMSO). EMSO also include electronic warfare (see chapter 5)

    FUNCTIONS OF CYBERSPACE OPERATIONS

    3-1. Army forces coordinate and integrate CO through CEMA. They do this to gain and maintain freedom of action in cyberspace and as required to achieve periods of cyberspace superiority.

    3-2. Cyberspace superiority is the degree of dominance in cyberspace by one force that permits the secure, reliable conduct of operations by that force, and its related land, air, maritime, and space forces at a given time and place without prohibitive interference by an adversary (JP 1-02). Such interference is possible because large portions of cyberspace are not under the control of friendly forces. Cyberspace superiority establishes conditions describing friendly force freedom of action while denying this same freedom of action to enemy and adversary actors. Ultimately, Army forces conduct CO to create and achieve effects in support of the commander’s objectives and desired end state.

    3-3. CO are categorized into three functions including offensive cyberspace operations (OCO), defensive cyberspace operations (DCO), and Department of Defense information network operations. These functions are described in joint doctrine as missions in cyberspace that require specific actions in cyberspace (see joint doctrine for CO). Figure 3-1 on page 3-2 depicts the three interdependent functions of CO.

    OFFENSIVE CYBERSPACE OPERATIONS

    3-4. Offensive cyberspace operations are cyberspace operations intended to project power by the application of force in or through cyberspace (JP 1-02). Army forces conduct OCO across the range of military operations by targeting enemy and hostile adversary activity and related capabilities in and through cyberspace. OCO are designed to support the commander’s objectives and intent consistent with applicable authorities and legal frameworks. (See paragraph 3-38 for additional information on authorities and other legal considerations.)

    3-5. OCO are conducted in and through cyberspace where information technology infrastructures, along with the people and systems that use them, exist in an area of operations and pervade an operational environment. To varying degrees, host-nation populations, governments, security forces, businesses and other actors rely upon these infrastructures and supporting networks or systems. Given these conditions, OCO require deliberate coordination and integration to ensure desired effects (changes in behavior which do not suggest the ways or means those changes were created) are created and focused at the right place and time in support of the commander’s objectives.

    3-6. Using OCO, commanders can mass effects through the employment of lethal and nonlethal actions leveraging all capabilities available to gain advantages in cyberspace that support objectives on land. For example, cyberspace capabilities and other information-related capabilities may be directed at an enemy weapons system consisting of the targeted platform and its operators. The cyberspace capability could create degrading effects on the platform while an information-related capability influences, disrupts, corrupts, or usurps the decisionmaking of the operator. (See FM 3-13 for additional information on inform and influence activities (IIA) and information-related capabilities.)

    CYBERSPACE ATTACK

    3-7. A cyberspace attack consists of actions that create various direct denial effects in cyberspace (for example, degradation, disruption, or destruction) and manipulation that leads to denial that is hidden or that manifests in the physical domains. For the Army, cyberspace attacks are a type of cyberspace operation employed primarily in support of OCO. Cyberspace attacks are primarily employed outside of LandWarNet, but they are coordinated and deconflicted inside of the Department of Defense information networks (DODIN). (See paragraph 3-24 for additional information on the DODIN.)

    3-8. Army forces conduct or facilitate cyberspace attacks in support of OCO within designated areas of operation. For example, when employed as part of an offensive cyberspace operation, a cyberspace attack may be directed at information resident in, or in transit between, computers (including mobile phones and personal digital assistants) and computer networks used by an enemy or adversary. Enemy or adversary actors may be denied the ability to use resources or have their information resources used for friendly proposes as a result of a cyberspace attack. In every instance, commanders and staffs follow appropriate authorities and legal guidance. (See paragraph 3-38 for additional information on authorities and other legal considerations.)

    3-9. Using specific portions of cyberspace and the electromagnetic spectrum (EMS) as primary pathways or avenues of approach, cyberspace attacks may employ capabilities such as tailored computer code in and through various network nodes such as servers, bridges, firewalls, sensors, protocols, operating systems, and hardware associated with computers or processors. Tailored computer code is only one example of a cyberspace capability (a device, computer program, or technique, including any combination of software, firmware, or hardware) designed to create an effect in or through cyberspace. The development and employment of tailored computer code represents the core and unique technical nature of CO capabilities. Computer code is designed to create specific effects, and when employed this code moves in the form of data packets in and through cyberspace across wired and wireless driven communication technology and systems. Cyberspace attacks must therefore be coordinated and integrated in support of the commander’s objectives and consistent with applicable assessment measures and indicators.

    3-10. Cyberspace attack capabilities are employed to support maneuver operations by creating simultaneous and complementary effects. For example, a cyberspace attack capability may be employed in conjunction with electronic attack, offensive space control, fires, and information related capabilities to deceive, degrade, destroy, and disrupt a specific enemy integrated air defense system or enemy safe haven (see table 3-1 on page 3-4).

     

    Exposed – Jean-Jacques Quisquater on Alleged NSA-GCHQ Hack

    Jean-Jacques Quisquater on Alleged NSA-GCHQ Hack

    Thanks to Jean-Jacques Quisquater.

     


    Comments about “NSA-GCHQ Allegedly Hack Cryptographer Quisquater”

    More info written by Jean-Jacques Quisquater.

    This text was updated on February 6, 2014 in the afternoon (Belgian time).

    Since February 1st 2014 many papers appeared in the newspapers and on internet concerning  the hack of the personal portable computer of Jean-Jacques Quisquater (JJQ). See

    http://www.pcworld.com/article/2093700/prominent-cryptographer-victim-of-malware-attack-related-to-belgacom-breach.html
    http://www.theregister.co.uk/2014/02/03/nsa_gchq_accused_of_hacking_belgian_smartcard_crypto_guru/
    http://yro.slashdot.org/story/14/02/03/1239223/crypto-legend-quisquater-targeted—but-nsa-may-not-be-to-blame

    Unfortunately many of these papers suffer from approximations and extrapolations and some of them are wrong.

    The following text is intended to clarify the context of the attack as much as possible as the investigations are not complete at this stage.

    In short:

    -Facts: Yes, this portable computer was attacked. We don’t know for sure the vector of the attack in use. According to the Belgian Federal Police the attack of this computer is strongly related to the attack of Belgacom in Belgium allegedly hacked by NSA-GCHQ.

    The only found vector of attack is related to an email spoofing a linkedin email mentioning a name close to a name known by JJQ. From this email, JJQ opened a link  to a profile of the mentioned person and JJQ immediately understood it was a spoof and closed his computer in one second. The computer was later extensively scanned by several malware detectors without result. Possibly another vector of attack was used but there is no trace of it.

    -Data available on the computer: There was no sensible data on the computer. The main part of  the JJQ’s work is the design of (formal) methods related to cryptography and computer security and this activity is twofold:

       – Methods related to the academic world finally anyway published in conferences, journals, patents and standards. Privacy concerning reviews of scientific papers is important to write these reviews without external pressure, the content is nevertheless not critical.   – Activities related to sensible data of companies always follow a very strict procedure which lead to a very strong level of security
    (the use of safes, only in company rooms, dedicated computers without connection, destruction of all the data at the end of the study). Therefore no sensible information related to companies is available on this personal computer.

    Companies are only using the practical ideas of JJQ in the spirit of the main principle of Kerckhoffs (« only the key is secret ») and
    of Shannon (« The enemy knows the system »).

    -The purpose of the attack:  we don’t know. Maybe the cryptography research is under surveillance, maybe some people hope to find some interesting information or contact, maybe there is another goal we will never know.

    More precisely:

    – September 16, 2013: the Belgian newspaper De Standard announced an attack of Belgacom (main communication operator in Belgium) by the NSA (links in Dutch):

    http://www.standaard.be/cnt/dmf20130915_00743233
    http://www.standaard.be/cnt/dmf20130916_00743534

    – September 16, 2013 (same day in the afternoon): Jean-Jacques Quisquater received an email spoofing a linkedin email,
    opened a link to a profile of somebody he was thinking he knows, saw immediately it was a spoof and closed in one second
    his computer. The computer was strongly scanned by several malware detectors without result.

    JJQ comments: It is not sure that this attack was working and is related to the main attack against the computer but the dates are matching. Other people were also attacked in Belgium. We don’t know the vector of the “winning” attack (phishing, injection packet
    through Quantum Insert, … ?).

    – September 20, 2013: Der Spiegel announced an attack of Belgacom by GCHQ using tools from NSA, from the files of Snowden: see

    http://www.spiegel.de/international/europe/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html

    – November 8, 2013: the Federal Police contacted JJQ to discuss with him.

    – November 12, 2013: meeting with people from the Federal Police. They announced that the computer was strongly attacked by a targeted attack (it means an attack where there is only one target: it is nearly impossible to detect it). The attack was directly related to the Belgacom attack. The used malware is very clever, very difficult to detect, impossible to remove using currently available antivirus. In fact the malware was only active when outside the personal home. The communications between the malware in the computer and the servers at Belgacom are encrypted: so only metadata are possibly usable for the investigations. It is thus also impossible that any large content from the computer was communicated. No confidential information (commercial or not) was on this computer.

    – December 2, 2013: The attack was confirmed and is still under investigation. Later it was learnt that the malware is likely a variant of the malware miniduke:

    https://www.securelist.com/en/blog/208194129The_MiniDuke_Mystery_PDF_0_day_Government_Spy_Assembler_Micro_Backdoor

    This version of the malware is not detected by any currently available antivirus.

    – January 28, 2014: A journalist from De Standaard (Belgian newspapers) contacted JJQ in order to have a meeting because somebody spoke to the journalist about an hacked well-known Belgian cryptographer speaking French (clearly JJQ). This hacking was presented as directly related to the hacking of Belgacom.

    – January 30, 2014: During the meeting the journalists announced that De Standaard will publish a paper about this story on next Saturday.

    – Saturday February 1st, 2014: Publication of their story by De Standaard: http://www.standaard.be/cnt/dmf20140201_011 (translation in English) and the buzz began. JJQ then answered questions from the Belgian TVs RTBF and RTL.

    There are also a lot of information about targeted attacks in:

    http://www.symantec.com/security_response/publications/threatreport.jsp

    Also read this paper from RAID 2012 (the research conference about intrusions):

    http://link.springer.com/chapter/10.1007%2F978-3-642-33338-5_4

     

    
    

     


     

    Unveiled – Chinese Capabilities for Computer Network Operations and Cyber Espionage

     

    Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage

    • 137 pages
    • March 7, 2012

    Download

    The PLA’s sustained modernization effort over the past two decades has driven remarkable transformation within the force and put the creation of modern command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) infrastructure at the heart of the PLA’s strategic guidelines for long term development. This priority on C4ISR systems modernization, has in turn been a catalyst for the development of an integrated information warfare (IW) capability capable of defending military and civilian networks while seizing control of an adversary’s information systems during a conflict.

    Information Warfare Strategy

    PLA leaders have embraced the idea that successful warfighting is predicated on the ability to exert control over an adversary’s information and information systems, often preemptively. This goal has effectively created a new strategic and tactical high ground, occupying which has become just as important for controlling the battlespace as its geographic equivalent in the physical domain.

    The PLA has not publicly disclosed the existence of a computer network operations strategy distinct from other components of IW, such as electronic warfare, psychological operations, kinetic strike, and deception, but rather appears to be working toward the integration of CNO with these components in a unified framework broadly known as “information confrontation.” This concept, as discussed by the PLA, seeks to integrate all elements of information warfare—electronic and non-electronic—offensive and defensive under a single command authority.

    Earlier in the past decade, the PLA adopted a multi-layered approach to offensive information warfare that it calls Integrated Network Electronic Warfare or INEW strategy. Now, the PLA is moving toward information confrontation as a broader conceptualization that seeks to unite the various components of IW under a single warfare commander. The need to coordinate offensive and defensive missions more closely and ensure these missions are mutually supporting is driven by the recognition that IW must be closely integrated with PLA campaign objectives. The creation of what a probable information assurance command in the General Staff Department bureaucracy suggests that the PLA is possibly creating a more centralized command authority for IW that will possibly be responsible for coordinating at least network defense throughout the PLA.

    As Chinese capabilities in joint operations and IW strengthen, the ability to employ them effectively as either deterrence tools or true offensive weapons capable of degrading the military capabilities of technologically advanced nations or hold these nations’ critical infrastructure at risk in ways heretofore not possible for China will present U.S. leaders and the leaders of allied nations with a more complex risk calculus when evaluating decisions to intervene in Chinese initiated conflicts such as aggression against Taiwan or other nations in the Western Pacific region.

    Chinese Use of Network Warfare Against the United States

    Chinese capabilities in computer network operations have advanced sufficiently to pose genuine risk to U.S. military operations in the event of a conflict. A defense of Taiwan against mainland aggression is the one contingency in the western Pacific Ocean in which success for the United States hinges upon the speed of its response and the ability of the military to arrive on station with sufficient force to defend Taiwan adequately. PLA analysts consistently identify logistics and C4ISR infrastructure as U.S. strategic centers of gravity suggesting that PLA commanders will almost certainly attempt to target these system with both electronic countermeasures weapons and network attack and exploitation tools, likely in advance of actual combat to delay U.S. entry or degrade capabilities in a conflict.

    The effects of preemptive penetrations may not be readily observable or detected until after combat has begun or after Chinese computer network attack (CNA) teams have executed their tools against targeted networks. Even if circumstantial evidence points to China as the culprit, no policy currently exists to easily determine appropriate response options to a large scale attack on U.S. military or civilian networks in which definitive attribution is lacking. Beijing, understanding this, may seek to exploit this gray area in U.S. policymaking and legal frameworks to create delays in U.S. command decision making.

    Key Entities and Institutions Supporting Chinese Computer Network Operations

    The decision to employ computer network operations and INEW capabilities rests with the senior political and military leadership and would be part of a larger issue of employing force during a crisis. Once that decision was made, however, the operational control for the military use of CNO rests with the PLA’s Third and Fourth Departments of the General Staff Department (GSD). The Third Department (3PLA), China’s primary signals intelligence collector is likely tasked with the network defense and possibly exploitation missions. The Fourth Department (4PLA), the traditional electronic warfare arm of the PLA, likely has the responsibility for conducting network attack missions.

    The PRC government actively funds grant programs to support CNO related research in both offensive and defensive in orientation at commercial IT companies and civilian and military universities. A review of PRC university technical programs, curricula, research foci, and funding for research and development in areas contributing to information warfare capabilities illustrates the breadth and complexity of the relationships between the universities, government and military organizations, and commercial high-tech industries countrywide.

    Der Anfang vom Ende des “GoMoPa”-“Nawito”-Google-Terrors

    BGH-Urteil zu Suchmaschinen
    Richter nehmen Google-Vorschläge unter die Lupe
    Ein Kosmetikhersteller hat vor dem BGH ein wegweisendes Urteil erstritten: Künftig können Suchmaschinenbetreiber für Verletzungen des Persönlichkeitsrechts bei sogenannten Autocomplete-Vorschlägen haftbar gemacht werden.

    Von Michael Reissenberger, SWR

    Gernot Lehr, der Anwalt von Bettina Wulff, die ihren Ruf gegen Rotlichtgerüchte vor Gericht verteidigt, hatte den richtigen Riecher, als er kürzlich eine Vertagung des laufenden Verfahrens erwirkte. Denn das jüngste Urteil des Bundesgerichtshofs (BGH) sorgt künftig für Schutz für alle, die sich beim Googeln ihres Namens von Suchvorschlägen beleidigt fühlen.

    Die Bundesrichter nehmen jetzt die Betreiber von Suchmaschinen stärker in die Pflicht. Sie müssen zwar nicht selber das Netz auf alle Suchwortkombinationen, die vielleicht Anstoß erregen könnten, durchpflügen. Denn – so sagen die Bundesrichter – im Prinzip sei gegen eine Suchwortergänzung nichts einzuwenden. Schließlich würden von einer Rechenmaschine zunächst nur Suchvorschläge von Internetnutzern ausgewertet.

    Geldentschädigung für Rufschädigungen

    Aber sie müssen spätestens reagieren, wenn Betroffene auf solche Rufschädigungen per Internet hinweisen. Die Internetunternehmen müssen dann zumindest rechtswidrige Verletzungen des Persönlichkeitsrechts abstellen und bei weiteren Verstößen auch eine Geldentschädigung bezahlen.

    Schutz der Persönlichkeitsrecht hat Vorrang
    tagesschau 20:00 Uhr, 14.05.2013, Gigi Deppe, SWR
    Download der Videodatei
    Ein Kosmetikhersteller hat dieses Urteil für Google-Geschädigte erstritten. Er sah seinen Namen zu Unrecht mit den Kombinationswörtern Scientology und Betrug in den Schmutz gezogen und bestand darauf, dass er in keinerlei Zusammenhang mit diesem als geldgierig verrufenen Sektenbetrieb steht oder stand. Zudem sei ihm kein Betrug vorzuwerfen, es habe auch kein entsprechendes Ermittlungsverfahren gegeben. Die Suchergebnisse von Google würden auch keine einzige Seite auflisten, die eine Verbindung zwischen dem Kosmetikhersteller und den beiden Ergänzungswörtern Scientology und Betrug aufweisen.

    Ihm hatten Kölner Richter in zwei Instanzen den Schutz gegen den Internetriesen verweigert. Es seien schließlich nur mathematische Effekte je nach Suchworthäufigkeit, kein Internetnutzer nehme für bare Münze, welche Suchwortvorschläge da kommen, so hatten die Kölner Juristen argumentiert.

    Hintergrund
    Googles Autocomplete-Funktion
    Ein praktischer Helfer mit Risiken | mehr
    Google allzu dickfellig

    Doch nun muss Google solche Beschwerden wegen Rufmords ernster nehmen. Auch im Fall von Bettina Wulff dürfte mit dem jetzigen Bundesgerichtshofurteil klar sein, dass der Internetkonzern sich in den letzten Monaten allzu dickfellig verhalten hat. Die Rotlichtgerüchte um die Präsidentengattin, die der Google-Suchwortmodus verbreitet hat, waren ja schon seit längerem öffentliches Thema, bis sich Bettina Wulff entschloss, dagegen vorzugehen. Hier dürfte sehr spannend werden, ob und welche Geldentschädigung hier verlangt werden kann.

    Der Bundesgerichtshof hatte auch im vorliegenden Fall noch nicht darüber zu entscheiden, weil er das Kölner Musterverfahren nochmal an die untere Instanz zur Nachbesserung zurückgeschickt hat. Die Bundesrichter kündigten aber im Grundsatz bei solchen Google-Rufschädigungen einen Anspruch auf Geldentschädigung zumindest in engen Grenzen an.

    TOP-SECRET – Defense Security Service Cybersecurity Operations Division Counterintelligence Presentation

    https://publicintelligence.net/wp-content/uploads/2013/05/DSS-CyberCI.png

     

    Defense Security Service Cybersecurity Operations Division

    • 33 pages
    • For Official Use Only
    • December 2012

    Download

    DSS Supports national security and the warfighter, secures the nation’s technological base, and oversees the protection of U.S. and foreign classified information in the hands of Industry

    CI Mission

    DSS CI identifies unlawful penetrators of cleared U.S. defense industry and articulates the threat for industry and government leaders

    Scope

    -10K+ firms; 13K+ facilities; 1.2m personnel
    -1 CI professional / 261 facilities
    -10.5% of facilities report

    Capability

    • (U) 11 personnel conducting analysis, liaison, field support, strategic development and program management
    • (U) Wide range of skill sets – CI, CT, LE, Cyber, Security, Intel, IA, CNO and more
    • (U) Direct access to cleared industry across 25 DSS field offices nationwide
    • (U) Large roles at U.S. Cyber Command, National Security Agency, National Cyber Investigative Joint Task Force and the Department of Homeland Security

    Challenges

    • (U) Secure sharing of threat information with industry partners
    • (U) Identifying and reporting suspicious network activity
    • (U) Limited resources to execute for an quickly expanding mission area Significant Achievements and Notable Events
    • (U) Since September, 2009 – Assessed over 3,000 cyber-related suspicious contact reports from Industry and the Intelligence Community; facilitating action on over 170 federal investigations/operations
    • (U) Developed four benchmark product lines for Industry and the Intelligence Community to include the 3rd edition of the DSS Cyber Trends
    • (U) Briefed at 24 venues and over 1,000 personnel in FY12 on the cyber threat
    • (U) In FY12, delivered over 350 threat notifications to industry, detailing adversary activity occurring on their networks.

    (U) FY12 Industry Cyber Reporting

    • (U//FOUO) 1,678 suspicious contact reports (SCR) categorized as cyber incidents (+102% from FY11)
    • (U//FOUO) 1,322 of these were assessed as having a counterintelligence (CI) nexus or were of some positive intelligence (PI) value (+186% increase from FY11)
    • (U//FOUO) 263 were categorized as successful intrusions (+78% increase from FY11)
    • (U//FOUO) 82 SCRs resulted in an official investigation or operation by an action agency (+37% increase from FY11)

    Trotz Internet-Attacken der “GoMoPa”:Wer wirklich und tatsächlich Geld erhielt: “GoMoPa” und Genossen !

    hacker

    Alle Internettacken der mutmasslichen STASI-Typen der “GoMoPa” können die Wahrheit nicht stoppen.

    Klar ist, nicht ich, sondern “GoMoPa” erhielt Geld von S&K.

    Nicht ich, sondern “Dr. Rainer Zitelmann” wurde bei Springer als Immobilienredakteur entfernt, nachdem sich der Verlag mit seinen Schriften zu Adolf Hitler und Auschwitz auseinandergesetzt hat.

    Ich habe nie bei Axel Springer gearbeitet. Dies kann jeder bei Springer nachprüfen.

    Nicht ich, sondern “GoMoPa” und “Dr. Rainer Zitelmann”  haben Beraterverträge mit deutschen Immobilienfirmen.

    Die Latrinenparolen sollen doch nur von den tatsächlichem Korruptionsnetzwerk und den alten Genossen und deren Seilschaften ablenken,

    wie dies bereits oft versucht wurde.

    Und dann wenn alles nichts hilft, werden unseren Seiten gehackt und mit DDoS-Hacker-Attacken angegriffen…

    Das leuchtet doch jedem ein ! Hilflose Versuche der korrupten Seilschaften von “GoMoPa” und Genossen.

    Und ganz sicher ist auch: Ich bin kein Fähnchen im Wind !

    Hier noch einmal meine detaillierte Stellungnahme.

    Bernd Pulch

    Liebe Leser,

    wieder einmal versucht die dubiose “GoMoPa” und deren Handlanger, Konsorten und Komparsen mutmasslich “Peter Ehlers” und “Nawito” von mutmasslich eigenen Taten abzulenken und mir perfide den “Schwarzen Peter” zuzuschieben.

    Wie bereits im Falle meines angeblichen falschen Magistertitels, dem Fall Meridian Capital etc pp die Liste ist endlos.

    Ein Sammelsurium von  Kolportagen, Fabeln, Märchen und Latrinenpatrolen…

    Dabei liegen die Beweis klar auf dem Tisch:

    Die renommierten und etablierten Medien wie “ZEIT” und “Süddeutsche Zeitung” haben es aufgedeckt, was hier im Fall “S &K”/”GoMoPa” wirklich lief.

    http://www.zeit.de/2013/11/Finanznachrichtendienst-Gomopa

    http://www.sueddeutsche.de/geld/mutmassliche-anlagebetrueger-sk-die-akte-midas-1.1620191-4

    Nachdem zahlreiche Internetangriffe nichts gebracht haben, nun wieder dieser Unsinn.

    Hier noch einmal meine Stellungnahme zu der “GoMoPa”/Ehlers/Nawito-Absurdistan-Agit-Propaganda:

    Dear Readers,

    let me just briefly comment a mental cyberattack which should distract your attention from the real issues.

    I have never had any consulting position or contract for any German company.

    I have never worked for the Axel Springer Publishing House – not even as a freelance journalist.

    These facts are clear and can be verified easily – just by calling Axel Springer.

    The facts are

    1) Dr. Rainer Zitelmann worked for the Axel Springer Company. You can esaily find out what happened there. I just mention the word “Auschwitz” in this context…As you see from his website and in the internet Zitelmann is in fact consulting many German companies.

    2) “GoMoPa” had in fact a consultation contract with estavis and got in fact money from estavis and many various companies i.e. “S&K”

    These contracts are known and 100% true and published by various media i.e. “ZEIT”, “MANAGER MAGAZIN”, “SUEDDEUTSCHE ZEITUNG” etc.

    3) Meridian Capital was the subject of “GoMoPa”s articles.

    4) “Nawito” whover or whatever it is did not even bother to contact us.

    5) The “information” about one of our companies is false.

    6) The “Nawito” informer “Peter Ehlers” did in fact attack Chancellor Merkel and the Minister of Finance Wolfgang Schäuble as “Deutschlands bekannteste Hehler” to name just one fact about “Peter Ehlers” or whatever his name might be who by the way got a lot of money from the bancrupt SAM AG which was also subject of “GoMoPa”‘s reporting and we know similiar cases of this endeavour.

    7) The last editor who was attacked by such cyberattacks died in a very mysterious way, Heinz Gerlach. He might have been controversial but nevertheless – the truth is the truth.

    He was the first journalist to publish the truth about the mysterious headquarter of “GoMoPa” in New York and their consulting contract with estavis and died suddenly and totally unexpected for most of us – not for all.

    The circumstances of his death remain unsolved for me.

    We are ready to proof this everytime and do not work with “colportations”.

    Obviously cyberattacks on our websites since years are not enough to keep the truth down – defamation must be added – a wellknown STASI technique to irritate the public – MENTAL AND PYSICAL CYBERATTACKS done by the well-know suspects.

    Sincerely your

    Bernd Pulch

    Magister Artium der Publizistik, Germanistik und Komparatistik

    PS

    COPIES OF PHYSICAL CYBER ATTACKS ON OUR SERVERS BY THE SUSPECTS AND “INFORMERS” OF “NAWITO”

    graph eastern

    graph 3

    graph2

    graph

    The attacked website are for example:

    http://www.investment-on.com

    http://www.berndpulch.org

    http://investment-magazin.com

    http://www.investment-magazin.tv

    and about 20 more.

    TOP-SECRET- Identifying IP Addresses, Hostnames Associated With Malicious Cyber Activity

    DHS-FBI Bulletins Identifying IP Addresses, Hostnames Associated With Malicious Cyber Activity Against the U.S. Government

    May 2, 2013 in Department of Homeland Security, Federal Bureau of Investigation

    The following bulletins were released in February 2013 by the U.S. Computer Emergency Readiness Team (US-CERT) on a limited basis to “confirmed members of the cybersecurity community of practice, which may include critical infrastructure owners and operators, systems administrators, and information security practitioners.” Both versions of the bulletin were found to be available on a number of public websites associated with various professional associations and trade groups.

    Joint Indicator Bulletin (JIB) – INC260425 27 pages February 18, 2013 Download
    Joint Indicator Bulletin (JIB) – INC260425-2 10 pages February 26, 2013 Download

    Various cyber actors have engaged in malicious activity against Government and Private Sector entities. The apparent objective of this activity has been the theft of intellectual property, trade secrets, and other sensitive business information. To this end, the malicious actors have employed a variety of techniques in order to infiltrate targeted organizations, establish a foothold, move laterally through the targets’ networks, and exfiltrate confidential or proprietary data. The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of Investigation and other partners, has created this Joint Indicator Bulletin, containing cyber indicators related to this activity. Organizations are advised to examine current and historical security logs for evidence of malicious activity related to the indicators in this bulletin and deploy additional protections as appropriate. In addition, DHS would welcome any additional information your organization may be able to share regarding this or similar activity, which may be provided to the US Computer Emergency Readiness Team (US-CERT) at soc@uscert.gov.

    Document Overview

    This Joint Indicator Bulletin is comprised of several sections covering malware indicators, network traffic, tool indicators, hostnames, and IP addresses known to be associated with the ongoing malicious activity. If suspicious network traffic or malware is identified based on these indicators, affected systems should be investigated for signs of compromise.

    To support developing shared situational awareness of cyber threats, DHS welcomes any additional information your organization may be able to share regarding this or similar activity. Such information can be provided to the United States Computer Emergency Readiness Team (US-CERT) at soc@us-cert.gov.

    Indicator Descriptions

    As a general matter, malicious cyber actors have multiple tools at their disposal and can represent a significant threat to targeted victim organizations. Such actors frequently compromise victim organizations with targeted spear-phishing campaigns, understand how to move laterally within a network to acquire targeted data, and often maintain undetected persistence on victim networks for months or even years. The indicators provided in this Bulletin include malware and compromised IP addresses and domains used by such actors.

    Malware

    Malicious activity like that described in this Bulletin usually originates via targeted spear phishing email campaigns that compromise victim organizations. These emails can result in the installation of one or more pieces of malware used to enable complete control of those systems. The presence of such malware is a strong indication the computer or network has been compromised.

    Client Tools

    During the course of a computer intrusion, malicious actors often download additional tools to victim systems for the purpose of evading local security measures and to compromise additional computers on victim networks. These tools might have legitimate uses, but, when combined with other indications of an intrusion, could indicate that the computer has been compromised. The presence of these tools alone is not necessarily a positive indication of malicious activity, but may enable an organization to identify malicious activity.
    IP Addresses, Hostnames and Second-Level Domains

    Malicious actors routinely compromise hosts on the Internet for the purpose of obscuring their activity, particularly the exfiltration of computer files from end-point victims. The majority of these compromised hosts have been configured to prevent identification of the source of the intrusion activity. The traffic from these hosts is generally legitimate, but, because they have been compromised, activity to and from these IPs should be reviewed for indications of malicious traffic.

    Malicious actors also make use of numerous Internet hostnames for the purpose of compromising and controlling victim systems. Actors have been known to register second-level domains for their exclusive use in these activities. In addition, malicious actors have been known to use DNS providers that allow the use of specific hostnames that are part of shared second-level domains.

    Many of these hostnames and domains may be legitimate hosts or domains that have been co-opted by malicious actors. Any number of the IP addresses or domains in this Bulletin may have been remediated prior to publication of this list. In some cases, a single IP address from this indicator list may represent hundreds or even thousands of legitimate independent websites, or may represent a small business network. A number of indicators contained in this Bulletin resolve back to large scale service providers whose services are being abused. For these reasons, outright blocking of these indicators is not recommended. Rather, traffic from these IPs or domains should be investigated for signs of compromise.

    ******************************
    IP Address Awareness List
    ******************************

    107[.]6[.]38[.]55
    108[.]171[.]207[.]62
    108[.]171[.]244[.]138
    108[.]171[.]246[.]87
    108[.]171[.]248[.]182
    108[.]171[.]248[.]83
    108[.]171[.]248[.]86
    108[.]171[.]252[.]41
    108[.]171[.]254[.]76
    112[.]121[.]164[.]2
    112[.]133[.]203[.]215
    112[.]133[.]203[.]250
    115[.]119[.]92[.]178
    115[.]178[.]60[.]19
    116[.]212[.]100[.]94
    117[.]121[.]241[.]186
    119[.]75[.]5[.]132
    119[.]75[.]5[.]134
    12[.]10[.]250[.]105
    12[.]10[.]250[.]109
    12[.]10[.]250[.]110
    12[.]10[.]250[.]97
    12[.]100[.]63[.]135
    12[.]147[.]51[.]99
    12[.]162[.]189[.]184
    12[.]173[.]220[.]231
    12[.]173[.]220[.]233
    12[.]182[.]10[.]124
    12[.]218[.]86[.]2
    12[.]233[.]148[.]145
    12[.]233[.]148[.]185
    12[.]235[.]72[.]138
    12[.]235[.]72[.]140
    12[.]36[.]96[.]236
    12[.]51[.]6[.]132
    12[.]7[.]168[.]121
    122[.]126[.]32[.]234
    122[.]155[.]3[.]147
    122[.]160[.]137[.]76
    124[.]122[.]156[.]219
    128[.]173[.]95[.]6
    128[.]95[.]9[.]2
    129[.]25[.]5[.]200
    129[.]44[.]254[.]145
    134[.]208[.]10[.]195
    141[.]151[.]164[.]87
    142[.]0[.]143[.]207
    146[.]145[.]183[.]100
    150[.]176[.]56[.]194
    158[.]255[.]208[.]211
    161[.]58[.]179[.]230
    164[.]106[.]102[.]188
    164[.]119[.]10[.]170
    164[.]119[.]11[.]2
    164[.]119[.]54[.]244
    164[.]119[.]54[.]247
    165[.]165[.]38[.]19
    168[.]215[.]137[.]6
    168[.]93[.]98[.]3
    173[.]10[.]48[.]243
    173[.]224[.]208[.]155
    173[.]224[.]211[.]14
    173[.]224[.]211[.]16
    173[.]224[.]214[.]70
    173[.]224[.]215[.]73
    173[.]224[.]216[.]217
    173[.]252[.]255[.]52
    182[.]173[.]77[.]26
    184[.]105[.]135[.]166
    184[.]22[.]26[.]50
    184[.]72[.]82[.]144
    184[.]82[.]164[.]104
    184[.]82[.]47[.]200
    189[.]87[.]87[.]3
    190[.]13[.]160[.]114
    193[.]219[.]90[.]29
    194[.]106[.]162[.]203
    195[.]22[.]21[.]72
    195[.]29[.]247[.]78
    196[.]36[.]199[.]217
    198[.]15[.]88[.]37
    198[.]15[.]88[.]39
    198[.]69[.]219[.]173
    199[.]119[.]201[.]162
    199[.]119[.]201[.]167
    199[.]119[.]201[.]67
    199[.]119[.]206[.]11
    199[.]119[.]206[.]111
    199[.]119[.]206[.]19
    199[.]119[.]206[.]99
    199[.]119[.]207[.]237
    199[.]15[.]113[.]218
    199[.]15[.]117[.]98
    199[.]67[.]16[.]122
    199[.]67[.]23[.]45
    199[.]71[.]213[.]17
    199[.]71[.]213[.]91
    199[.]83[.]88[.]98
    199[.]83[.]89[.]45
    199[.]83[.]93[.]22
    199[.]83[.]93[.]51
    199[.]83[.]93[.]88
    199[.]83[.]95[.]51
    199[.]83[.]95[.]60
    200[.]53[.]40[.]219
    202[.]176[.]81[.]175
    202[.]180[.]175[.]16
    202[.]43[.]33[.]5
    202[.]95[.]222[.]143
    202[.]95[.]222[.]145
    202[.]95[.]222[.]158
    202[.]95[.]222[.]182
    202[.]95[.]222[.]183
    203[.]118[.]56[.]213
    203[.]123[.]147[.]34
    203[.]146[.]102[.]166
    203[.]146[.]249[.]189
    203[.]150[.]230[.]121
    203[.]238[.]57[.]1
    203[.]64[.]84[.]226
    203[.]81[.]38[.]54
    203[.]81[.]53[.]14
    203[.]82[.]57[.]109
    204[.]111[.]73[.]156
    204[.]111[.]75[.]107
    204[.]12[.]11[.]212
    204[.]12[.]11[.]54
    204[.]12[.]116[.]166
    204[.]12[.]208[.]122
    204[.]12[.]208[.]125
    204[.]12[.]21[.]69
    204[.]12[.]22[.]114
    204[.]12[.]224[.]75
    204[.]12[.]236[.]182
    204[.]12[.]236[.]183
    204[.]12[.]63[.]133
    204[.]12[.]9[.]251
    204[.]13[.]24[.]14
    204[.]15[.]132[.]254
    204[.]152[.]198[.]194
    204[.]16[.]139[.]5
    204[.]17[.]34[.]150
    204[.]180[.]235[.]103
    204[.]180[.]235[.]106
    204[.]45[.]101[.]246
    204[.]45[.]108[.]237
    204[.]45[.]117[.]174
    204[.]45[.]123[.]141
    204[.]45[.]124[.]100
    204[.]45[.]124[.]162
    204[.]45[.]124[.]163
    204[.]45[.]137[.]74
    204[.]45[.]146[.]250
    204[.]45[.]147[.]19
    204[.]45[.]153[.]52
    204[.]45[.]190[.]89
    204[.]45[.]198[.]18
    204[.]45[.]201[.]107
    204[.]45[.]205[.]44
    204[.]45[.]230[.]75
    204[.]45[.]39[.]4
    204[.]45[.]52[.]20
    204[.]45[.]64[.]66
    204[.]45[.]75[.]250
    204[.]45[.]79[.]180
    204[.]45[.]79[.]20
    204[.]45[.]79[.]218
    205[.]159[.]83[.]11
    205[.]159[.]83[.]31
    205[.]159[.]83[.]91
    205[.]164[.]0[.]34
    205[.]172[.]20[.]42
    205[.]196[.]178[.]23
    205[.]209[.]161[.]195
    205[.]209[.]161[.]5
    205[.]237[.]192[.]123
    205[.]242[.]114[.]4
    206[.]125[.]45[.]187
    206[.]192[.]55[.]117
    206[.]204[.]190[.]237
    207[.]150[.]197[.]155
    207[.]179[.]111[.]5
    207[.]182[.]238[.]195
    207[.]210[.]252[.]17
    207[.]250[.]229[.]52
    207[.]250[.]49[.]172
    207[.]250[.]49[.]173
    207[.]36[.]0[.]193
    207[.]36[.]17[.]15
    207[.]46[.]17[.]125
    207[.]59[.]239[.]122
    207[.]65[.]231[.]21
    207[.]75[.]209[.]108
    207[.]97[.]226[.]130
    208[.]106[.]145[.]153
    208[.]106[.]146[.]98
    208[.]106[.]82[.]119
    208[.]109[.]238[.]15
    208[.]109[.]238[.]72
    208[.]109[.]238[.]80
    208[.]109[.]238[.]96
    208[.]109[.]49[.]66
    208[.]118[.]188[.]166
    208[.]118[.]188[.]179
    208[.]118[.]188[.]57
    208[.]186[.]112[.]40
    208[.]221[.]198[.]12
    208[.]43[.]154[.]7
    208[.]43[.]175[.]82
    208[.]43[.]208[.]14
    208[.]43[.]225[.]196
    208[.]43[.]255[.]135
    208[.]43[.]54[.]164
    208[.]43[.]71[.]116
    208[.]44[.]238[.]249
    208[.]57[.]237[.]141
    208[.]67[.]248[.]66
    208[.]69[.]32[.]230
    208[.]77[.]45[.]61
    208[.]77[.]45[.]69
    208[.]87[.]242[.]93
    209[.]104[.]217[.]69
    209[.]104[.]217[.]72
    209[.]104[.]217[.]76
    209[.]114[.]160[.]115
    209[.]114[.]222[.]100
    209[.]116[.]102[.]225
    209[.]158[.]71[.]20
    209[.]175[.]175[.]227
    209[.]175[.]175[.]230
    209[.]200[.]117[.]198
    209[.]208[.]95[.]158
    209[.]208[.]95[.]86
    209[.]212[.]104[.]171
    209[.]234[.]81[.]205
    209[.]242[.]13[.]230
    209[.]242[.]21[.]134
    209[.]34[.]224[.]52
    209[.]34[.]231[.]197
    209[.]34[.]231[.]59
    209[.]34[.]233[.]26
    209[.]67[.]56[.]252
    209[.]75[.]160[.]176
    209[.]75[.]160[.]98
    210[.]184[.]116[.]198
    210[.]193[.]52[.]160
    210[.]202[.]22[.]129
    210[.]205[.]6[.]219
    210[.]220[.]197[.]2
    210[.]245[.]64[.]107
    210[.]249[.]80[.]141
    211[.]115[.]70[.]114
    211[.]232[.]57[.]150
    211[.]232[.]57[.]235
    211[.]232[.]57[.]249
    211[.]233[.]58[.]69
    212[.]116[.]151[.]146
    212[.]150[.]22[.]228
    213[.]79[.]32[.]179
    216[.]134[.]222[.]200
    216[.]136[.]62[.]143
    216[.]174[.]25[.]177
    216[.]183[.]190[.]162
    216[.]183[.]40[.]56
    216[.]185[.]0[.]220
    216[.]185[.]0[.]9
    216[.]196[.]249[.]210
    216[.]213[.]99[.]218
    216[.]215[.]112[.]83
    216[.]226[.]191[.]103
    216[.]24[.]192[.]117
    216[.]24[.]192[.]121
    216[.]24[.]192[.]206
    216[.]24[.]192[.]28
    216[.]24[.]192[.]44
    216[.]24[.]192[.]7
    216[.]24[.]192[.]81
    216[.]24[.]192[.]83
    216[.]24[.]192[.]95
    216[.]24[.]196[.]113
    216[.]24[.]198[.]14
    216[.]24[.]198[.]20
    216[.]24[.]199[.]243
    216[.]24[.]199[.]62
    216[.]24[.]200[.]180
    216[.]24[.]201[.]166
    216[.]24[.]201[.]198
    216[.]24[.]203[.]58
    216[.]24[.]204[.]124
    216[.]24[.]205[.]30
    216[.]24[.]205[.]36
    216[.]24[.]205[.]69
    216[.]36[.]123[.]12
    216[.]68[.]165[.]14
    216[.]83[.]42[.]66
    216[.]9[.]65[.]6
    216[.]99[.]146[.]18
    216[.]99[.]148[.]18
    217[.]20[.]138[.]42
    217[.]22[.]119[.]13
    217[.]23[.]9[.]215
    218[.]233[.]206[.]2
    218[.]234[.]17[.]30
    218[.]234[.]21[.]219
    220[.]68[.]224[.]116
    222[.]231[.]46[.]51
    24[.]120[.]244[.]9
    24[.]123[.]91[.]130
    24[.]123[.]91[.]198
    24[.]123[.]91[.]206
    24[.]123[.]91[.]6
    24[.]123[.]91[.]70
    24[.]123[.]91[.]98
    24[.]129[.]188[.]158
    24[.]172[.]220[.]130
    24[.]173[.]220[.]130
    24[.]173[.]34[.]139
    24[.]199[.]240[.]74
    24[.]227[.]145[.]210
    24[.]248[.]197[.]112
    24[.]249[.]191[.]150
    24[.]39[.]42[.]50
    24[.]39[.]5[.]85
    24[.]43[.]98[.]12
    24[.]73[.]123[.]50
    24[.]96[.]236[.]182
    24[.]97[.]167[.]250
    27[.]254[.]34[.]246
    38[.]104[.]203[.]222
    38[.]104[.]203[.]242
    38[.]107[.]179[.]5
    4[.]22[.]103[.]26
    59[.]116[.]133[.]122
    59[.]12[.]137[.]111
    59[.]12[.]137[.]146
    59[.]12[.]137[.]148
    59[.]12[.]137[.]149
    59[.]12[.]137[.]150
    59[.]12[.]137[.]181
    59[.]12[.]137[.]182
    59[.]12[.]137[.]183
    59[.]12[.]137[.]194
    59[.]120[.]140[.]156
    59[.]120[.]199[.]82
    60[.]51[.]214[.]129
    61[.]19[.]248[.]201
    61[.]19[.]248[.]203
    61[.]218[.]191[.]55
    61[.]218[.]191[.]60
    61[.]219[.]136[.]132
    61[.]72[.]144[.]248
    61[.]78[.]60[.]130
    62[.]2[.]205[.]146
    62[.]244[.]209[.]98
    63[.]102[.]52[.]138
    63[.]105[.]34[.]53
    63[.]105[.]34[.]59
    63[.]126[.]12[.]3
    63[.]134[.]215[.]111
    63[.]134[.]215[.]34
    63[.]139[.]221[.]10
    63[.]139[.]45[.]83
    63[.]147[.]185[.]60
    63[.]147[.]31[.]177
    63[.]149[.]11[.]233
    63[.]149[.]120[.]135
    63[.]150[.]10[.]200
    63[.]175[.]119[.]46
    63[.]200[.]116[.]50
    63[.]202[.]58[.]43
    63[.]209[.]10[.]247
    63[.]224[.]141[.]199
    63[.]64[.]153[.]68
    63[.]73[.]10[.]131
    63[.]73[.]11[.]12
    63[.]73[.]11[.]6
    63[.]84[.]30[.]211
    63[.]86[.]122[.]121
    63[.]93[.]109[.]217
    63[.]97[.]151[.]230
    64[.]124[.]105[.]75
    64[.]14[.]253[.]120
    64[.]151[.]127[.]68
    64[.]151[.]127[.]70
    64[.]198[.]120[.]50
    64[.]2[.]115[.]238
    64[.]222[.]187[.]237
    64[.]233[.]222[.]39
    64[.]28[.]82[.]36
    64[.]3[.]53[.]146
    64[.]3[.]53[.]148
    64[.]30[.]223[.]147
    64[.]45[.]251[.]11
    64[.]5[.]38[.]17
    64[.]52[.]255[.]20
    64[.]6[.]188[.]250
    64[.]6[.]188[.]253
    64[.]62[.]136[.]154
    64[.]62[.]136[.]157
    64[.]73[.]238[.]72
    64[.]8[.]114[.]123
    64[.]80[.]153[.]108
    64[.]85[.]177[.]5
    64[.]85[.]19[.]6
    64[.]88[.]7[.]113
    64[.]9[.]204[.]233
    65[.]107[.]54[.]151
    65[.]114[.]166[.]37
    65[.]14[.]25[.]67
    65[.]183[.]217[.]55
    65[.]49[.]145[.]3
    65[.]66[.]118[.]57
    65[.]89[.]156[.]126
    65[.]97[.]169[.]210
    66[.]0[.]135[.]16
    66[.]109[.]21[.]182
    66[.]111[.]37[.]26
    66[.]116[.]58[.]230
    66[.]124[.]120[.]193
    66[.]129[.]222[.]10
    66[.]139[.]186[.]199
    66[.]140[.]144[.]70
    66[.]153[.]20[.]170
    66[.]159[.]250[.]224
    66[.]178[.]7[.]201
    66[.]181[.]65[.]4
    66[.]197[.]231[.]160
    66[.]197[.]242[.]218
    66[.]197[.]242[.]221
    66[.]197[.]242[.]222
    66[.]199[.]231[.]210
    66[.]199[.]231[.]243
    66[.]202[.]107[.]117
    66[.]202[.]29[.]73
    66[.]220[.]10[.]72
    66[.]220[.]10[.]93
    66[.]220[.]242[.]230
    66[.]228[.]114[.]54
    66[.]235[.]214[.]66
    66[.]35[.]32[.]70
    66[.]36[.]28[.]222
    66[.]39[.]205[.]171
    66[.]52[.]140[.]13
    66[.]55[.]14[.]77
    66[.]59[.]109[.]179
    66[.]79[.]165[.]158
    66[.]92[.]181[.]123
    66[.]92[.]241[.]200
    66[.]93[.]151[.]226
    66[.]93[.]75[.]206
    67[.]102[.]105[.]76
    67[.]102[.]7[.]4
    67[.]107[.]22[.]67
    67[.]112[.]49[.]250
    67[.]114[.]87[.]218
    67[.]135[.]235[.]198
    67[.]159[.]164[.]124
    67[.]159[.]49[.]188
    67[.]159[.]8[.]36
    67[.]210[.]105[.]137
    67[.]210[.]105[.]216
    67[.]210[.]68[.]122
    67[.]215[.]163[.]66
    67[.]215[.]181[.]130
    67[.]215[.]181[.]150
    67[.]222[.]165[.]4
    67[.]42[.]55[.]113
    67[.]76[.]57[.]77
    67[.]77[.]204[.]97
    67[.]91[.]212[.]115
    67[.]93[.]1[.]197
    67[.]93[.]1[.]204
    67[.]93[.]1[.]228
    67[.]93[.]15[.]229
    67[.]93[.]15[.]235
    67[.]93[.]15[.]240
    67[.]93[.]16[.]219
    67[.]93[.]255[.]249
    67[.]93[.]3[.]3
    67[.]93[.]30[.]146
    67[.]93[.]30[.]189
    67[.]93[.]4[.]27
    67[.]93[.]4[.]71
    67[.]93[.]4[.]72
    67[.]93[.]4[.]89
    67[.]93[.]54[.]130
    67[.]93[.]54[.]98
    69[.]105[.]31[.]51
    69[.]106[.]172[.]188
    69[.]175[.]28[.]12
    69[.]2[.]43[.]123
    69[.]2[.]71[.]205
    69[.]20[.]125[.]16
    69[.]20[.]20[.]129
    69[.]20[.]5[.]213
    69[.]20[.]57[.]71
    69[.]3[.]160[.]20
    69[.]3[.]160[.]30
    69[.]3[.]160[.]50
    69[.]3[.]160[.]60
    69[.]48[.]233[.]181
    69[.]48[.]233[.]187
    69[.]57[.]60[.]42
    69[.]68[.]56[.]35
    69[.]69[.]94[.]20
    69[.]72[.]146[.]33
    69[.]94[.]112[.]253
    69[.]94[.]65[.]101
    69[.]94[.]69[.]101
    70[.]166[.]13[.]132
    70[.]166[.]13[.]148
    70[.]168[.]88[.]230
    70[.]85[.]134[.]234
    70[.]86[.]77[.]114
    70[.]89[.]213[.]145
    70[.]89[.]213[.]181
    70[.]89[.]213[.]201
    70[.]89[.]213[.]22
    70[.]89[.]213[.]227
    70[.]89[.]213[.]241
    70[.]89[.]213[.]249
    70[.]89[.]213[.]66
    70[.]90[.]53[.]170
    71[.]183[.]201[.]26
    71[.]2[.]214[.]46
    71[.]4[.]109[.]162
    71[.]8[.]243[.]14
    71[.]8[.]243[.]16
    72[.]148[.]171[.]41
    72[.]151[.]101[.]55
    72[.]167[.]146[.]235
    72[.]167[.]34[.]212
    72[.]167[.]37[.]238
    72[.]167[.]47[.]217
    72[.]22[.]11[.]2
    72[.]242[.]187[.]211
    72[.]242[.]59[.]164
    72[.]248[.]173[.]82
    72[.]248[.]239[.]146
    72[.]32[.]197[.]150
    72[.]35[.]85[.]32
    72[.]37[.]215[.]244
    72[.]52[.]116[.]106
    72[.]52[.]209[.]143
    72[.]52[.]209[.]145
    72[.]52[.]221[.]158
    72[.]93[.]90[.]44
    74[.]10[.]186[.]7
    74[.]112[.]123[.]171
    74[.]117[.]58[.]92
    74[.]117[.]60[.]141
    74[.]117[.]62[.]210
    74[.]117[.]62[.]88
    74[.]117[.]63[.]250
    74[.]208[.]111[.]135
    74[.]208[.]148[.]125
    74[.]208[.]65[.]251
    74[.]208[.]67[.]95
    74[.]213[.]40[.]2
    74[.]52[.]63[.]114
    74[.]52[.]63[.]138
    75[.]146[.]252[.]217
    75[.]146[.]252[.]218
    75[.]148[.]254[.]115
    75[.]149[.]183[.]228
    75[.]52[.]111[.]62
    75[.]77[.]82[.]225
    75[.]77[.]82[.]242
    75[.]77[.]82[.]70
    76[.]12[.]37[.]97
    76[.]164[.]171[.]3
    76[.]164[.]171[.]5
    76[.]164[.]171[.]6
    76[.]76[.]146[.]89
    76[.]76[.]54[.]137
    8[.]4[.]112[.]2
    82[.]165[.]181[.]105
    83[.]238[.]134[.]58
    87[.]229[.]126[.]60
    89[.]175[.]175[.]186
    89[.]175[.]175[.]187
    89[.]175[.]175[.]188
    93[.]152[.]156[.]106
    96[.]10[.]19[.]210
    96[.]47[.]232[.]16
    96[.]47[.]232[.]161
    96[.]57[.]145[.]11
    98[.]110[.]71[.]108
    98[.]126[.]0[.]12
    98[.]126[.]0[.]163
    98[.]126[.]10[.]124
    98[.]126[.]103[.]164
    98[.]126[.]106[.]19
    98[.]126[.]114[.]4
    98[.]126[.]15[.]250
    98[.]126[.]18[.]74
    98[.]126[.]18[.]82
    98[.]126[.]18[.]83
    98[.]126[.]19[.]163
    98[.]126[.]203[.]45
    98[.]126[.]21[.]116
    98[.]126[.]25[.]35
    98[.]126[.]28[.]245
    98[.]126[.]3[.]235
    98[.]126[.]3[.]236
    98[.]126[.]3[.]237
    98[.]126[.]41[.]178
    98[.]126[.]5[.]35
    98[.]126[.]6[.]104
    98[.]126[.]6[.]105
    98[.]126[.]66[.]147
    98[.]126[.]68[.]186
    98[.]126[.]7[.]220
    98[.]126[.]7[.]250
    98[.]126[.]7[.]251
    98[.]126[.]91[.]27
    98[.]126[.]97[.]197
    99[.]13[.]110[.]214
    99[.]4[.]102[.]249

    ******************************
    Domain Name Awareness List
    ******************************

    a-af[.]arrowservice[.]net
    able[.]arrowservice[.]net
    a-cl[.]arrowservice[.]net
    a-dl[.]arrowservice[.]net
    admin[.]arrowservice[.]net
    adtkl[.]bigish[.]net
    adtkl[.]gmailboxes[.]com
    a-ep[.]arrowservice[.]net
    a-ex[.]arrowservice[.]net
    a-f[.]gmailboxes[.]com
    afghanistan[.]toutges[.]us
    aga[.]toh[.]info
    a-gon[.]arrowservice[.]net
    a-he[.]arrowservice[.]net
    a-if[.]arrowservice[.]net
    a-iho[.]arrowservice[.]net
    aiic[.]arrowservice[.]net
    a-ip[.]arrowservice[.]net
    ait[.]busketball[.]com
    alarm[.]arrowservice[.]net
    amne[.]purpledaily[.]com
    ams[.]busketball[.]com
    a-ne[.]arrowservice[.]net
    anglo[.]arrowservice[.]net
    aol[.]arrowservice[.]net
    a-ol[.]arrowservice[.]net
    apejack[.]bigish[.]net
    a-pep[.]arrowservice[.]net
    a-rdr[.]arrowservice[.]net
    arm[.]armed[.]us
    ascn[.]arrowservice[.]net
    asp[.]arrowservice[.]net
    asp[.]busketball[.]com
    a-te[.]arrowservice[.]net
    atom[.]busketball[.]com
    atomic[.]bigish[.]net
    a-uac[.]arrowservice[.]net
    auto[.]gmailboxes[.]com
    a-za[.]arrowservice[.]net
    backsun[.]busketball[.]com
    barity[.]gmailboxes[.]com
    bass[.]busketball[.]com
    bbs[.]busketball[.]com
    bbs[.]marsbrother[.]com
    bda[.]arrowservice[.]net
    blacman[.]busketball[.]com
    blog[.]arrowservice[.]net
    blog[.]busketball[.]com
    bring[.]busketball[.]com
    built[.]arrowservice[.]net
    busketball[.]com
    buycow[.]busketball[.]com
    buyer[.]arrowservice[.]net
    buywater[.]busketball[.]com
    bwbc[.]bigish[.]net
    center[.]arrowservice[.]net
    chamus[.]gmailboxes[.]com
    cirfsun[.]gmailboxes[.]com
    city[.]gmailboxes[.]com
    class[.]arrowservice[.]net
    cleanbeef[.]gmailboxes[.]com
    cliffkl[.]gmailboxes[.]com
    cmf[.]busketball[.]com
    cmf[.]gmailboxes[.]com
    cmp[.]gmailboxes[.]com
    contact[.]arrowservice[.]net
    contact[.]bigish[.]net
    corn[.]busketball[.]com
    cov[.]arrowservice[.]net
    covclient[.]arrowservice[.]net
    cow[.]arrowservice[.]net
    cowboy[.]bigish[.]net
    crab[.]arrowservice[.]net
    ctimoon[.]marsbrother[.]com
    ctisu[.]bigish[.]net
    ctisun[.]gmailboxes[.]com
    ctx[.]bigish[.]net
    ctx-na[.]purpledaily[.]com
    cws[.]gmailboxes[.]com
    date[.]gmailboxes[.]com
    dec[.]globalsecuriy[.]org
    default[.]arrowservice[.]net
    demavda[.]arrowservice[.]net
    diaup[.]gmailboxes[.]com
    diplomatism[.]nsmp[.]ru
    documents[.]busketball[.]com
    domain[.]arrowservice[.]net
    domain[.]busketball[.]com
    dowjs[.]busketball[.]com
    dowjs[.]gmailboxes[.]com
    download[.]gmailboxes[.]com
    downupdate[.]bigish[.]net
    dowph[.]bigish[.]net
    drb[.]arrowservice[.]net
    drinkwater[.]gmailboxes[.]com
    eatbeef[.]gmailboxes[.]com
    eciie[.]marsbrother[.]com
    ecliar[.]marsbrother[.]com
    eclimx[.]marsbrother[.]com
    ecli-mxcdb[.]arrowservice[.]net
    ecli-newf[.]marsbrother[.]com
    ecli-noa[.]marsbrother[.]com
    ecli-tda[.]marsbrother[.]com
    ecli-tmp[.]marsbrother[.]com
    ecli-un[.]marsbrother[.]com
    eshop[.]gmailboxes[.]com
    ever[.]arrowservice[.]net
    fbtel[.]gmailboxes[.]com
    finekl[.]bigish[.]net
    fme[.]busketball[.]com
    fmp[.]bigish[.]net
    fn[.]bigish[.]net
    follow[.]purpledaily[.]com
    food[.]busketball[.]com
    foreignpolicy[.]zonet[.]us
    free[.]gmailboxes[.]com
    frickl[.]purpledaily[.]com
    friends[.]arrowservice[.]net
    fsol[.]businessformars[.]com
    ftel[.]businessformars[.]com
    gao[.]gaokew[.]com
    gatu[.]arrowservice[.]net
    gg[.]arrowservice[.]net
    gl[.]gmailboxes[.]com
    glj[.]purpledaily[.]com
    gmailboxes[.]com
    happy[.]arrowservice[.]net
    help[.]gmailboxes[.]com
    hill[.]arrowservice[.]net
    home[.]arrowservice[.]net
    honeywater[.]keren[.]la
    host[.]arrowservice[.]net
    house[.]gmailboxes[.]com
    index[.]arrowservice[.]net
    info[.]bigish[.]net
    info[.]hj-spa[.]com
    information[.]trickip[.]org
    int[.]busketball[.]com
    intel[.]busketball[.]com
    intel[.]gmailboxes[.]com
    invest[.]gmailboxes[.]com
    itlove[.]bigish[.]net
    jackhouse[.]bigish[.]net
    junier[.]busketball[.]com
    kbwfj[.]arrowservice[.]net
    klbis[.]bigish[.]net
    kl-hqun[.]gmailboxes[.]com
    kllhd[.]bigish[.]net
    klwest[.]purpledaily[.]com
    klzafin[.]bigish[.]net
    loading[.]bigish[.]net
    love[.]arrowservice[.]net
    love[.]busketball[.]com
    lovecow[.]homenet[.]org
    lovewater[.]now[.]im
    mail[.]bigish[.]net
    mail[.]gmailboxes[.]com
    mail-na[.]businessformars[.]com
    main[.]busketball[.]com
    main[.]gmailboxes[.]com
    max[.]arrowservice[.]net
    mbc[.]busketball[.]com
    mc[.]bigish[.]net
    me[.]busketball[.]com
    micyuisyahooapis[.]com
    midstate[.]arrowservice[.]net
    milk[.]arrowservice[.]net
    mini[.]arrowservice[.]net
    miss[.]pwnz[.]org
    mko[.]busketball[.]com
    mkx[.]arrowservice[.]net
    mkx[.]gmailboxes[.]com
    monewf[.]bigish[.]net
    monlc[.]marsbrother[.]com
    mos[.]arrowservice[.]net
    moto[.]busketball[.]com
    mpe[.]arrowservice[.]net
    msdn[.]bigish[.]net
    new[.]arrowservice[.]net
    newfe[.]purpledaily[.]com
    news[.]busketball[.]com
    newspappers[.]org
    nokkia[.]bigish[.]net
    nousage[.]arrowservice[.]net
    nrcod[.]arrowservice[.]net
    oliver[.]arrowservice[.]net
    omin[.]marsbrother[.]com
    ope[.]coastmaritime[.]org
    opp[.]coastmaritime[.]org
    opp[.]globalsecuriy[.]org
    orca[.]arrowservice[.]net
    paekl[.]gmailboxes[.]com
    pdns[.]info[.]tm
    phb[.]arrowservice[.]net
    pieckl[.]bigish[.]net
    point[.]gmailboxes[.]com
    ppt[.]arrowservice[.]net
    ppt[.]ezua[.]com
    purpledaily[.]com
    qhun-mons[.]businessformars[.]com
    records[.]marsbrother[.]com
    release[.]busketball[.]com
    repid[.]arrowservice[.]net
    rfckl[.]bigish[.]net
    rice[.]bigish[.]net
    rixiokl[.]bigish[.]net
    russiaactions[.]summitnato[.]ro
    saltlakenews[.]org
    sbasun[.]busketball[.]com
    scpkl[.]bigish[.]net
    sea[.]arrowservice[.]net
    service[.]arrowservice[.]net
    service[.]purpledaily[.]com
    services[.]busketball[.]com
    services[.]gmailboxes[.]com
    skill[.]arrowservice[.]net
    sksucc[.]arrowservice[.]net
    sona[.]arrowservice[.]net
    spckl[.]bigish[.]net
    spcmon[.]marsbrother[.]com
    sremx[.]bigish[.]net
    ssun[.]arrowservice[.]net
    stock[.]bigish[.]net
    stoneal[.]bigish[.]net
    stulaw[.]bigish[.]net
    stuwal[.]gmailboxes[.]com
    suicide[.]suicide-forum[.]com
    sun[.]arrowservice[.]net
    suncirf[.]bigish[.]net
    suntop[.]arrowservice[.]net
    sword[.]bigish[.]net
    tclient[.]arrowservice[.]net
    tia[.]gmailboxes[.]com
    topbox[.]gmailboxes[.]com
    topbus[.]busketball[.]com
    topkl[.]bigish[.]net
    topmoney[.]purpledaily[.]com
    tour[.]bigish[.]net
    trb[.]arrowservice[.]net
    trip[.]arrowservice[.]net
    ttestt[.]arrowservice[.]net
    ug-rj[.]arrowservice[.]net
    update[.]busketball[.]com
    updating[.]ddns[.]info
    usapappers[.]com
    ustop[.]bigish[.]net
    vipmx[.]businessformars[.]com
    vockl[.]bigish[.]net
    walk[.]bigish[.]net
    walstb[.]gmailboxes[.]com
    was[.]arrowservice[.]net
    wasa[.]arrowservice[.]net
    wcasekl[.]gmailboxes[.]com
    web[.]arrowservice[.]net
    weblog[.]bigish[.]net
    webmail[.]arrowservice[.]net
    westjoe[.]purpledaily[.]com
    westking[.]bigish[.]net
    westnew[.]marsbrother[.]com
    what[.]arrowservice[.]net
    whl[.]bigish[.]net
    wk[.]gmailboxes[.]com
    works[.]myddns[.]com
    workstation[.]arrowservice[.]net
    www[.]arrowservice[.]net
    www[.]globalsecuriy[.]org
    www-01[.]marsbrother[.]com
    www-02[.]marsbrother[.]com
    www2[.]dsmtp[.]com
    www2[.]wikaba[.]com
    www-dell[.]marsbrother[.]com
    www-hp[.]marsbrother[.]com
    www-ibm[.]busketball[.]com
    wwww[.]arrowservice[.]net
    zgrshy[.]zyns[.]com
    zgrshy10[.]zyns[.]com
    zgrshy11[.]zyns[.]com

    ******************************
    Malware Indicator Awareness List
    ******************************

    MD5 Checksum

    242946ed32dc3749e5b4f7827b905e5e
    b2ddcf194cacc69ee7bcd3f9989f6162
    5c58a8d8cab00ad3fac419da03644b59
    1cc0ce317edad8521c236c84b74e14f8
    9d42ce823fc711eaeb542f4050f17125
    8845cb5b4e450cb10a3b6ca41a9b4319
    1fe90bd6a1092ec74f78181785e785f8
    a6e7504315f5dada56189635cd7a27b1
    957b13cffeea1722a2369e2bb5e79287
    0e98cffc64a1e822946066f62e1fd02c
    1a87d955bc876098f50b8a48d8db4aaf
    a207590fdcec8018c5a902483b651302
    9087f73602d81be177b568e15f6b033b
    a884545277cae36928f36c372f6a18ac
    051967e8a92a6e1b02a6c8b2225b01c5
    314d5943e55c065e40f3a20ab56de7a3
    697b18e734740ad9129ebd241040492a
    7f7cc1a8d7a6bbe6a52c94bb7f41f727
    b8988e23d4d8427584637d1f9ab78a8e
    e6446d52e9f4b5c2c5a9ac850281cae8
    bf778439895829ff986207900bfcfe02
    1d69504a3d3ac32275fa4df8af25d1f7
    cf96139290c09963a32506cd85825ed3
    3b266b165468b810cd456cdf88ca8619
    88c0e5a4ca408ac12acaaf7a9ef9eb49
    08ac41ce00bf436a3dc23c4639d5f5ed
    2a8f14ed1cb6fdb49ab946fc54fc8c86
    4a54d7878d4170c3d4e3c3606365c42c
    659fb07c70034571de7a1b4b5ac86b01
    7c6443e646c973ac10a1048d521a70a9
    82c598abdf848c6fef03c63f5cf7feaf
    888eadff6982de01c60891ce185473b7
    9a847c1f54359ffd3c335e97600f6f5d
    a19e68e72084d867a39776faaa6f5fce
    e27f0975fd3278e7303102783767c508
    d36427db95cd055a5a25f445d80c27ee
    e3faff9149fed468aa63f10a40b935d6
    c7f7d8bf633a1b81088315b93831e82d
    7f90942ace185ca1ba5610f6eddf3376
    ad95f613fc4b644bd5e3230eb0b5dbcc
    4943a255952e107fec41e9c29a5b2724
    c7d5845718c7fa5a777bcd801d8e00f4
    34062335f95d074272a5487be37ee701
    3f82f1cba90d320af90d965a321a1187
    45a4141f603c8bfa7950e15a074ef976
    4bc894e369f31b7190eaeb99c23eb000
    55f41be09de5dcd5aaa0132804506868
    6eb99bed5b5fcb3fdb26f37aff2c9adb
    87cf89742ef0a1c1f76664caa6c0a1a7
    b9f20ff30ce6dbb461ab6d27fe8c4bda
    bcc6addece28265390b2d535d65c49b8
    fc277785c49d743697adc06a3db77c5d
    2de36fa400225c39481283daf4a686d8
    324a7d63a178f3ac8dde5b59675ef282
    37bd6fceaf412427db8c8a34c5ad9ba7
    3a33dbe37292a1cbfa760d1892812e08
    c243a7c1cf23b91f73100bb9e947439e
    caafdafdd17abe0f0303a456bcd4ab01
    e194a6d7f1aa6671d2134047050a4322
    e35414a5cb10bccf6424ee51f0cdd6cc
    21e35f309f7d6368fd8346ba409fab73
    3fa99e50933ce584d010ec194229764a
    41b551d30321a5ae1342180d1e73e82e
    7cd15bb31ff889e81f370d0535e02493
    9428a54a7acd6adc3f9b662ef432edf4
    f82d3b270b16780044817978f4f3fe1a
    22e10cbe46f406f5f1be0d613db4c2c3
    a6cba31fcca49ff9ed6fd9894644de9e
    48fc61a8f94c6e7c9c8965817f57af7e
    00b61db083b07a64fb6072b42aa83dc1
    aea5dc22e706c836d056f4ba1f13dea3
    3599a78c7e99b451c00d3490f17f842f
    137aad4c7c4e0d8ba0ad74c34cf8434c
    14095f921f50cf639bf00b389ea79959
    2d2876bd1f263babe9d09e8e950916cc
    ac9e0b2af215821f7223b6eaeaea03db
    c5851c22c2a2e4bccf015a20e0af6cac
    c9645367f032bf12b251e4f30e21b936
    cec766518fa5b607157e92e9c24c0d03
    da521200a939a9fe85f467d65d419990
    6428ac60d1eea0f20073cfb869674266
    affc4d42a6a66f6a745c5702608d0442
    c296ae9220c44e51cfbeb029b6103d1b
    cfdd9241adcda8755c54032fd2b5757d
    db22512d361a339cfadaa275c550b385
    e2a557b39231ee91724c150e3ec4b493
    491db327f479a1a34898229811fa8a5d
    6b6a9062e9c74a98a1f1a2fe7c2adcd7
    D46D261EC92DAF703CD584F10037198C
    ce2f4abe8b4f3a57891ca865c4fe6ece
    3de1bd0f2107198931177b2b23877df4
    a207590fdceb8018b5a902483b651302
    0ba71b7dbf0394f509ef6174faa0bbf0
    1a8ee0ec99320e213432a26a91df8811
    232d1be2d8cbbd1cf57494a934628504
    6ae05937bce80b7d16497cb82e6a52d6
    73e81b099f9b469a07063555e822dac1
    39f1ac84ad939fb72cc6e438ecea9729
    3a2cdf3c09c061a5cf6a58069506955a
    f3c6c797ef80787e6cbeeaa77496a3cb
    217c9dc682018c7055c660dd5dd0f8ca
    1cb4b79e338bec06e65ff8d37de53c55
    dd2aec3803ce39c4a148325d33f575e3
    5474e37159b1a438659e7e5bf1f45389
    48437eb28ff1bfff5c0a4661a8c3055d
    310cba19e6f7fd07adf203c27e46a0c9
    9cb4ee95948292be131f7c4ee3bdcf21
    7ce22cb797d2940818154ce0dcc48306
    53f1e2e5f0152a3a119e112b6cf5426e
    204c13f7ed2d3e5c78f3ef8a44eb561c
    ca6fe7a1315af5afeac2961460a80569
    53f49c58613669f25921de0b6dae1268
    82e0472271500713cd2457921ab1c565
    93e33bf0417a857ae894ed294aa0e15a
    9e5df2cfd0c8def21c9e114d1d2696dd
    ******************************
    IP Address Awareness List
    ******************************

    100[.]42[.]216[.]230
    108[.]166[.]200[.]130
    108[.]171[.]211[.]152
    108[.]171[.]251[.]102
    113[.]196[.]231[.]13
    12[.]11[.]239[.]25
    12[.]14[.]129[.]91
    12[.]15[.]0[.]131
    12[.]167[.]251[.]84
    12[.]2[.]49[.]115
    12[.]232[.]138[.]23
    12[.]30[.]41[.]134
    12[.]33[.]114[.]160
    12[.]33[.]114[.]224
    121[.]55[.]220[.]79
    122[.]146[.]219[.]130
    129[.]44[.]254[.]139
    140[.]112[.]19[.]195
    140[.]116[.]72[.]95
    161[.]58[.]177[.]111
    161[.]58[.]93[.]50
    163[.]20[.]172[.]230
    172[.]254[.]222[.]138
    173[.]10[.]39[.]53
    173[.]160[.]48[.]149
    173[.]163[.]133[.]177
    173[.]224[.]213[.]184
    173[.]224[.]213[.]247
    173[.]224[.]215[.]177
    173[.]231[.]45[.]231
    173[.]254[.]222[.]138
    199[.]119[.]201[.]124
    203[.]170[.]198[.]56
    204[.]11[.]236[.]81
    204[.]111[.]73[.]150
    204[.]111[.]73[.]155
    204[.]12[.]248[.]2
    204[.]13[.]68[.]10
    204[.]14[.]142[.]210
    204[.]14[.]88[.]45
    204[.]215[.]64[.]28
    204[.]249[.]169[.]4
    204[.]249[.]169[.]5
    204[.]45[.]16[.]204
    204[.]74[.]218[.]145
    204[.]9[.]208[.]14
    205[.]159[.]83[.]12
    205[.]209[.]161[.]13
    205[.]209[.]172[.]204
    205[.]234[.]168[.]48
    207[.]173[.]155[.]44
    207[.]36[.]209[.]221
    207[.]40[.]43[.]102
    207[.]71[.]209[.]148
    208[.]109[.]50[.]151
    208[.]185[.]233[.]163
    208[.]239[.]156[.]123
    208[.]37[.]108[.]211
    208[.]53[.]100[.]162
    208[.]68[.]171[.]220
    208[.]69[.]32[.]231
    208[.]77[.]45[.]131
    208[.]77[.]45[.]142
    208[.]77[.]45[.]82
    208[.]77[.]51[.]210
    208[.]87[.]241[.]135
    209[.]113[.]219[.]6
    209[.]18[.]107[.]90
    209[.]208[.]114[.]83
    209[.]208[.]95[.]7
    209[.]247[.]221[.]40
    209[.]247[.]221[.]50
    209[.]25[.]220[.]42
    209[.]74[.]45[.]226
    209[.]75[.]160[.]64
    210[.]244[.]193[.]249
    211[.]21[.]210[.]220
    216[.]1[.]59[.]4
    216[.]143[.]158[.]107
    216[.]145[.]228[.]153
    216[.]213[.]199[.]194
    216[.]215[.]103[.]2
    216[.]36[.]123[.]11
    216[.]62[.]168[.]249
    216[.]65[.]11[.]111
    218[.]32[.]87[.]100
    219[.]87[.]141[.]74
    24[.]249[.]171[.]231
    46[.]105[.]227[.]80
    50[.]62[.]130[.]15
    58[.]86[.]239[.]103
    60[.]251[.]74[.]9
    61[.]218[.]144[.]43
    61[.]221[.]67[.]184
    63[.]102[.]52[.]130
    63[.]111[.]125[.]50
    63[.]114[.]150[.]17
    63[.]120[.]209[.]85
    63[.]126[.]244[.]253
    63[.]134[.]229[.]137
    63[.]134[.]229[.]138
    63[.]134[.]233[.]60
    63[.]134[.]233[.]62
    63[.]138[.]249[.]244
    63[.]139[.]221[.]130
    63[.]139[.]221[.]26
    63[.]147[.]185[.]40
    63[.]147[.]31[.]178
    63[.]162[.]4[.]2
    63[.]162[.]42[.]46
    63[.]163[.]61[.]9
    63[.]171[.]89[.]5
    63[.]195[.]112[.]159
    63[.]200[.]159[.]118
    63[.]211[.]192[.]150
    63[.]211[.]192[.]181
    63[.]225[.]225[.]42
    63[.]228[.]128[.]19
    63[.]245[.]62[.]11
    63[.]246[.]147[.]11
    63[.]64[.]175[.]136
    63[.]73[.]10[.]130
    63[.]73[.]11[.]15
    63[.]82[.]1[.]226
    63[.]84[.]24[.]72
    63[.]84[.]24[.]77
    63[.]97[.]51[.]121
    64[.]122[.]68[.]213
    64[.]126[.]12[.]2
    64[.]14[.]81[.]30
    64[.]184[.]2[.]3
    64[.]25[.]15[.]226
    64[.]32[.]164[.]43
    64[.]34[.]172[.]210
    64[.]4[.]217[.]138
    64[.]50[.]130[.]74
    64[.]65[.]230[.]242
    64[.]81[.]194[.]171
    64[.]81[.]252[.]163
    65[.]107[.]54[.]158
    65[.]112[.]75[.]130
    65[.]114[.]195[.]226
    65[.]116[.]58[.]5
    65[.]119[.]5[.]3
    65[.]124[.]105[.]76
    65[.]17[.]233[.]30
    65[.]207[.]215[.]10
    66[.]0[.]167[.]105
    66[.]153[.]38[.]202
    66[.]155[.]114[.]145
    66[.]16[.]75[.]201
    66[.]167[.]118[.]29
    66[.]179[.]156[.]10
    66[.]181[.]8[.]162
    66[.]23[.]224[.]213
    66[.]28[.]12[.]144
    66[.]55[.]14[.]78
    66[.]85[.]185[.]201
    66[.]92[.]12[.]252
    66[.]93[.]91[.]235
    67[.]102[.]7[.]3
    67[.]109[.]132[.]202
    67[.]109[.]90[.]99
    67[.]132[.]222[.]231
    67[.]133[.]107[.]131
    67[.]19[.]22[.]82
    67[.]88[.]107[.]8
    67[.]93[.]14[.]2
    68[.]165[.]209[.]227
    68[.]72[.]242[.]130
    69[.]11[.]244[.]91
    69[.]152[.]184[.]182
    69[.]20[.]4[.]85
    69[.]20[.]5[.]223
    69[.]20[.]6[.]142
    69[.]20[.]61[.]230
    69[.]25[.]176[.]110
    69[.]25[.]50[.]10
    69[.]28[.]168[.]10
    69[.]3[.]32[.]220
    69[.]39[.]133[.]114
    69[.]39[.]133[.]115
    69[.]39[.]133[.]117
    69[.]5[.]38[.]37
    69[.]53[.]120[.]170
    69[.]55[.]180[.]4
    69[.]69[.]94[.]3
    69[.]74[.]43[.]87
    69[.]90[.]123[.]6
    69[.]95[.]204[.]2
    70[.]62[.]232[.]98
    70[.]86[.]21[.]146
    71[.]130[.]117[.]49
    71[.]16[.]27[.]212
    71[.]6[.]141[.]230
    71[.]6[.]51[.]180
    71[.]6[.]51[.]181
    71[.]63[.]28[.]61
    72[.]167[.]162[.]96
    72[.]167[.]33[.]182
    72[.]22[.]11[.]30
    72[.]236[.]177[.]171
    72[.]242[.]59[.]163
    72[.]245[.]176[.]82
    72[.]9[.]145[.]216
    72[.]91[.]193[.]160
    72[.]94[.]51[.]6
    74[.]115[.]0[.]29
    74[.]115[.]6[.]20
    74[.]165[.]93[.]5
    74[.]200[.]213[.]110
    74[.]206[.]99[.]189
    74[.]208[.]227[.]72
    74[.]208[.]45[.]82
    74[.]211[.]195[.]39
    74[.]213[.]52[.]10
    74[.]55[.]160[.]98
    74[.]55[.]178[.]42
    74[.]63[.]87[.]106
    74[.]86[.]197[.]56
    74[.]86[.]31[.]98
    74[.]9[.]137[.]146
    74[.]92[.]102[.]227
    74[.]94[.]16[.]166
    74[.]94[.]52[.]114
    75[.]126[.]166[.]204
    75[.]145[.]139[.]19
    75[.]148[.]254[.]114
    75[.]52[.]208[.]225
    75[.]77[.]82[.]115
    75[.]77[.]82[.]219
    76[.]160[.]133[.]60
    76[.]161[.]97[.]99
    77[.]247[.]180[.]154
    94[.]195[.]239[.]81
    98[.]126[.]107[.]34

    ******************************
    Domain Name Awareness List
    ******************************

    advanbusiness[.]com
    aoldaily[.]com
    applesoftupdate[.]com
    arrowservice[.]net
    articles[.]twilightparadox[.]com
    aunewsonline[.]com
    bechtel[.]chickenkiller[.]com
    bigish[.]net
    businessconsults[.]net
    businessformars[.]com
    canadatvsite[.]com
    canoedaily[.]com
    chileexe77[.]com
    climate[.]undo[.]it
    cnndaily[.]com
    cnndaily[.]net
    comrepair[.]net
    defenceonline[.]net
    downloadsite[.]me
    e-cardsshop[.]com
    economic[.]mooo[.]com
    firefoxupdata[.]com
    freshreaders[.]net
    honeycow[.]keren[.]la
    hugesoft[.]org
    info[.]serveusers[.]com
    issnbgkit[.]net
    jobsadvanced[.]com
    marsbrother[.]com
    mcafeepaying[.]com
    news[.]trickip[.]org
    newsonet[.]net
    newsonlinesite[.]com
    niemannews[.]com
    nytimesnews[.]net
    pop-musicsite[.]com
    rssadvanced[.]org
    satellitebbs[.]com
    staycools[.]net
    symanteconline[.]net
    thehealthmood[.]net
    todayusa[.]org
    upload[.]ignorelist[.]com
    usabbs[.]org
    usnewssite[.]com
    voiceofman[.]com
    work[.]myftp[.]name
    yahoodaily[.]com

    STATEMENT ZU DEN “KOLPORTAGEN”, FABELN, MÄRCHEN UND LATRINENPAROLEN DER “GoMoPa”-“NAWITO”

    Liebe Leser,

    wieder einmal versucht die dubiose “GoMoPa” und deren Handlanger, Konsorten und Komparsen mutmasslich “Peter Ehlers” und “Nawito” von mutmasslich eigenen Taten abzulenken und mir perfide den “Schwarzen Peter” zuzuschieben.

    Wie bereits im Falle meines angeblichen falschen Magistertitels, dem Fall Meridian Capital etc pp die Liste ist endlos.

    Ein Sammelsurium von Kolportagen, Fabeln, Märchen und Latrinenpatrolen…

    Dabei liegen die Beweis klar auf dem Tisch:

    Die etablierten Medien wie “ZEIT” und “Süddeutsche Zeitung” haben es aufgedeckt, was hier im Fall “S &K”/”GoMoPa” wirklich lief.

    http://www.sueddeutsche.de/geld/mutmassliche-anlagebetrueger-sk-die-akte-midas-1.1620191-4

    http://www.sueddeutsche.de/geld/mutmassliche-anlagebetrueger-sk-die-akte-midas-1.1620191-4

    Nachdem zahlreiche Internetangriffe nichts gebarcht haben, nun wieder dieser Unsinn.

    Hier noch einmal meine Stellungnahme zu der “GoMoPa”/Ehlers/Nawito-Absurdistan-Agit-Propaganda:

    Dear Readers,

    let me just briefly comment a mental cyberattack which should distract your attention from the real issues.

    I have never had any consulting position or contract for any German company.

    I have never worked for the Axel Springer Publishing House – not even as a freelance journalist.

    These facts are clear and can be verified easily – just by calling Axel Springer.

    The facts are

    1) Dr. Rainer Zitelmann worked for the Axel Springer Company. You can esaily find out what happened there. I just mention the word “Auschwitz” in this context…As you see from his website and in the internet Zitelmann is in fact consulting many German companies.

    2) “GoMoPa” had in fact a consultation contract with estavis and got in fact money from estavis and many various companies i.e. “S&K”

    These contracts are known and 100% true and published by various media i.e. “ZEIT”, “MANAGER MAGAZIN”, “SUEDDEUTSCHE ZEITUNG” etc.

    3) Meridian Capital was the subject of “GoMoPa”s articles.

    4) “Nawito” whover or whatever it is did not even bother to contact us.

    5) The “information” about one of our companies is false.

    6) The “Nawito” informer “Peter Ehlers” did in fact attack Chancellor Merkel and the Minister of Finance Wolfgang Schäuble as “Deutschlands bekannteste Hehler” to name just one fact about “Peter Ehlers” or whatever his name might be who by the way got a lot of money from the bancrupt SAM AG which was also subject of “GoMoPa”‘s reporting and we know similiar cases of this endeavour.

    7) The last editor who was attacked by such cyberattacks died in a very mysterious way, Heinz Gerlach. He might have been controversial but nevertheless – the truth is the truth.

    He was the first journalist to publish the truth about the mysterious headquarter of “GoMoPa” in New York and their consulting contract with estavis and died suddenly and totally unexpected for most of us – not for all.

    The circumstances of his death remain unsolved for me.

    We are ready to proof this everytime and do not work with “colportations”.

    Obviously cyberattacks on our websites since years are not enough to keep the truth down – defamation must be added – a wellknown STASI technique to irritate the public – MENTAL AND PYSICAL CYBERATTACKS done by the well-know suspects.

    Sincerely your

    Bernd Pulch

    Magister Artium der Publizistik, Germanistik und Komparatistik

    PS

    COPIES OF PHYSICAL CYBER ATTACKS ON OUR SERVERS BY THE SUSPECTS AND “INFORMERS” OF “NAWITO”

    The attacked website are for example:

    http://www.investment-on.com

    http://www.berndpulch.org

    http://investment-magazin.com

    http://www.investment-magazin.tv

    and about 20 more.

    Würden Sie dem mutmasslichen Auftraggeber von Internet-Verbrechern, Otmar Knoll, “Fairvesta”, Geld anvertrauen ?

    Liebe Leser,

    wir haben eine Umfrage gestartet:

    Würden Sie dem mutmasslichen Auftraggeber von Internet-Verbrechern, Otmar Knoll, “Fairvesta”, der diese Taten selbst per E-Mail ankündigt, Ihr Geld anvertrauen ?

    Und zu welchen Taten halten Sie so jemanden noch für fähig ?

    Wir freuen uns auf Ihre Reaktionen !

    Hier die Belege für die monatelangen Internet-Attacken der Internet-Kriminellen, die Graphiken zeigen die DDos-Attacken auf über 20 Webseiten:

    https://berndpulch.org/2013/04/04/a-overview-of-the-heavy-cyberattacks-on-our-websites-to-stop-the-truth-done-by-the-suspects/

    und

    https://berndpulch.org/2013/04/05/even-more-mental-and-pysical-attacks-on-our-servers-by-the-suspects-of-gomopa-nawito-otmar-knoll-and-peter-ehlers/

    Hier die Rechtslage:

    https://berndpulch.org/2013/04/05/die-rechtslage-bei-schweren-internet-angriffen-wie-von-mutmasslich-gomopa-nawito-und-konsorten/

    Hier die Bekenner-E-Mail des dubiosen “Otmar Knoll” von der dubiosen “fairvesta”:

     

    Zitat OtmarKnoll/Fairvesta:

     

    Subject:  

    AW: AW: AW: AW: [Fwd: Your enquiry]

    From:  

    “Knoll, Otmar”

    Date:  

    Tue, February 5, 2013 8:14 pm

    To:  

    “‘office@ebizz.tv'”

    Priority:  

    Normal

    Options:  

    View Full Header | View Printable Version  | Download this as a file

     

    Schade dass Sie nicht hören wollen, nun ist es zu spät, vielleicht überlegen Sie
    sich das noch mal.
    Den wenn die Domains offline gehen, dann haben Sie kein Medium mehr.
    Wer nicht hören will muss fühlen sagt ein Sprichwort.
            
            
            http://i-nvestment.com/category/leserbrief/
            
            
    Mit freundlichen Grüßen
            
    Otmar Knoll
    Handlungsbevollmächtigter
            
    fairvesta Group AG
    Konrad-Adenauer-Str. 15
    D - 72072 Tübingen
    Tel:  +49 (0)7071 3665-0
    Fax: +49 (0)7071 3665-77
            o.knoll@fairvesta.de 
    www.fairvesta.de
            
    Amtsgericht Stuttgart HRB 382675
    Vorstand: Hermann Geiger
    Vorsitzender des Aufsichtsrates: Alfred Renner
    Sitz: Tübingen
    USt.-IdNr.: DE814337296

    Subject:  

    Jetzt aber offline

    From:  

    “Knoll, Otmar” <O.Knoll@fairvesta.de>

    Date:  

    Tue, February 5, 2013 11:20 pm

    To:  

    “‘office@ebizz.tv'” <office@ebizz.tv>

    Priority:  

    Normal

    Options:  

    View Full Header | View Printable Version  | Download this as a file

     

    http://www.investment-on.com/component/content/article/34-investment-m
    
    UPS, ist wohl offline gegangen, da haben meine Rundschreiben wohl geholfen. So wie
    es aussieht ist Ihre Seite nicht mehr erreichbar, insbesondere nachdem Sie meine
    letzten Mails online gestellt haben. Haben Sie wirklich geglaubt das das durchgeht
    und wir uns das gefallen lassen?
    
    Das kann auch mit den andern Domains so gehen, Sie haben ja noch genügend online!
    
    ....
    Also Sie
    haben keine Chance!
     
    Mit freundlichen Grüßen
     
    Otmar Knoll
    Handlungsbevollmächtigter
     
    fairvesta Group AG
    Konrad-Adenauer-Str. 15
    D - 72072 Tübingen
    Tel:  +49 (0)7071 3665-0
    Fax: +49 (0)7071 3665-77
    o.knoll@fairvesta.de
    www.fairvesta.de
     
    Amtsgericht Stuttgart HRB 382675
    Vorstand: Hermann Geiger
    Vorsitzender des Aufsichtsrates: Alfred Renner
    Sitz: Tübingen
    USt.-IdNr.: DE814337296
     
    -------------------------------------------------------------------
    Diese E-Mail enthält vertrauliche und/oder rechtlich geschützte Informationen. Wenn
    Sie nicht der richtige Adressat sind oder diese E-Mail irrtümlich erhalten haben,
    informieren Sie bitte sofort den Absender und vernichten Sie diese Mail. Das
    unerlaubte Kopieren, die unbefugte Weitergabe oder die Verwendung des Inhalts dieser
    Mail ist nicht gestattet.
    -------------------------------------------------------------------
    This e-mail may contain confidential and/or privileged information. If you are not
    the intended recipient (or have received this e-mail in error) please notify the
    sender immediately and destroy this e-mail. Any unauthorized copying, disclosure,
    distribution or usableness contents of this e-mail is strictly forbidden.
    -------------------------------------------------------------------
    Ce courriel est confidentiel et protégé. L'expéditeur ne renonce pas aux droits et
    obligations qui s'y rapportent. Toute diffusion, utilisation ou copie de ce message
    ou des renseignements qu'il contient par une personne autre que le (les)
    destinataire(s) désigné(s) est interdite. Si vous recevez ce courriel par erreur,
    veuillez m'en aviser immédiatement, par retour de courriel ou par un autre moyen.
    -------------------------------------------------------------------
     

    Wie sich die Internet-Kriminellen wie mutmasslich Otmar Knoll und “GoMoPa” und Genossen selber entlarven

     

     

     

    IMMER WIEDER WERDEN WEBSITES MUTMASSLICH DURCH “GOMoPa” UND DEREN MUTMASSLICHE AUFTRAGGEBER ATTACKIERT WIE MUTMASSLICH “GERD BENNEWIRTZ” UND “PETER EHLERS”SOWIE OTMAR KNOLL / FAIRVESTA:

     

    Zitat OtmarKnoll/Fairvesta:

     

    Subject:  

    AW: AW: AW: AW: [Fwd: Your enquiry]

    From:  

    “Knoll, Otmar”

    Date:  

    Tue, February 5, 2013 8:14 pm

    To:  

    “‘office@ebizz.tv'”

    Priority:  

    Normal

    Options:  

    View Full Header | View Printable Version  | Download this as a file

     

     

     

    Schade dass Sie nicht hören wollen, nun ist es zu spät, vielleicht überlegen Sie
    sich das noch mal.
    Den wenn die Domains offline gehen, dann haben Sie kein Medium mehr.
    Wer nicht hören will muss fühlen sagt ein Sprichwort.
            
            
            http://i-nvestment.com/category/leserbrief/
            
            
    Mit freundlichen Grüßen
            
    Otmar Knoll
    Handlungsbevollmächtigter
            
    fairvesta Group AG
    Konrad-Adenauer-Str. 15
    D - 72072 Tübingen
    Tel:  +49 (0)7071 3665-0
    Fax: +49 (0)7071 3665-77
            o.knoll@fairvesta.de 
    www.fairvesta.de
            
    Amtsgericht Stuttgart HRB 382675
    Vorstand: Hermann Geiger
    Vorsitzender des Aufsichtsrates: Alfred Renner
    Sitz: Tübingen
    USt.-IdNr.: DE814337296

     

     

     

     

     

     

    Subject:  

    Jetzt aber offline

    From:  

    “Knoll, Otmar” <O.Knoll@fairvesta.de>

    Date:  

    Tue, February 5, 2013 11:20 pm

    To:  

    “‘office@ebizz.tv'” <office@ebizz.tv>

    Priority:  

    Normal

    Options:  

    View Full Header | View Printable Version  | Download this as a file

     

     

     

    http://www.investment-on.com/component/content/article/34-investment-m
    
    UPS, ist wohl offline gegangen, da haben meine Rundschreiben wohl geholfen. So wie
    es aussieht ist Ihre Seite nicht mehr erreichbar, insbesondere nachdem Sie meine
    letzten Mails online gestellt haben. Haben Sie wirklich geglaubt das das durchgeht
    und wir uns das gefallen lassen?
    
    Das kann auch mit den andern Domains so gehen, Sie haben ja noch genügend online!
    
    ....
    
    Also Sie
    haben keine Chance!
    
    Mit freundlichen Grüßen
    
    Otmar Knoll
    Handlungsbevollmächtigter
    
    fairvesta Group AG
    Konrad-Adenauer-Str. 15
    D - 72072 Tübingen
    Tel:  +49 (0)7071 3665-0
    Fax: +49 (0)7071 3665-77
    o.knoll@fairvesta.de 
    www.fairvesta.de
    
    Amtsgericht Stuttgart HRB 382675
    Vorstand: Hermann Geiger
    Vorsitzender des Aufsichtsrates: Alfred Renner
    Sitz: Tübingen
    USt.-IdNr.: DE814337296
    
    -------------------------------------------------------------------
    Diese E-Mail enthält vertrauliche und/oder rechtlich geschützte Informationen. Wenn
    Sie nicht der richtige Adressat sind oder diese E-Mail irrtümlich erhalten haben,
    informieren Sie bitte sofort den Absender und vernichten Sie diese Mail. Das
    unerlaubte Kopieren, die unbefugte Weitergabe oder die Verwendung des Inhalts dieser
    Mail ist nicht gestattet.
    -------------------------------------------------------------------
    This e-mail may contain confidential and/or privileged information. If you are not
    the intended recipient (or have received this e-mail in error) please notify the
    sender immediately and destroy this e-mail. Any unauthorized copying, disclosure,
    distribution or usableness contents of this e-mail is strictly forbidden.
    -------------------------------------------------------------------
    Ce courriel est confidentiel et protégé. L'expéditeur ne renonce pas aux droits et
    obligations qui s'y rapportent. Toute diffusion, utilisation ou copie de ce message
    ou des renseignements qu'il contient par une personne autre que le (les)
    destinataire(s) désigné(s) est interdite. Si vous recevez ce courriel par erreur,
    veuillez m'en aviser immédiatement, par retour de courriel ou par un autre moyen.
    -------------------------------------------------------------------

     

     

     

     

    Unveiled – Seduced by Secrets – Inside the STASI Tech World – The E-Book – Free Download

    Seduced-by-Secrets-Inside-the-Stasis-Spy-Tech-World-2008-Macrakis

    In addition to revealing who the spies were, where they worked, and why they did what they did, the Rosenholz material unmasks an incredibly bloated human web of recruiters, instructors, couriers, and residents. The spiderweb was designed to support an agent, but was not cost-effective while it ensnared the secrets of the West. The Stasi simply overestimated the power of stolen technological secrets to solve its economic problems, and the enormous spy infrastructure investment produced a very small return.”

    “Scientific-technical intelligence gathering for the MfS usually meant recruiting agents who had access to important Western companies like IBM. Occasionally foreigners volunteered to contribute to the MfS’s scientific developments. An unusual offer came in the mid-sixties from an American computer specialist, Henry Sherwood, who wanted to help East Germany’s data processing industry. Born in Berlin under the name Heinz Weizenbaum, he fled the Nazis in 1936 and arrived in America, where he changed his name while in the U.S. Army. His brother was the famous MIT computer professor Joseph Weizenbaum. Sherwood was invited to direct the Diebold European research program in 1966 and invited the East German Data Processing and Business Machines Company to take part in the program.

    Suspicious that Sherwood might be an agent for a capitalist company, the Stasi set four informants on him at the Diebold Conference and between 1966 and 1969 launched ‘Action World Stature’ to try to use the material from the various conferences. Unfortunately, the Stasi staff members did not know English and could not effectively use the material. When Sherwood visited Erfurt, he brought IBM manuals and other material with him, which the Stasi photographed. When there was an opportunity for a German to go to America to acquire more knowledge about data processing, the Stasi vetoed the trip because they were worried that the scientist might be recruited and never come back.

    And that was the main contradiction the Stasi presents us with: on the one hand, they vigorously supported state programs by acquiring the needed embargoed or secret technology. On the other hand, security concerns made them work against their own interests by restricting the needed international travel of scientists and by imposing other harmful security measures.

    Die Rechtslage bei schweren Internet-Angriffen wie von mutmasslich “GoMoPa”, “Nawito” und Konsorten

    Zitat:

    Nachfolgend einige Links zu dem brisanten Thema, den wenn mutmasslich “GoMoPa”, “Nawito”, Sven Schmidt, “Eagle IT” und dubioser  “CTO” der dubiosen “GoMoPa” sowie sein mutmasslicher Genosse Thomas Promny und Genossen unsere starken Server ungestraft attackieren können, kann bald jedes Unternehmen ähnliche Probleme haben wie wir:

    http://www.fr-online.de/wikileaks—die-enthuellungsplattform/ddos-attacken-sabotage-im-weltweiten-netz,4882932,4913810.html

    http://de.wikipedia.org/wiki/Denial_of_Service

    http://www.internet-strafrecht.com/distributed-denial-of-service-ddos-attacken-strafbar-oder-nicht/internet-strafrecht/internetstrafrecht/

    All das zeigt, welche Kriminellen hier in STASI-Manier am Werk sind:

    Sie haben Angst vor der Wahrheit und können sich nur durch kriminelle Aktionen halten….

    Even More Mental and Pysical Attacks on our Servers by the Suspects of “GoMoPa”, “Nawito”, “Otmar Knoll” and “Peter Ehlers”

    Dear Readers,

    here is the proof for that our websites and the are constantly under attack – mental and pysical attacks by

    – “GoMoPa”

    – “Peter Ehlers”

    – “Klaus Maurischat”

    – “Nawito”

    – Otmar Knoll” – he announced himself the attacks in an official corporate Email  of his company “Fairvesta”!!!!

    and their thugs:

    graph

    This is in fact a very serious crime and causes longterm jail sentences !

     

    Krumme Immobiliengeschäfte ? Wie “Otmar Knoll”, “Fairvesta” zusammnen mit “GoMoPa” kritische Webseiten illegal ausschaltet

    Zitat OtmarKnoll/Fairvesta:

    Subject:   AW: AW: AW: AW: [Fwd: Your enquiry]
    From:   “Knoll, Otmar”
    Date:   Tue, February 5, 2013 8:14 pm
    To:   “‘office@ebizz.tv’”
    Priority:   Normal
    Options:   View Full Header | View Printable Version  | Download this as a file
    Schade dass Sie nicht hören wollen, nun ist es zu spät, vielleicht überlegen Sie
    sich das noch mal.
    Den wenn die Domains offline gehen, dann haben Sie kein Medium mehr.
    Wer nicht hören will muss fühlen sagt ein Sprichwort.
    
    http://i-nvestment.com/category/leserbrief/
    
    Mit freundlichen Grüßen
    
    Otmar Knoll
    Handlungsbevollmächtigter
    
    fairvesta Group AG
    Konrad-Adenauer-Str. 15
    D - 72072 Tübingen
    Tel:  +49 (0)7071 3665-0
    Fax: +49 (0)7071 3665-77
    o.knoll@fairvesta.de 
    www.fairvesta.de
    
    Amtsgericht Stuttgart HRB 382675
    Vorstand: Hermann Geiger
    Vorsitzender des Aufsichtsrates: Alfred Renner
    Sitz: Tübingen
    USt.-IdNr.: DE814337296

    AN OVERVIEW OF THE HEAVY CYBERATTACKS ON OUR WEBSITES TO STOP THE TRUTH DONE BY THE SUSPECTS

    These graphs below show the cyberattacks on our website initiated by the suspects we already mentioned and who even announced in an email that tehy would do this illegal internet crime. The email was by Otmar Knoll, Fairvesta, who announced the cybercrime. The suspected hackers are from “GoMoPa” and their thugs.

    The graphs show the DDos attacks on our servers.

    What is a DDos attack ?

    Read here:

    http://en.wikipedia.org/wiki/Denial-of-service_attack

    These internet crimes are punished with  longterm jail sentences and financial compensation..

    Die untenstehenden Graphiken zeigen die Hackernagriffe auf unsere Webseiten, die seit Jahren durchgeführt werden im Ausschnitt. In einer Email an uns hat Otmar Knoll, Fairvesta, die Hackerangriffe, somit schwere Internetverbrechen angekündigt. Wir haben diese Emails bereits veröffentlicht. Mutmasslich arbeitet Otmar Knoll mit den üblichen Verdächtigen der “GoMoPa”, ihren Informanten und Hackern zusammen:

    Die Graphiken zeigen die sogenannten DDos-Angriffe auf unsere Server.

    Was ist eine DDos Attacke ?

    http://de.wikipedia.org/wiki/Denial_of_Service

    Lesen Sie hier:

    Diese Vergehen werden mit langjährigen Freiheitsstrafen und Schadensersatz bestraft.

    graph eastern

    graph 3graph2graphgraphgraph

    Statement about the dubious “colportations” of “Nawito” – MENTAL AND PHYSICAL CYBERATTACKS

    Bernd-Pulchernst

    Dear Readers,

    let me just briefly comment a mental cyberattack which should distract your attention from the real issues.

    I have never had any consulting position or contract for any German company.

    I have never worked for the Axel Springer Publishing House – not even as a freelance journalist.

    These facts are clear and can be verified easily – just by calling Axel Springer.

    The facts are

    1) Dr. Rainer Zitelmann worked for the Axel Springer Company. You can esaily find out what happened there. I just mention the word “Auschwitz” in this context…As you see from his website and in the internet Zitelmann is in fact consulting many German companies.

    2) “GoMoPa” had in fact a consultation contract with estavis and got in fact money from estavis and many various companies i.e. “S&K”

    These contracts are known and 100% true and published by various media i.e. “ZEIT”, “MANAGER MAGAZIN”, “SUEDDEUTSCHE ZEITUNG” etc.

    3) Meridian Capital was the subject of “GoMoPa”s articles.

    4) “Nawito” whover or whatever it is did not even bother to contact us.

    5) The “information” about one of our companies is false.

    6) The “Nawito” informer “Peter Ehlers” did in fact attack Chancellor Merkel and the Minister of Finance Wolfgang Schäuble as “Deutschlands bekannteste Hehler” to name just one fact about “Peter Ehlers” or whatever his name might be who by the way got a lot of money from the bancrupt SAM AG which was also subject of “GoMoPa”‘s reporting and we know similiar cases of this endeavour.

    7) The last editor who was attacked by such cyberattacks died in a very mysterious way, Heinz Gerlach. He might have been controversial but nevertheless – the truth is the truth.

    He was the first journalist to publish the truth about the mysterious headquarter of “GoMoPa” in New York and their consulting contract with estavis and died suddenly and totally unexpected for most of us – not for all.

    The circumstances of his death remain unsolved for me.

    We are ready to proof this everytime and do not work with “colportations”.

    Obviously cyberattacks on our websites since years are not enough to keep the truth down – defamation must be added – a wellknown STASI technique to irritate the public – MENTAL AND PYSICAL CYBERATTACKS done by the well-know suspects.

    Sincerely your

    Bernd Pulch

    Magister Artium der Publizistik, Germanistik und Komparatistik

    PS

    COPIES OF PHYSICAL CYBER ATTACKS ON OUR SERVERS BY THE SUSPECTS AND “INFORMERS” OF “NAWITO”

    graph eastern

    graph 3

    graph2

    graphThe attacked s

    The attacked website are for example:

    http://www.investment-on.com

    http://www.berndpulch.org

    http://investment-magazin.com

    http://www.investment-magazin.tv

    and about 20 more.

    The Best Proof for the Truth we are telling – Cyberattacks everyday by the Suspects

    hacker.gifchinese

    One day after The New York Times reported that Chinese hackers had infiltrated its computers and stolen passwords for its employees, The Wall Street Journal announced that it too had been hacked.

    On Thursday, The Journal reported that it had been attacked by Chinese hackers who were trying to monitor the company’s coverage of China. It said hackers had broken into its network through computers in its Beijing bureau.

    In a written statement, the business newspaper owned by News Corporation described the attack as an “ongoing issue” and said it was working closely with authorities and security specialists to clean up its systems. It said that it completed a “network overhaul” on Thursday in an effort to rid its systems of hackers.

    China’s Ministry of National Defense has denied any involvement in the cyberattack at The Times or any other American corporations.

    But security experts said that in 2008, Chinese hackers began targeting American news organizations as part of an effort to monitor coverage of Chinese issues.

    In a report for clients in December, Mandiant, a computer security company, said that over the course of several investigations it found evidence that Chinese hackers had stolen e-mails, contacts and files from more than 30 journalists and executives at Western news organizations, and had maintained a “short list” of journalists for repeated attacks. Among those targeted were journalists who had written about Chinese leaders, political and legal issues in China and the telecom giant Huawei.

    Bloomberg News, another American news organization, was targeted by Chinese hackers last year, and some computers were infected, according to a person with knowledge of the company’s internal investigation. The attack occurred after Bloomberg published an article on June 29 about the wealth accumulated by relatives of Xi Jinping, a Chinese official who is expected to become president in March.

    Bloomberg has confirmed that hackers had made attempts but said that “no computer systems or computers were compromised.”

    The timing of the attacks on The New York Times coincided with the reporting for an investigation, published online on Oct. 25, that found that the relatives of Wen Jiabao,China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings.

    Security experts hired by The Times to detect and block the computer attacks found digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times’s network.

    The Associated Press reported Thursday that officials in the Obama administration were considering more assertive action against Beijing to stop Chinese computer espionage campaigns.

    The Secretary of State, Hillary Clinton, said Thursday a global effort was needed o establish “rules of the road” for cyber activity.  In her final meeting with reporters at the State Department, Mrs. Clinton addressed a question about China’s efforts to infiltrate computer systems at The New York Times.

    “We have seen over the last years an increase in not only the hacking attempts on government institutions but also non-governmental ones,” Mrs. Clinton said.

    The Chinese, she said, “are not the only people who are hacking us.”

    “There is a lot that we are working on that will be deployed in the event that we don’t get some kind of international effort under way,” Mrs. Clinton added without elaborating.

    The United States has been increasingly vocal about such efforts against government and private industry. In a November 2011 intelligence report, government officials specifically accused China and Russia of stealing intellectual property for economic gain.

    <nyt_author_id>

    Michael Gordon contributed reporting from Washington.

    http://www.nytimes.com/2013/02/01/technology/wall-street-journal-reports-attack-by-china-hackers.html

     

    So this is a part of the big picture: The small picture concerns former STASI agents and their comrades and thugs in Germany.

    The Best Proof for the Truth we are telling – Cyberattacks everyday by the Suspects against our websites !

    TOP-SECRET – DHS Cybersecurity Order 13636

    Executive Order 13636: Improving Critical Infrastructure Cybersecurity Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    20 pages
    For Official Use Only
    March 11, 2013Executive Order 13636: Improving Critical Infrastructure Cybersecurity Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    20 pages
    For Official Use Only
    March 11, 2013
    Executive Order 13636: Improving Critical Infrastructure Cybersecurity Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    20 pages
    For Official Use Only
    March 11, 2013

    Download

    Overview of Executive Order 13636

    – Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity was released on February 12, 2013
    – Relies on public-private collaboration to improve critical infrastructure cyber posture
    – Includes elements to enhance information sharing, develop a cybersecurity framework, and create a voluntary cybersecurity program
    – Requires the Department of Homeland Security (DHS) to identify the “critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security”

    DHS will work with CIPAC to execute Section 9 of the EO

    “Within 150 days of the date of this order, the Secretary shall use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.” (EO 13636, Section 9)

    Apply consistent, objective criteria

    Stakeholders include:
    – Critical Infrastructure Partnership Advisory Council (CIPAC)
    – Sector Specific Agencies (SSA)
    – Sector Coordinating Councils (SCC)
    – Government Coordinating Councils (GCC)
    – Critical infrastructure owners and operators

    The list of identified critical infrastructure will be reviewed and updated on an annual basis

    Execution of Section 9 will be led by the Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    Overview of CDII Approach (1 of 2)

    Only a small subset of U.S. infrastructure will fall under the focus of the EO activity
    – Owners and operators will have the opportunity to provide relevant information
    – A review process will be established for the identification as critical infrastructure

    Focus is on critical infrastructure that could be compromised through cyber exploitation and which, if incapacitated, could result in catastrophic national, public health, or economic consequences
    – Higher standard than debilitating, which is what is used in the base definition to define critical infrastructure
    – The Secretary of DHS will provide a list of critical infrastructure most at risk in the context of a cyber incident within 150 days of EO release
    – Commercial IT products and consumer information technology services will not be directly designated under the EO as infrastructure most at risk

    All sectors will be engaged –through engagement and initial analysis it may be determined that a sector does not have any infrastructure that meets the threshold, the focus of the initial list will not be on that sector(s)

    Sectors with existing CI identification processes and lists should be leveraged where appropriate

    Functions-based approach to identify critical infrastructure
    – Accounts for the virtual and distributed nature of cyber infrastructure
    – Focuses on the critical activities, services, or products being produced or provided by a sector, subsector, or mode
    – Functions are identified based on the national or regional level consequences that can result from a disruption or exploitation of the infrastructure
    – Does not identify a specific organization’s assets, networks, or systems; focus is on sector functions and the types of systems that support them

    Requires the application of criteria that will be used to screen the infrastructure that aligns to the critical functions
    – Consistently applied within sectors and, where possible, across sectors as well

    Stakeholder engagement will be conducted throughout this effort
    – CDIIWG will work with sectors (SSAs, SCCs, GCCs) via the CIPAC partnership framework

    Download

    Overview of Executive Order 13636

    – Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity was released on February 12, 2013
    – Relies on public-private collaboration to improve critical infrastructure cyber posture
    – Includes elements to enhance information sharing, develop a cybersecurity framework, and create a voluntary cybersecurity program
    – Requires the Department of Homeland Security (DHS) to identify the “critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security”

    DHS will work with CIPAC to execute Section 9 of the EO

    “Within 150 days of the date of this order, the Secretary shall use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.” (EO 13636, Section 9)

    Apply consistent, objective criteria

    Stakeholders include:
    – Critical Infrastructure Partnership Advisory Council (CIPAC)
    – Sector Specific Agencies (SSA)
    – Sector Coordinating Councils (SCC)
    – Government Coordinating Councils (GCC)
    – Critical infrastructure owners and operators

    The list of identified critical infrastructure will be reviewed and updated on an annual basis

    Execution of Section 9 will be led by the Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    Overview of CDII Approach (1 of 2)

    Only a small subset of U.S. infrastructure will fall under the focus of the EO activity
    – Owners and operators will have the opportunity to provide relevant information
    – A review process will be established for the identification as critical infrastructure

    Focus is on critical infrastructure that could be compromised through cyber exploitation and which, if incapacitated, could result in catastrophic national, public health, or economic consequences
    – Higher standard than debilitating, which is what is used in the base definition to define critical infrastructure
    – The Secretary of DHS will provide a list of critical infrastructure most at risk in the context of a cyber incident within 150 days of EO release
    – Commercial IT products and consumer information technology services will not be directly designated under the EO as infrastructure most at risk

    All sectors will be engaged –through engagement and initial analysis it may be determined that a sector does not have any infrastructure that meets the threshold, the focus of the initial list will not be on that sector(s)

    Sectors with existing CI identification processes and lists should be leveraged where appropriate

    Functions-based approach to identify critical infrastructure
    – Accounts for the virtual and distributed nature of cyber infrastructure
    – Focuses on the critical activities, services, or products being produced or provided by a sector, subsector, or mode
    – Functions are identified based on the national or regional level consequences that can result from a disruption or exploitation of the infrastructure
    – Does not identify a specific organization’s assets, networks, or systems; focus is on sector functions and the types of systems that support them

    Requires the application of criteria that will be used to screen the infrastructure that aligns to the critical functions
    – Consistently applied within sectors and, where possible, across sectors as well

    Stakeholder engagement will be conducted throughout this effort
    – CDIIWG will work with sectors (SSAs, SCCs, GCCs) via the CIPAC partnership framework

    DownloadExecutive Order 13636: Improving Critical Infrastructure Cybersecurity Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    20 pages
    For Official Use Only
    March 11, 2013

    Download

    Overview of Executive Order 13636

    – Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity was released on February 12, 2013
    – Relies on public-private collaboration to improve critical infrastructure cyber posture
    – Includes elements to enhance information sharing, develop a cybersecurity framework, and create a voluntary cybersecurity program
    – Requires the Department of Homeland Security (DHS) to identify the “critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security”

    DHS will work with CIPAC to execute Section 9 of the EO

    “Within 150 days of the date of this order, the Secretary shall use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.” (EO 13636, Section 9)

    Apply consistent, objective criteria

    Stakeholders include:
    – Critical Infrastructure Partnership Advisory Council (CIPAC)
    – Sector Specific Agencies (SSA)
    – Sector Coordinating Councils (SCC)
    – Government Coordinating Councils (GCC)
    – Critical infrastructure owners and operators

    The list of identified critical infrastructure will be reviewed and updated on an annual basis

    Execution of Section 9 will be led by the Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    Overview of CDII Approach (1 of 2)

    Only a small subset of U.S. infrastructure will fall under the focus of the EO activity
    – Owners and operators will have the opportunity to provide relevant information
    – A review process will be established for the identification as critical infrastructure

    Focus is on critical infrastructure that could be compromised through cyber exploitation and which, if incapacitated, could result in catastrophic national, public health, or economic consequences
    – Higher standard than debilitating, which is what is used in the base definition to define critical infrastructure
    – The Secretary of DHS will provide a list of critical infrastructure most at risk in the context of a cyber incident within 150 days of EO release
    – Commercial IT products and consumer information technology services will not be directly designated under the EO as infrastructure most at risk

    All sectors will be engaged –through engagement and initial analysis it may be determined that a sector does not have any infrastructure that meets the threshold, the focus of the initial list will not be on that sector(s)

    Sectors with existing CI identification processes and lists should be leveraged where appropriate

    Functions-based approach to identify critical infrastructure
    – Accounts for the virtual and distributed nature of cyber infrastructure
    – Focuses on the critical activities, services, or products being produced or provided by a sector, subsector, or mode
    – Functions are identified based on the national or regional level consequences that can result from a disruption or exploitation of the infrastructure
    – Does not identify a specific organization’s assets, networks, or systems; focus is on sector functions and the types of systems that support them

    Requires the application of criteria that will be used to screen the infrastructure that aligns to the critical functions
    – Consistently applied within sectors and, where possible, across sectors as well

    Stakeholder engagement will be conducted throughout this effort
    – CDIIWG will work with sectors (SSAs, SCCs, GCCs) via the CIPAC partnership framework

    Overview of Executive Order 13636

    – Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity was released on February 12, 2013
    – Relies on public-private collaboration to improve critical infrastructure cyber posture
    – Includes elements to enhance information sharing, develop a cybersecurity framework, and create a voluntary cybersecurity program
    – Requires the Department of Homeland Security (DHS) to identify the “critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security”

    DHS will work with CIPAC to execute Section 9 of the EO

    “Within 150 days of the date of this order, the Secretary shall use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.” (EO 13636, Section 9)

    Apply consistent, objective criteria

    Stakeholders include:
    – Critical Infrastructure Partnership Advisory Council (CIPAC)
    – Sector Specific Agencies (SSA)
    – Sector Coordinating Councils (SCC)
    – Government Coordinating Councils (GCC)
    – Critical infrastructure owners and operators

    The list of identified critical infrastructure will be reviewed and updated on an annual basis

    Execution of Section 9 will be led by the Cyber-Dependent Infrastructure Identification Working Group (CDIIWG)

    Overview of CDII Approach (1 of 2)

    Only a small subset of U.S. infrastructure will fall under the focus of the EO activity
    – Owners and operators will have the opportunity to provide relevant information
    – A review process will be established for the identification as critical infrastructure

    Focus is on critical infrastructure that could be compromised through cyber exploitation and which, if incapacitated, could result in catastrophic national, public health, or economic consequences
    – Higher standard than debilitating, which is what is used in the base definition to define critical infrastructure
    – The Secretary of DHS will provide a list of critical infrastructure most at risk in the context of a cyber incident within 150 days of EO release
    – Commercial IT products and consumer information technology services will not be directly designated under the EO as infrastructure most at risk

    All sectors will be engaged –through engagement and initial analysis it may be determined that a sector does not have any infrastructure that meets the threshold, the focus of the initial list will not be on that sector(s)

    Sectors with existing CI identification processes and lists should be leveraged where appropriate

    Functions-based approach to identify critical infrastructure
    – Accounts for the virtual and distributed nature of cyber infrastructure
    – Focuses on the critical activities, services, or products being produced or provided by a sector, subsector, or mode
    – Functions are identified based on the national or regional level consequences that can result from a disruption or exploitation of the infrastructure
    – Does not identify a specific organization’s assets, networks, or systems; focus is on sector functions and the types of systems that support them

    Requires the application of criteria that will be used to screen the infrastructure that aligns to the critical functions
    – Consistently applied within sectors and, where possible, across sectors as well

    Stakeholder engagement will be conducted throughout this effort
    – CDIIWG will work with sectors (SSAs, SCCs, GCCs) via the CIPAC partnership framework

    Unveiled – Incentives to Adopt Improved Cybersecurity Practices

    Incentives to Adopt Improved Cybersecurity Practices

     


    http://www.ofr.gov/OFRUpload/OFRData/2013-07234_PI.pdf

    [FR Doc. 2013-07234 Filed 03/27/2013 at 8:45 am; Publication Date: 03/28/2013]

    Billing Code: 3510-EA

    DEPARTMENT OF COMMERCE
    Office of the Secretary
    National Institute of Standards and Technology
    National Telecommunications and Information Administration

    [Docket Number: 130206115-3115-01]

    Incentives to Adopt Improved Cybersecurity Practices

    AGENCY: U.S. Department of Commerce.

    ACTION: Notice of Inquiry.

    SUMMARY: The President has directed the Secretary of Commerce to evaluate a set of incentives designed to promote participation in a voluntary program to be established by the Secretary of Homeland Security to support the adoption by owners and operators of critical infrastructure and other interested entities of the Cybersecurity Framework being developed by the National Institute of Standards and Technology (NIST). The evaluation will include analysis of the benefits and relative effectiveness of such incentives, and whether the incentives would require legislation or can be provided under existing law and authorities to participants in the Program. The Department of Commerce (Department) will use input received in response to this Notice to inform its recommendations, which will focus on incentives for critical infrastructure owners. In addition, the Department may use this input to develop a broader set of recommendations that apply to U.S. industry as a whole.

    DATES: Comments are due on or before [insert date 30 days after date of publication in the Federal Register].

    ADDRESSES: Written comments may be submitted by mail to the Office of Policy Analysis and Development, National Telecommunications and Information Administration, U.S. Department of Commerce, 1401 Constitution Avenue, N.W., Room 4725, Washington, DC 20230. Comments may be submitted electronically to cyberincentives[at]ntia.doc.gov. All email messages and comments received are a part of the public record and will be made available to the public generally without change on the Internet Policy Task Force Web page at http://www.ntia.doc.gov/category/cybersecurity. For this reason, comments should not include confidential, proprietary, or business sensitive information.

    FOR FURTHER INFORMATION CONTACT: For questions about this Notice, contact: Alfred Lee, Office of Policy Analysis and Development, National Telecommunications and Information Administration, U.S. Department of Commerce, 1401 Constitution Avenue, NW., Room 4725, Washington, DC 20230, telephone (202) 482–1880; or send an e-mail to cyberincentives[at]ntia.doc.gov. Please direct media inquiries to the Office of Public Affairs at (202) 482-4883; or send an email to publicaffairs[at]doc.gov.

    SUPPLEMENTARY INFORMATION: The national and economic security of the United States depends on the reliable functioning of the Nation’s critical infrastructure. The cyber threat to critical infrastructure is growing and represents one of the most serious national security challenges that the United States must confront. On February 12, 2013, the President signed Executive Order 13636, “Improving Critical Infrastructure Cybersecurity.”1 As the President stated in the Executive Order, “repeated cyber intrusions into America’s critical infrastructure demonstrate a need for improved cybersecurity.”2

    1 “Exec. Order No. 13636, 78 Fed. Reg. 11739 (Feb. 19, 2013), available at:https://www.federalregister.gov/articles/2013/02/19/2013-03915/improving-
    critical-infrastructure-cybersecurity
    .

    2 Id.

    The Executive Order establishes a policy of enhancing the security and resilience of the Nation’s critical infrastructure and maintaining a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy and civil liberties through a partnership with the owners and operators of critical infrastructure3 to improve cybersecurity information sharing and collaboratively develop and implement risk-based standards. The Executive Order sets forth three elements to establish this partnership. First, the Department of Homeland Security (“DHS”) will use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security. Second, the National Institute of Standards and Technology will develop a framework consisting of a set of standards, methodologies, procedures, and processes that align policy, business, and technological approaches to address cyber risks (“the Framework”), which will provide a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, to help owners and operators of critical infrastructure indentify, asses, and manage cyber risk. Third, DHS, in coordination with sector-specific agencies, will develop the Critical Infrastructure Cybersecurity Program (“the Program”) to promote voluntary adoption of the Framework.

    3 For the purposes of this Notice, the term “critical infrastructure” has the meaning given the term in 42 U.S.C. § 5195c(e): “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”

    The Executive Order recognizes that further incentives may be necessary to encourage sufficient private sector participation in the Program. To develop a clearer picture of existing and potential incentives, the Executive Order directs the Department of Commerce to recommend ways to promote participation in the Program.4 The recommendations “shall include analysis of the benefits and relative effectiveness of such incentives, and whether the incentives would require legislation or can be provided under existing law and authorities to participants of the Program.” Consistent with the Executive Order, these incentives may include technical and public policy measures that improve cybersecurity without creating barriers to innovation, economic growth, and the free flow of information. The Department of Commerce will submit its recommendations to the President through the Assistant to the President for Homeland Security and Counterterrorism and the Assistant to the President for Economic Affairs no later than June 12, 2013.

    4 The Executive Order also directs the Secretaries of the Treasury and Homeland Security to recommend incentives to participate in the Program. The Secretary of Defense and the Administrator of General Services are also tasked with reporting on government procurement-related issues.

    Improving cybersecurity practices among entities that do not own or operate critical infrastructure, or for other reasons are unlikely to join the Program, is also an important Executive Branch priority. Therefore, the Department of Commerce also seeks comment on a broader set of incentives that could help to promote the adoption of proven efforts to address cybersecurity vulnerabilities.

    The Department of Commerce asked questions related to incentives for noncritical infrastructure in a July 2010 Notice of Inquiry.5 Responses to the July 2010 Notice aided the Department’s efforts to promote standards and best practices and informed its June 2011 “Green Paper,” Cybersecurity, Innovation and the Internet Economy.6 Along with the responses to this Notice, the Department plans to draw again on earlier responses in the development of recommendations to the President on incentives. In addition, the Department plans to use responsive comments to inform a follow-up to the Green Paper.

    5 Dept. of Commerce, Cybersecurity, Innovation, and the Internet Economy, 75 Fed. Reg. 44216 (July 28, 2010) (Notice of Inquiry), available athttp://www.ntia.doc.gov/frnotices/2010/FR_CybersecurityNOI_07282010.pdf.

    Comments received in response to the 2010 Notice of Inquiry are available at

    http://www.nist.gov/itl/cybercomments.cfm.

    6 Dept. of Commerce, Cybersecurity, Innovation, and the Internet Economy (June 2011),

    http://www.nist.gov/itl/upload/Cybersecurity_Green-Paper_FinalVersion.pdf. The questions asked in the Green Paper are available at Dept. of Commerce, Cybersecurity, Innovation, and the Internet Economy, 76 Fed. Reg. 34965 (June 15, 2011), available at

    http://www.ntia.doc.gov/federal-register-notice/2011/cybersecurity-innovationand-internet-economy.

    Comments received in response to the Green Paper are available at

    http://www.nist.gov/itl/greenpapercomments.cfm.

    Stakeholders that responded to the July 2010 Notice may wish to focus on the following questions:

    • Have your viewpoints on any questions related to incentives for noncritical infrastructure changed since you filed them in response to the July 2010 Notice?• Do your comments related to incentives for noncritical infrastructure also apply equally to critical infrastructure?

    • Does anything in the Executive Order or recent legislative proposals change your views on what incentives will be necessary or how they can be achieved? In particular, would the incentives that you previously discussed be effective in encouraging all firms that participate in the Internet economy to participate in the Program? Would these incentives encourage critical infrastructure companies to join the Program?

    In answering these questions, commenters should not limit their responses to incentives that are feasible under existing law.

    For all stakeholders, particularly those that did not respond to these earlier inquiries, the Department of Commerce requests comments on any of the following questions:

    • Are existing incentives adequate to address the current risk environment for your sector/company?• Do particular business sectors or company types lack sufficient incentives to make cybersecurity investments more than others? If so, why?

    • How do businesses/your business assess the costs and benefits of enhancing their cybersecurity?

    • What are the best ways to encourage businesses to make investments in cybersecurity that are appropriate for the risks that they face?

    • How do businesses measure success and the cost-effectiveness of their current cybersecurity programs?

    • Are there public policies or private sector initiatives in the United States or other countries that have successfully increased incentives to make security investments or other investments that can be applied to security?

    • Are there disincentives or barriers that inhibit cybersecurity investments by firms? Are there specific investment challenges encountered by small businesses and/or multinational companies, respectively? If so, what are the disincentives, barriers or challenges and what should be done to eliminate them?

    • Are incentives different for small businesses? If so, how?

    • For American businesses that are already subject to cybersecurity requirements, what is the cost of compliance and is it burdensome relative to other costs of doing business?

    • What are the merits of providing legal safe-harbors to individuals and commercial entities that participate in the DHS Program? By contrast, what would be the merits or implications of incentives that hold entities accountable for failure to exercise reasonable care that results in a loss due to inadequate security measures?

    • What would be the impact of requiring entities to join the DHS Program prior to receiving government financial guarantees or assistance in relevant sectors?

    • How can liability structures and insurance, respectively, be used as incentives?

    • What other market tools are available to encourage cybersecurity best practices?

    • Should efforts be taken to better promote and/or support the adoption of the Framework or specific standards, practices, and guidelines beyond the DHS Program? If so, what efforts would be effective?

    • In what way should these standards, practices, and guidelines be promoted to small businesses and multinationals, respectively, and through what mechanisms? How can they be promoted and adapted for multinational companies in various jurisdictions?

    • What incentives are there to ensure that best practices and standards, once adopted, are updated in the light of changing threats and new business models?

    • Voluntary industry sector governance mechanisms are sometimes used to stimulate organizations to conform to a set of principles, guidelines, and operations based on best practices, standards, and conformity assessment processes that collectively increase the level of assurance while preserving organizations’ brand standing and the integrity of products and services.

    o Do organizations participate in voluntary governance mechanisms?o Which industries/groups have voluntary governance mechanisms?

    o Do existing voluntary governance mechanisms have cybersecurity-related constraints?

    o What are the benefits and challenges associated with voluntary governance mechanisms?

    Dated: __March 22, 2013_______________.

    Rebecca M. Blank, Deputy Secretary of Commerce.

    Patrick Gallagher, Under Secretary of Commerce for Standards and Technology.

    Lawrence E. Strickling, Assistant Secretary for Communications and Information.

     


    Cloudflare Inside View – Biggest DDos Attack in History on Spamhaus

    At CloudFlare, we deal with large DDoS attacks every day. Usually, these attacks are directed at large companies or organizations that are reluctant to talk about their details. It’s fun, therefore, whenever we have a customer that is willing to let us tell the story of an attack they saw and how we mitigated it. This is one of those stories.

    Spamhaus

    Yesterday, Tuesday, March 19, 2013, CloudFlare was contacted by the non-profit anti-spam organization Spamhaus. They were suffering a large DDoS attack against their website and asked if we could help mitigate the attack.

    Spamhaus_logo

    Spamhaus provides one of the key backbones that underpins much of the anti-spam filtering online. Run by a tireless team of volunteers, Spamhaus patrols the Internet for spammers and publishes a list of the servers they use to send their messages in order to empower email system administrators to filter unwanted messages. Spamhaus’s services are so pervasive and important to the operation of the Internet’s email architecture that, when a lawsuit threatened to shut the service down, industry experts testified [PDF, full disclosure: I wrote the brief back in the day] that doing so risked literally breaking email since Spamhaus is directly or indirectly responsible for filtering as much as 80% of daily spam messages.

    Beginning on March 18, the Spamhaus site came under attack. The attack was large enough that the Spamhaus team wasn’t sure of its size when they contacted us. It was sufficiently large to fully saturate their connection to the rest of the Internet and knock their site offline. These very large attacks, which are known as Layer 3 attacks, are difficult to stop with any on-premise solution. Put simply: if you have a router with a 10Gbps port, and someone sends you 11Gbps of traffic, it doesn’t matter what intelligent software you have to stop the attack because your network link is completely saturated.

    Burst_pipe

    While we don’t know who was behind this attack, Spamhaus has made plenty of enemies over the years. Spammers aren’t always the most lovable of individuals and Spamhaus has been threatened, sued, and DDoSed regularly. Spamhaus’s blocklists are distributed via DNS and there is a long list of volunteer organizations that mirror their DNS infrastructure in order to ensure it is resilient to attacks. The website, however, was unreachable.

    Filling Up the Series of Tubes

    Very large Layer 3 attacks are nearly always originated from a number of sources. These many sources each send traffic to a single Internet location, effectively creating a tidal wave that overwhelms the target’s resources. In this sense, the attack is distributed (the first D in DDoS — Distributed Denial of Service). The sources of attack traffic can be a group of individuals working together (e.g., the Anonymous LOIC model, although this is Layer 7 traffic and even at high volumes usually much smaller in volume than other methods), a botnet of compromised PCs, a botnet of compromised servers, misconfigured DNS resolvers, or even home Internet routers with weak passwords.

    Since an attacker attempting to launch a Layer 3 attack doesn’t care about receiving a response to the requests they send, the packets that make up the attack do not have to be accurate or correctly formatted. Attackers will regularly spoof all the information in the attack packets, including the source IP, making it look like the attack is coming from a virtually infinite number of sources. Since packets data can be fully randomized, using techniques like IP filtering even upstream becomes virtually useless.

    Spamhaus signed up for CloudFlare on Tuesday afternoon and we immediately mitigated the attack, making the site once again reachable. (More on how we did that below.) Once on our network, we also began recording data about the attack. At first, the attack was relatively modest (around 10Gbps). There was a brief spike around 16:30 UTC, likely a test, that lasted approximately 10 minutes. Then, around 21:30 UTC, the attackers let loose a very large wave.

    The graph below is generated from bandwidth samples across a number of the routers that sit in front of servers we use for DDoS scrubbing. The green area represents in-bound requests and the blue line represents out-bound responses. While there is always some attack traffic on our network, it’s easy to see when the attack against Spamhaus started and then began to taper off around 02:30 UTC on March 20, 2013. As I’m writing this at 16:15 UTC on March 20, 2013, it appears the attack is picking up again.

    How to Generate a 75Gbps DDoS

    The largest source of attack traffic against Spamhaus came from DNS reflection. I’vewritten about these attacks before and in the last year they have become the source of the largest Layer 3 DDoS attacks we see (sometimes well exceeding 100Gbps). Open DNS resolvers are quickly becoming the scourge of the Internet and the size of these attacks will only continue to rise until all providers make a concerted effort to close them. (It also makes sense to implement BCP-38, but that’s a topic for another post another time.)

    The basic technique of a DNS reflection attack is to send a request for a large DNS zone file with the source IP address spoofed to be the intended victim to a large number of open DNS resolvers. The resolvers then respond to the request, sending the large DNS zone answer to the intended victim. The attackers’ requests themselves are only a fraction of the size of the responses, meaning the attacker can effectively amplify their attack to many times the size of the bandwidth resources they themselves control.

    In the Spamhaus case, the attacker was sending requests for the DNS zone file for ripe.net to open DNS resolvers. The attacker spoofed the CloudFlare IPs we’d issued for Spamhaus as the source in their DNS requests. The open resolvers responded with DNS zone file, generating collectively approximately 75Gbps of attack traffic. The requests were likely approximately 36 bytes long (e.g. dig ANY ripe.net @X.X.X.X +edns=0 +bufsize=4096, where X.X.X.X is replaced with the IP address of an open DNS resolver) and the response was approximately 3,000 bytes, translating to a 100x amplification factor.

    We recorded over 30,000 unique DNS resolvers involved in the attack. This translates to each open DNS resolver sending an average of 2.5Mbps, which is small enough to fly under the radar of most DNS resolvers. Because the attacker used a DNS amplification, the attacker only needed to control a botnet or cluster of servers to generate 750Mbps — which is possible with a small sized botnet or a handful of AWS instances. It is worth repeating: open DNS resolvers are the scourge of the Internet and these attacks will become more common and large until service providers take serious efforts to close them.

    How You Mitigate a 75Gbps DDoS

    While large Layer 3 attacks are difficult for an on-premise DDoS solution to mitigate, CloudFlare’s network was specifically designed from the beginning to stop these types of attacks. We make heavy use of Anycast. That means the same IP address is announced from every one of our 23 worldwide data centers. The network itself load balances requests to the nearest facility. Under normal circumstances, this helps us ensure a visitor is routed to the nearest data center on our network.

    When there’s an attack, Anycast serves to effectively dilute it by spreading it across our facilities. Since every data center announces the same IP address for any CloudFlare customer, traffic cannot be concentrated in any one location. Instead of the attack being many-to-one, it becomes many-to-many with no single point on the network acting as a bottleneck.

    Once diluted, the attack becomes relatively easy to stop at each of our data centers. Because CloudFlare acts as a virtual shield in front of our customers sites, with Layer 3 attacks none of the attack traffic reaches the customer’s servers. Traffic to Spamhaus’s network dropped to below the levels when the attack started as soon as they signed up for our service.

    Other Noise

    While the majority of the traffic involved in the attack was DNS reflection, the attacker threw in a few other attack methods as well. One was a so-called ACK reflection attack. When a TCP connection is established there is a handshake. The server initiating the TCP session first sends a SYN (for synchronize) request to the receiving server. The receiving server responds with an ACK (for acknowledge). After that handshake, data can be exchanged.

    In an ACK reflection, the attacker sends a number of SYN packets to servers with a spoofed source IP address pointing to the intended victim. The servers then respond to the victim’s IP with an ACK. Like the DNS reflection attack, this disguises the source of the attack, making it appear to come from legitimate servers. However, unlike the DNS reflection attack, there is no amplification factor: the bandwidth from the ACKs is symmetrical to the bandwidth the attacker has to generate the SYNs. CloudFlare is configured to drop unmatched ACKs, which mitigates these types of attacks.

    Whenever we see one of these large attacks, network operators will write to us upset that we are attacking their infrastructure with abusive DNS queries or SYN floods. In fact, it is their infrastructure that is being used to reflect an attack at us. By working with and educating network operators, they clean up their network which helps to solve the root cause of these large attacks.

    History Repeats Itself

    Finally, it’s worth noting how similar this battle against DDoS attacks and open DNS relays is with Spamhaus’s original fight. If DDoS is the network scourge of tomorrow, spam was its clear predecessor. Paul Vixie, the father of the DNSBL, set out in 1997 to use DNS to help shut down the spam source of the day: open email relays. These relays were being used to disguise the origin of spam messages, making them more difficult to block. What was needed was a list of mail relays that mail serves could query against and decide whether to accept messages.

    History_repeats_itself

    While it wasn’t originally designed with the idea in mind, DNS proved a highly scalable and efficient means to distribute a queryable list of open mail relays that email service providers could use to block unwanted messages. Spamhaus arose as one of the most respected and widely used DNSBLs, effectively blocking a huge percentage of daily spam volume.

    As open mail relays were shut, spammers turned to virus writers to create botnets that could be used to relay spam. Spamhaus expanded their operations to list the IPs of known botnets, trying to stay ahead of spammers. CloudFlare’s own history grew out of Project Honey Pot, which started as an automated service to track the resources used by spammers and publishes the HTTP:BL.

    Today, as Spamhaus’s success has eroded the business model of spammers, botnet operators are increasingly renting their networks to launch DDoS attacks. At the same time, DNSBLs proved that there were many functions that the DNS protocol could be used for, encouraging many people to tinker with installing their own DNS resolvers. Unfortunately, these DNS resolvers are often mis-configured and left open to abuse, making them the DDoS equivalent of the open mail relay.

    If you’re running a network, take a second to make sure you’ve closed any open resolvers before DDoS explodes into an even worse problem than it already is.

    Revealed – Iran Cyber Offense Posters

    Iran Cyber Offense Posters

     


    A sends:

    Oghab on IRAN Cyber Offense

    The following posters belong to IRGC, the Iranian offensive military wing. None are officially confidential but only certain people gets their hand to such information and only a very limited part of them get to actually go to these “meetings”. Both are related to development of asymmetric aeronautical weaponry specially using UAS-based approaches and development of “unconventional” SIGINT and ELINT infrastructure to direct attacks specifically on long-term targets. They differ from the usual military and intelligence systems that try to cover everything and usually turn up useless in asymmetric wars thus it is not a conventional Air Force subject and being considered mainly as CO/IRAF, an attack blade made of Cyber and Aerial Vectors. I don’t want to share my reasons for this semi-leak but I do have a clear message for people who are behind such efforts, specially one particular elite team who “run and execute” Iran’s CO (Cyber Offense) and their mastermind. Here is the message: You are not anonymous either, wanna keep going?

     


    Poster 1

    [Image]

    “Drones in Asymmetric warfare”
    Host: NAHAB research center, Imam Hussain University ( IRGC )
    Subjects: ELINT, Stealth technologies in UAS, Fast-acting Drones, UAS without GPS, Warfare capabilities in UAS, Enemy UAS detection, interception, landing, disruption.
    Meeting Format: Seminar plus talks
    Sponsors: IRGC, Aerial Industries, ROSHD, Air Force
    email: ech[at]ihu.ac.ir
    phones: 738 293 49 (land line), 0919 0084 069 (Cell), if you want to make calls add Iran and Tehran’s phone extension accordingly

    Note 1. Imam Hussain University is a Military university located in IRGC-owned area north-east Tehran and it also is a Military Base

     


    Poster 2

    [Image]

    “The Need to Develop {modern} Aerial weaponry for future Wars”
    Host: Technical Faculty, Imam Sadeq Base, Imam Hussain University (IRGC)
    Subjects: Modern Aerial Weapons, infrastructures required to build, Studies of offensive and defensive Doctrines, Planes with Payloads, Fast reacting Tactics
    Meeting Format: Military Conference
    Sponsors: IRGC, Air Force, AeroSpace Organization, Community of Research and Development of Air defense, the institute of Advanced defense tactics, Defense industries Organization, the Self-sufficiency Organization of IRGC Navy, Army
    email: acw91[at]ihu.ac.ir
    phone: 771 049 27 ( land line )

    Note 2. Among said participants, only the “Defense industries Organization” is listed by many international players as a banned and restricted target for business or communication

    Cryptome reveals – Internet Is a Spy State

    Internet Is a Spy State

     


    At 06:09 AM 3/18/2013, Eugen Leitl wrote on Cypherpunks:

    http://edition.cnn.com/2013/03/16/opinion/schneier-internet-surveillance/index.html

    The Internet is a surveillance state

    By Bruce Schneier, Special to CNN

    March 16, 2013 — Updated 1804 GMT (0204 HKT)

    STORY HIGHLIGHTS

    Bruce Schneier: Whether we like it or not, we’re being tracked all the time on the Internet

    Schneier: Our surveillance state is efficient beyond the wildest dreams of George Orwell

    He says governments and corporations are working together to keep things that way

    Schneier: Slap-on-the-wrist fines notwithstanding, no one is agitating for better privacy laws

    Editor’s note: Bruce Schneier is a security technologist and author of “Liars and Outliers: Enabling the Trust Society Needs to Survive.”

    __________

    Cryptome:

    That the Internet is a gigantic spying machine has been known since its invention, the security industry has made billions pretending to protect against its spying.

    Schneier has also written recently that security does not work, cannot work, that attackers are always going to excell over defenders, due to the economic incentives to attack being greater than those to defend.

    Long a top expert selling security services, what is Schneier up to with gloom and doom that is usually associated with selling snake oil — his favorite target. Has his amply promoted 24×7 services been defeated by attackers? Is he keeping that quiet? Is he about to be doxed, has been hit with a blackmail demand, or worse, his defenses compromised? Who else among the experts are colluding with this initiative to admit Internet deception from the git go?

    Recall that beloved Peter Neumann and others advocate chucking the current Internet and starting over with better security and privacy basic requirements. Uh huh, and what will take its place, will it be better or more snake oil? And what to do with all that stored data of the world’s greatest spying machine promoted with the complicity of Internet advocates and the security industry?

    Pardon, monsieur, foxes in the hen house, comes to mind.

    Schneier says in his security-is-doomed-to-fail piece a public discussion is needed on what to do, the experts don’t have answers. That’s a good start after years of experts promising to do better next time, meanwhile trust open source, trust us.

    Where does snake oil end and “something better” begin? Is something better ever not snake oil? Is a public discussion of an issue never not rigged in favor of the organizers? Is tumultous public discussion never not preamble to a coup justified as needed to control the mob who has gotten out of hand, who voted the wrong way, who attacked the leaders? Who hacked the experts?

    Coups are always justified as needed for security, and who Machiavelli’s the coup masters other than security and propaganda experts yearning to maintain privilege and reputation.

    Coups are not always obvious, the most effective are hardly noticed.

     


    MDR – Ex-Stasi-Leute – Kontakte zur kriminellen Szene – Amträger korrumpiert…

    Landtags-Untersuchungsausschuss in SachsenHatten Ex-Stasi-Leute Kontakte zur kriminellen Szene?

    Der Landesverfassungsschutz Sachsen hatte offenbar Hinweise auf Verbindungen früherer Mitarbeiter der DDR-Staatssicherheit zur Organisierten Kriminalität. Das erklärte die frühere Referatsleiterin Simone Skroch (früher Henneck) am Freitag im Landtags-Untersuchungsausschuss zu kriminellen und korruptiven Netzwerken in Sachsen. Die Informationen stammten von mehreren und voneinander unabhängigen Quellen.

    Halfen Ex-Stasi-Leute bei der “Verführung” von Amtspersonen?

    Die einstige Referatsleiterin im Landesamt für Verfassungsschutz, Simone Henneck, sagt am 09.01.2013 in Dresden (Sachsen) vor dem Untersuchungsausschuss des Sächsischen Landtages aus.

    Die frühere Leiterin der Geheimdienstabteilung für Organisierte Kriminalität gab am Freitag neue Details preis.

    Wie die Hauptzeugin des Ausschusses erläuterte, gab es diesen Hinweisen zufolge zahlreiche Kontakte zwischen teils hochrangigen Ex-Stasi-Mitarbeitern und Vertretern der regionalen und internationalen Organisierten Kriminalität in den Bereichen Wirtschaft und öffentliche Verwaltung sowie im Rotlichtmilieu. Ihr Ziel: Angestellte, Beamte, Politiker und andere Vertreter des öffentlichen Lebens zielgerichtet in verfängliche Situationen zu bringen, mit denen man sie später hätte erpressen können. Dazu zählten Skroch zufolge auch Bestechung und Korruption. Die Juristin bezog sich dabei auf das Wirken der Organisierten Kriminalität im Raum Chemnitz, Zwickau und Vogtland.

    Vom “Sachsensumpf” zur “Aktenaffäre”

    Die Hinweise zu möglichen kriminellen Netzwerken in Sachsen waren 2007 erstmals aufgetaucht. Grundlage war eine Datensammlung des sächsischen Geheimdienstes. Die Vorwürfe reichten von Amtsmissbrauch über Kinderprostitution bis zur Bandenkriminalität. Darin sollten auch Juristen und Polizisten verstrickt sein. Ermittlungen externer Prüfer und der Staatsanwaltschaft Dresden entkräfteten jedoch die Vorwürfe, die Ermittlungen gegen die Beschuldigten wurden eingestellt. Stattdessen wurde Skroch vorgeworfen, Akten aufgebauscht zu haben. Sie bestreitet das vehement und erhob bei ihrer Befragung am Freitag erneut schwere Vorwürfe gegen die frühere Chefetage des Verfassungsschutzamts.

    Bereits im Januar hatte Skroch vor dem Ausschuss erklärt, dass zahlreiche Dokumente über die Begegnung von Informanten mit Geheimdienstlern verschwunden seien. Jetzt äußerte sie die Vermutung, dass ihr Panzerschrank während einer Urlaubsreise im Juni 2007 geöffnet wurde. Zudem warf sie ihren damaligen Vorgesetzten vor, sie nicht rechtzeitig über ein gegen sie laufendes Disziplinarverfahren informiert zu haben.

    Der aktuelle Untersuchungs-Ausschuss wurde 2010 auf Antrag der Opposition eingesetzt, weil nach ihrer Ansicht im Abschlussbericht des vorherigen Gremiums zu viel Fragen offen gebelieben waren.

    http://www.mdr.de/sachsen/sachsensumpf116.html

    TOP-SECRET – Report of the Ministry of Defense about Nuclear Weapons and their misconduct through Cyberterrorists

    dsbcover

     

    TOP-SECRET – Report of the Ministry of Defense about Nuclear Weapons and their misconduct through Cyberterrorists

    CTO Vision writes:

    Bottom Line Up Front: After reviewing all available evidence and rigorously weighing threat information, a Task Force of the Defense Science Board (DSB) concludes that:

    The United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent. 

    How does that make you feel? You know yourself what adversaries are doing when it comes to intellectual property theft. Now read on for more about what the DSB sees as the threat to military systems.

    Here are more details: 

    The Defense Science Board (DSB) provides advice, assessments and reports as chartered by DoD leadership. It has studied cyber security and related topics for years and has been instrumental in providing new ideas and perspectives for action by DoD leadership.

    The DSB was recently chartered to look at an interesting and somewhat intellectually stimulating topic, that of how US military systems could withstand cyber attack and remain able to execute their mission.  The chartered group, a task force on Resilient Military Systems, produced a report with a set of recommendations designed to improve DoD’s ability to accomplish its missions. The overarching strategy recommended by the DSB is one that enhanced the department’s defenses in the face of attacks, decreases the effectiveness of adversaries, increases the cost to adversaries, and deters the most significant adversaries by ensuring the US maintains the ability to deliver desired mission capabilities in the face of catastrophic cyber attack.

    The task force also identified a framework to implement metrics collection systems and then develop appropriate performance metrics that can be used to shape DoD’s investment decisions. The report approved by DSB chairman Paul Kaminsky is at http://www.acq.osd.mil/dsb/reports2010s.htm. It is also available at: Resilient Military Systems and the Advanced Cyber Threat.

    Here is more from the forwarding letter to the report:

    The final report of the DSB Task Force on Resilient Military Systems is attached. This report is based on the perspective of 24 Task Force members who received more than 50 briefings from practitioners and senior officials throughout the Department of Defense (DoD), Intelligence Community (IC), commercial sector, academia, national laboratories, and policymakers. This Task Force was asked to review and make recommendations to improve the resilience of DoD systems to cyber attacks, and to develop a set of metrics that the Department could use to track progress and shape investment priorities.

    After conducting an 18-month study, this Task Force concluded that the cyber threat is serious and that the United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilizing cyber capabilities in combination with all of their military and intelligence capabilities (a “full spectrum” adversary). While this is also true for others (e.g. Allies, rivals, and public/private networks), this Task Force strongly believes the DoD needs to take the lead and build an effective response to measurably increase confidence in the IT systems we depend on (public and private) and at the same time decrease a would-be attacker’s confidence in the effectiveness of their capabilities to compromise DoD systems. This conclusion was developed upon several factors, including the success adversaries have had penetrating our networks; the relative ease that our Red Teams have in disrupting, or completely beating, our forces in exercises using exploits available on the Internet; and the weak cyber hygiene position of DoD networks and systems. The Task Force believes that the recommendations of this report create the basis for a strategy to address this broad and pervasive threat.

    Nearly every conceivable component within DoD is networked. These networked systems and components are inextricably linked to the Department’s ability to project military force and the associated mission assurance. Yet, DoD’s networks are built on inherently insecure architectures that are composed of, and increasingly using, foreign parts. While DoD takes great care to secure the use and operation of the “hardware” of its weapon systems, the same level of resource and attention is not spent on the complex network of information technology (IT) systems that are used to support and operate those weapons or critical IT capabilities embedded within them.

    DoD’s dependence on this vulnerable technology is a magnet to U.S. opponents. In fact, DoD and its contractor base have already sustained staggering losses of system design information incorporating decades of combat knowledge and experience that provide adversaries insight to technical designs and system use. Despite numerous DoD actions, efforts are fragmented, and the Department is not currently prepared to mitigate the threat.

    That forwarding letter was signed by the task force co-chairs, Mr. Lewis Von Thaer and Mr. James R. Gosler, two of the most professional, well thought out leaders I have ever worked with.

    Please dive deep into the full document now. You will find some information you already know, but I promise some surprises as well.

     

     

     

    DOWNLOAD THE ORIGINAL REPORT AT THE LINK BELOW

    Click to access ResilientMilitarySystems.CyberThreat.pdf

    Cryptome – NIST RFI Critical Infrastructure Cybersecurity

    NIST Framework to Improve Critical Infrastructure Cybersecurity

     


    [Federal Register Volume 78, Number 38 (Tuesday, February 26, 2013)]
    [Notices]
    [Pages 13024-13028]
    From the Federal Register Online via the Government Printing Office [www.gpo.gov]
    [FR Doc No: 2013-04413]
    
    -----------------------------------------------------------------------
    
    DEPARTMENT OF COMMERCE
    
    National Institute of Standards and Technology
    
    [Docket Number 130208119-3119-01]
    
    Developing a Framework To Improve Critical Infrastructure 
    Cybersecurity
    
    AGENCY: National Institute of Standards and Technology, U.S. Department 
    of Commerce.
    
    ACTION: Notice; Request for Information (RFI).
    
    -----------------------------------------------------------------------
    
    SUMMARY: The National Institute of Standards and Technology (NIST) is 
    conducting a comprehensive review to develop a framework to reduce 
    cyber risks to critical infrastructure \1\ (the ``Cybersecurity 
    Framework'' or ``Framework''). The Framework will consist of standards, 
    methodologies, procedures, and processes that align policy, business, 
    and technological approaches to address cyber risks.
    ---------------------------------------------------------------------------
    
        \1\ For the purposes of this RFI the term ``critical 
    infrastructure'' has the meaning given the term in 42 U.S.C. 
    5195c(e), ``systems and assets, whether physical or virtual, so 
    vital to the United States that the incapacity or destruction of 
    such systems and assets would have a debilitating impact on 
    security, national economic security, national public health or 
    safety, or any combination of those matters.''
    ---------------------------------------------------------------------------
    
        This RFI requests information to help identify, refine, and guide 
    the many interrelated considerations, challenges, and efforts needed to 
    develop the Framework. In developing the Cybersecurity Framework, NIST 
    will consult with the Secretary of Homeland Security, the National 
    Security Agency, Sector-Specific Agencies and other interested agencies 
    including the Office of Management and Budget, owners and operators of 
    critical infrastructure, and other stakeholders including other 
    relevant agencies, independent regulatory agencies, State, local, 
    territorial and tribal governments. The Framework will be developed 
    through an open public review and comment process that will include 
    workshops and other opportunities to provide input.
    
    DATES: Comments must be received by 5:00 p.m. Eastern time on Monday, 
    April 8, 2013.
    
    ADDRESSES: Written comments may be submitted by mail to Diane 
    Honeycutt, National Institute of Standards and Technology, 100 Bureau 
    Drive, Stop 8930, Gaithersburg, MD 20899. Submissions may be in any of 
    the following formats: HTML, ASCII, Word, RTF, or PDF. Online 
    submissions in electronic form may be sent to cyberframework@nist.gov. 
    Please submit comments only and include your name, company name (if 
    any), and cite
    
    [[Page 13025]]
    
    ``Developing a Framework to Improve Critical Infrastructure 
    Cybersecurity'' in all correspondence. All comments received by the 
    deadline will be posted at http://csrc.nist.gov without change or 
    redaction, so commenters should not include information they do not 
    wish to be posted (e.g., personal or confidential business 
    information).
    
    FOR FURTHER INFORMATION CONTACT: For questions about this RFI contact: 
    Adam Sedgewick, U.S. Department of Commerce, 1401 Constitution Avenue 
    NW., Washington, DC 20230, telephone (202) 482-0788, email 
    Adam.Sedgewick@nist.gov. Please direct media inquiries to NIST's Office 
    of Public Affairs at (301) 975-NIST.
    
    SUPPLEMENTARY INFORMATION: The national and economic security of the 
    United States depends on the reliable functioning of critical 
    infrastructure, which has become increasingly dependent on information 
    technology. Recent trends demonstrate the need for improved 
    capabilities for defending against malicious cyber activity. Such 
    activity is increasing and its consequences can range from theft 
    through disruption to destruction. Steps must be taken to enhance 
    existing efforts to increase the protection and resilience of this 
    infrastructure, while maintaining a cyber environment that encourages 
    efficiency, innovation, and economic prosperity, while protecting 
    privacy and civil liberties.
        Under Executive Order 13636 \2\ (``Executive Order''), the 
    Secretary of Commerce is tasked to direct the Director of NIST to 
    develop a framework for reducing cyber risks to critical infrastructure 
    (the ``Cybersecurity Framework'' or ``Framework''). The Framework will 
    consist of standards, methodologies, procedures and processes that 
    align policy, business, and technological approaches to address cyber 
    risks. The Department of Homeland Security, in coordination with 
    sector-specific agencies, will then establish a voluntary program to 
    support the adoption of the Cybersecurity Framework by owners and 
    operators of critical infrastructure and any other interested entities.
    ---------------------------------------------------------------------------
    
        \2\ ``Executive Order 13636--Improving Critical Infrastructure 
    Cybersecurity'' 78 FR 11739 (February 19, 2013).
    ---------------------------------------------------------------------------
    
        Given the diversity of sectors in critical infrastructure, the 
    Framework development process is designed to initially identify cross-
    sector security standards and guidelines that are immediately 
    applicable or likely to be applicable to critical infrastructure, to 
    increase visibility and adoption of those standards and guidelines, and 
    to find potential gaps (i.e., where standards/guidelines are 
    nonexistent or where existing standards/guidelines are inadequate) that 
    need to be addressed through collaboration with industry and industry-
    led standards bodies. The Framework will incorporate voluntary 
    consensus standards and industry best practices to the fullest extent 
    possible and will be consistent with voluntary international consensus-
    based standards when such international standards will advance the 
    objectives of the Executive Order. The Framework would be designed to 
    be compatible with existing regulatory authorities and regulations.
        The Cybersecurity Framework will provide a prioritized, flexible, 
    repeatable, performance-based, and cost-effective approach, including 
    information security measures and controls to help owners and operators 
    of critical infrastructure and other interested entities to identify, 
    assess, and manage cybersecurity-related risk while protecting business 
    confidentiality, individual privacy and civil liberties. To enable 
    technical innovation and account for organizational differences, the 
    Cybersecurity Framework will not prescribe particular technological 
    solutions or specifications. It will include guidance for measuring the 
    performance of an entity in implementing the Cybersecurity Framework 
    and will include methodologies to identify and mitigate impacts of the 
    Framework and associated information security measures and controls on 
    business confidentiality and to protect individual privacy and civil 
    liberties.
        As a non-regulatory Federal agency, NIST will develop the Framework 
    in a manner that is consistent with its mission to promote U.S. 
    innovation and industrial competitiveness through the development of 
    standards and guidelines in consultation with stakeholders in both 
    government and industry. While the focus will be on the Nation's 
    critical infrastructure, the Framework will be developed in a manner to 
    promote wide adoption of practices to increase cybersecurity across all 
    sectors and industry types. In its first year, the emphasis will be on 
    finding commonality within and across the affected sectors. It will 
    seek to provide owners and operators the ability to implement security 
    practices in the most effective manner while allowing organizations to 
    express requirements to multiple authorities and regulators. Issues 
    relating to harmonization of existing relevant standards and 
    integration with existing frameworks will also be considered in this 
    initial stage.
        In accordance with the Executive Order, the Secretary of Commerce 
    has directed the Director of the National Institute of Standards and 
    Technology (the Director) to coordinate the development of a Framework 
    to reduce the cyber risks to critical infrastructure. The Cybersecurity 
    Framework will incorporate existing consensus-based standards to the 
    fullest extent possible, consistent with requirements of the National 
    Technology Transfer and Advancement Act of 1995,\3\ and guidance 
    provided by Office of Management and Budget Circular A-119, ``Federal 
    Participation in the Development and Use of Voluntary Consensus 
    Standards and in Conformity Assessment Activities.'' \4\ Principles 
    articulated in the Executive Office of the President memorandum M-12-08 
    ``Principles for Federal Engagement in Standards Activities to Address 
    National Priorities'' \5\ will be followed. The Framework should also 
    be consistent with, and support the broad policy goals of, the 
    Administration's 2010 ``National Security Strategy,'' 2011 ``Cyberspace 
    Policy Review,'' ``International Strategy for Cyberspace'' of May 2010 
    and HSPD-7 ``Critical Infrastructure Identification, Prioritization, 
    and Protection.''
    ---------------------------------------------------------------------------
    
        \3\ Public Law 104-113 (1996), codified in relevant part at 15 
    U.S.C. 272(b).
        \4\ http://standards.gov/a119.cfm.
        \5\ http://www.whitehouse.gov/sites/default/files/omb/memoranda/2012/m-12-08_1.pdf.
    ---------------------------------------------------------------------------
    
        The goals of the Framework development process will be: (i) To 
    identify existing cybersecurity standards, guidelines, frameworks, and 
    best practices that are applicable to increase the security of critical 
    infrastructure sectors and other interested entities; (ii) to specify 
    high-priority gaps for which new or revised standards are needed; and 
    (iii) to collaboratively develop action plans by which these gaps can 
    be addressed. It is contemplated that the development process will have 
    requisite stages to allow for continuing engagement with the owners and 
    operators of critical infrastructure, and other industry, academic, and 
    government stakeholders.
        In December 2011, the United States Government Accountability 
    Office (GAO) issued a report titled ``CRITICAL INFRASTRUCTURE 
    PROTECTION: Cybersecurity Guidance Is Available, but More Can Be Done 
    to Promote Its Use.'' \6\ In its report, GAO found similarities in 
    cybersecurity guidance across sectors, and recommended
    
    [[Page 13026]]
    
    promoting existing guidance to assist individual entities within a 
    sector in ``identifying the guidance that is most applicable and 
    effective in improving their security posture.'' \7\
    ---------------------------------------------------------------------------
    
        \6\ http://www.gao.gov/assets/590/587529.pdf.
        \7\ Id., at page 46.
    ---------------------------------------------------------------------------
    
        NIST believes the diversity of business and mission needs 
    notwithstanding, there are core cybersecurity practices that can be 
    identified and that will be applicable to a diversity of sectors and a 
    spectrum of quickly evolving threats. Identifying such core practices 
    will be a focus of the Framework development process.
        In order to be effective in protecting the information and 
    information systems that are a part of the U.S. critical 
    infrastructure, NIST believes the Framework should have a number of 
    general properties or characteristics. The Framework should include 
    flexible, extensible, scalable, and technology-independent standards, 
    guidelines, and best practices, that provide:
         A consultative process to assess the cybersecurity-related 
    risks to organizational missions and business functions;
         A menu of management, operational, and technical security 
    controls, including policies and processes, available to address a 
    range of threats and protect privacy and civil liberties;
         A consultative process to identify the security controls 
    that would adequately address risks \8\ that have been assessed and to 
    protect data and information being processed, stored, and transmitted 
    by organizational information systems;
    ---------------------------------------------------------------------------
    
        \8\ Organizational risk responses can include, for example, risk 
    acceptance, risk rejection, risk mitigation, risk sharing, or risk 
    transfer.
    ---------------------------------------------------------------------------
    
         Metrics, methods, and procedures that can be used to 
    assess and monitor, on an ongoing or continuous basis, the 
    effectiveness of security controls that are selected and deployed in 
    organizational information systems and environments in which those 
    systems operate and available processes that can be used to facilitate 
    continuous improvement in such controls; \9\
    ---------------------------------------------------------------------------
    
        \9\ Assessments determine whether the security controls selected 
    by an organization are implemented correctly, operating as intended, 
    and producing the desired results in order to enforce organizational 
    security policies.
    ---------------------------------------------------------------------------
    
         A comprehensive risk management approach that provides the 
    ability to assess, respond to, and monitor information security-related 
    risks and provide senior leaders/executives with the kinds of necessary 
    information sets that help them to make ongoing risk-based decisions;
         A menu of privacy controls necessary to protect privacy 
    and civil liberties.
        Within eight months, the Executive Order requires NIST to publish 
    for additional comment a draft Framework that clearly outlines areas of 
    focus and provides preliminary lists of standards, guidelines and best 
    practices that fall within that outline. The draft will also include 
    initial conclusions for additional public comment. The draft Framework 
    will build on NIST's ongoing work with cybersecurity standards and 
    guidelines for the Smart Grid, Identity Management, Federal Information 
    Security Management Act (FISMA) implementation, the Electricity 
    Subsector Cybersecurity Capability Maturity Model, and related 
    projects.
        NIST intends to engage with critical infrastructure stakeholders, 
    through a voluntary consensus-based process, to develop the standards, 
    guidelines and best practices that will comprise the Framework. This 
    will include interactive workshops with industry and academia, along 
    with other forms of outreach. NIST believes that the Framework cannot 
    be static, but must be a living document that allows for ongoing 
    consultation in order to address constantly evolving risks to critical 
    infrastructure cybersecurity. A voluntary consensus standards-based 
    approach will facilitate the ability of critical infrastructure owners 
    and operators to manage such risks, and to implement alternate 
    solutions from the bottom up with interoperability, scalability, and 
    reliability as key attributes.
        A standards-based Framework will also help provide some of the 
    measures necessary to understand the effectiveness of critical 
    infrastructure protection, and track changes over time. DHS and Sector 
    Specific Agencies will provide input in this area based on their 
    engagement with sector stakeholders. This standards-based approach is 
    necessary in order to be able to provide and analyze data from 
    different sources that can directly support risk-based decision-making. 
    A Framework without sufficient standards and associated conformity 
    assessment programs could impede future innovation in security efforts 
    for critical infrastructure by potentially creating a false sense of 
    security.
        The use of widely-accepted standards is also necessary to enable 
    economies of scale and scope to help create competitive markets in 
    which competition is driven by market need and products that meet that 
    market need through combinations of price, quality, performance, and 
    value to consumers. Market competition then promotes faster diffusion 
    of these technologies and realization of many benefits throughout these 
    sectors.
        It is anticipated that the Framework will: (i) Include 
    consideration of sustainable approaches for assessing conformity to 
    identified standards and guidelines; (ii) assist in the selection and 
    development of an optimal conformity assessment approach; and (iii) 
    facilitate the implementation of selected approach(es) that could cover 
    technology varying in scope from individual devices or components to 
    large-scale organizational operations. The decisions on the type, 
    independence and technical rigor of these conformity assessment 
    approaches should be risk-based. The need for confidence in conformity 
    must be balanced with cost to the public and private sectors, including 
    their international operations and legal obligations. Successful 
    conformity assessment programs provide the needed level of confidence, 
    are efficient and have a sustainable and scalable business case.
        This RFI is looking for current adoption rates and related 
    information for particular standards, guidelines, best practices, and 
    frameworks to determine applicability throughout the critical 
    infrastructure sectors. The RFI asks for stakeholders to submit ideas, 
    based on their experience and mission/business needs, to assist in 
    prioritizing the work of the Framework, as well as highlighting 
    relevant performance needs of their respective sectors.
        For the purposes of this notice and the Framework, the term 
    ``standards'' and the phrase ``standards setting'' are used in a 
    generic manner to include both standards development and conformity 
    assessment development. In addition to critical infrastructure owners 
    and operators, NIST invites Federal agencies, state, local, territorial 
    and tribal governments, standard-setting organizations,\10\ other 
    members of industry, consumers, solution providers, and other 
    stakeholders to respond.
    ---------------------------------------------------------------------------
    
        \10\ As used herein, ``standard-setting organizations'' refers 
    to the wide cross section of organizations that are involved in the 
    development of standards and specifications, both domestically and 
    abroad.
    ---------------------------------------------------------------------------
    
    Request for Comment
    
        The following questions cover the major areas about which NIST 
    seeks comment. The questions are not intended to limit the topics that 
    may be addressed. Responses may include any topic believed to have 
    implications for the development of the Framework
    
    [[Page 13027]]
    
    regardless of whether the topic is included in this document.
        While the Framework will be focused on critical infrastructure, 
    given the broad diversity of sectors that may include parts of critical 
    infrastructure, the evolving nature of the classification of critical 
    infrastructure based on risk, and the intention to involve a broad set 
    of stakeholders in development of the Framework, the RFI will generally 
    use the broader term ``organizations'' when seeking information.
        Comments containing references, studies, research, and other 
    empirical data that are not widely published should include copies of 
    the referenced materials. Do not include in comments or otherwise 
    submit proprietary or confidential information, as all comments 
    received by the deadline will be made available publically at http://csrc.nist.gov/.
    
    Current Risk Management Practices
    
        NIST solicits information about how organizations assess risk; how 
    cybersecurity factors into that risk assessment; the current usage of 
    existing cybersecurity frameworks, standards, and guidelines; and other 
    management practices related to cybersecurity. In addition, NIST is 
    interested in understanding whether particular frameworks, standards, 
    guidelines, and/or best practices are mandated by legal or regulatory 
    requirements and the challenges organizations perceive in meeting such 
    requirements. This will assist in NIST's goal of developing a Framework 
    that includes and identifies common practices across sectors.
        1. What do organizations see as the greatest challenges in 
    improving cybersecurity practices across critical infrastructure?
        2. What do organizations see as the greatest challenges in 
    developing a cross-sector standards-based Framework for critical 
    infrastructure?
        3. Describe your organization's policies and procedures governing 
    risk generally and cybersecurity risk specifically. How does senior 
    management communicate and oversee these policies and procedures?
        4. Where do organizations locate their cybersecurity risk 
    management program/office?
        5. How do organizations define and assess risk generally and 
    cybersecurity risk specifically?
        6. To what extent is cybersecurity risk incorporated into 
    organizations' overarching enterprise risk management?
        7. What standards, guidelines, best practices, and tools are 
    organizations using to understand, measure, and manage risk at the 
    management, operational, and technical levels?
        8. What are the current regulatory and regulatory reporting 
    requirements in the United States (e.g. local, state, national, and 
    other) for organizations relating to cybersecurity?
        9. What organizational critical assets are interdependent upon 
    other critical physical and information infrastructures, including 
    telecommunications, energy, financial services, water, and 
    transportation sectors?
        10. What performance goals do organizations adopt to ensure their 
    ability to provide essential services while managing cybersecurity 
    risk?
        11. If your organization is required to report to more than one 
    regulatory body, what information does your organization report and 
    what has been your organization's reporting experience?
        12. What role(s) do or should national/international standards and 
    organizations that develop national/international standards play in 
    critical infrastructure cybersecurity conformity assessment?
    
    Use of Frameworks, Standards, Guidelines, and Best Practices
    
        As set forth in the Executive Order, the Framework will consist of 
    standards, guidelines, and/or best practices that promote the 
    protection of information and information systems supporting 
    organizational missions and business functions.
        NIST seeks comments on the applicability of existing publications 
    to address cybersecurity needs, including, but not limited to the 
    documents developed by: international standards organizations; U.S. 
    Government Agencies and organizations; State regulators or Public 
    Utility Commissions; Industry and industry associations; other 
    Governments, and non-profits and other non-government organizations.
        NIST is seeking information on the current usage of these existing 
    approaches throughout industry, the robustness and applicability of 
    these frameworks and standards, and what would encourage their 
    increased usage. Please provide information related to the following:
        1. What additional approaches already exist?
        2. Which of these approaches apply across sectors?
        3. Which organizations use these approaches?
        4. What, if any, are the limitations of using such approaches?
        5. What, if any, modifications could make these approaches more 
    useful?
        6. How do these approaches take into account sector-specific needs?
        7. When using an existing framework, should there be a related 
    sector-specific standards development process or voluntary program?
        8. What can the role of sector-specific agencies and related sector 
    coordinating councils be in developing and promoting the use of these 
    approaches?
        9. What other outreach efforts would be helpful?
    
    Specific Industry Practices
    
        In addition to the approaches above, NIST is interested in 
    identifying core practices that are broadly applicable across sectors 
    and throughout industry.
        NIST is interested in information on the adoption of the following 
    practices as they pertain to critical infrastructure components:
         Separation of business from operational systems;
         Use of encryption and key management;
         Identification and authorization of users accessing 
    systems;
         Asset identification and management;
         Monitoring and incident detection tools and capabilities;
         Incident handling policies and procedures;
         Mission/system resiliency practices;
         Security engineering practices;
         Privacy and civil liberties protection.
        1. Are these practices widely used throughout critical 
    infrastructure and industry?
        2. How do these practices relate to existing international 
    standards and practices?
        3. Which of these practices do commenters see as being the most 
    critical for the secure operation of critical infrastructure?
        4. Are some of these practices not applicable for business or 
    mission needs within particular sectors?
        5. Which of these practices pose the most significant 
    implementation challenge?
        6. How are standards or guidelines utilized by organizations in the 
    implementation of these practices?
        7. Do organizations have a methodology in place for the proper 
    allocation of business resources to invest in, create, and maintain IT 
    standards?
        8. Do organizations have a formal escalation process to address 
    cybersecurity risks that suddenly increase in severity?
    
    [[Page 13028]]
    
        9. What risks to privacy and civil liberties do commenters perceive 
    in the application of these practices?
        10. What are the international implications of this Framework on 
    your global business or in policymaking in other countries?
        11. How should any risks to privacy and civil liberties be managed?
        12. In addition to the practices noted above, are there other core 
    practices that should be considered for inclusion in the Framework?
    
        Dated: February 21, 2013.
    Patrick Gallagher,
    Under Secretary of Commerce for Standards and Technology.
    [FR Doc. 2013-04413 Filed 2-25-13; 8:45 am]
    BILLING CODE 3510-13-P

    FBI Director Robert Muller – The Cyber Threat: Planning for the Way Ahead

     

    Director Mueller at RSA
     Director Mueller speaks to cyber security professionals in San Francisco. Read text of his remarks.

    The Cyber Threat
    Planning for the Way Ahead

     

    Denial of service attacks, network intrusions, state-sponsored hackers bent on compromising our national security: The cyber threat is growing, and in response, said FBI Director Robert S. Mueller, the Bureau must continue to strengthen its partnerships with other government agencies and private industry—and take the fight to the criminals.

     

    “Network intrusions pose urgent threats to our national security and to our economy,” Mueller told a group of cyber security professionals in San Francisco today. “If we are to confront these threats successfully,” he explained, “we must adopt a unified approach” that promotes partnerships and intelligence sharing—in the same way we responded to terrorism after the 9/11 attacks.

     

    Padlocks graphic

    Focus on Hackers and Intrusions

    The FBI over the past year has put in place an initiative to uncover and investigate web-based intrusion attacks and develop a cadre of specially trained computer scientists able to extract hackers’ digital signatures from mountains of malicious code. Learn more

    The FBI learned after 9/11 that “our mission was to use our skills and resources to identify terrorist threats and to find ways of disrupting those threats,” Mueller said. “This has been the mindset at the heart of every terrorism investigation since then, and it must be true of every case in the cyber arena as well.”

     

    Partnerships that ensure the seamless flow of intelligence are critical in the fight against cyber crime, he explained. Within government, the National Cyber Investigative Joint Task Force, which comprises 19 separate agencies, serves as a focal point for cyber threat information. But private industry—a major victim of cyber intrusions—must also be “an essential partner,” Mueller said, pointing to several successful initiatives.

     

    The National Cyber Forensics and Training Alliance, for example, is a model for collaboration between private industry and law enforcement. The Pittsburgh-based organization includes more than 80 industry partners—from financial services, telecommunications, retail, and manufacturing, among other fields—who work with federal and international partners to provide real-time threat intelligence.

     

    Another example is the Enduring Security Framework, a group that includes leaders from the private sector and the federal government who analyze current—and potential—threats related to denial of service attacks, malware, and emerging software and hardware vulnerabilities.

     

    Mueller also noted the Bureau’s cyber outreach efforts to private industry. The Domestic Security Alliance Council, for instance, includes chief security officers from more than 200 companies, representing every critical infrastructure and business sector. InfraGard, an alliance between the FBI and industry, has grown from a single chapter in 1996 to 88 chapters today with nearly 55,000 members nationwide. And just last week, the FBI held the first session of the National Cyber Executive Institute, a three-day seminar to train leading industry executives on cyber threat awareness and information sharing.

     

    “As noteworthy as these outreach programs may be, we must do more,” Mueller said. “We must build on these initiatives to expand the channels of information sharing and collaboration.”

     

    He added, “For two decades, corporate cyber security has focused principally on reducing vulnerabilities. These are worthwhile efforts, but they cannot fully eliminate our vulnerabilities. We must identify and deter the persons behind those computer keyboards. And once we identify them—be they state actors, organized criminal groups, or 18-year-old hackers—we must devise a response that is effective, not just against that specific attack, but for all similar illegal activity.”

     

    “We need to abandon the belief that better defenses alone will be sufficient,” Mueller said. “Instead of just building better defenses, we must build better relationships. If we do these things, and if we bring to these tasks the sense of urgency that this threat demands,” he added, “I am confident that we can and will defeat cyber threats, now and in the years to come.”

    Das Betrugsurteil gegen Klaus Maurischat/”GoMoPa” wg Betruges am eigenen Anleger

     

    obs Maurischat Gericht 6.8.2012 Frankfurt 23

    “Klaus Maurischat”; “GoMoPa”,

     

    obs Maurischat Gericht 6.8.2012 Frankfurt 28

     

    “Klaus Maurischat”, “GoMoPa”,

    https://berndpulch.org/das-betrugsurteil-gegen-bennewirtz-und-peter-ehlers-gomopa-partner-maurischat-und-vornkahl-wg-betruges-am-eigen-anleger/

    Am 24. April 2006 war die Verhandlung am Amtsgericht Krefeld in der Betrugssache: Mark Vornkahl / Klaus Maurischat ./. Dehnfeld. Aktenzeichen: 28 Ls 85/05 Klaus MaurischatLange Straße 3827313 Dörverden.

    Wer soll denn diesen Typen noch irgendwie trauen ?

    Und diese Typen berichten über angebliche und tatsächliche Investment Verbrechen ?

    Die Strategie ist es, stattdessen ihre Gegner zu kriminalisieren, wie bereits Meridian Capital bewies und wie es die STASI schon immer tat.

    The Judgement against “President and CEO” Klaus Maurischat or whatever his name is because he committed fraud AGAINST HIS OWN INVESTORS.

    Their strategy is to criminalize their opponents with their network as Meridian Capital showed – a well-known strategy of  East German STASI Agents.

    Who can trust these fraudsters ?

    These guys report about investment crime ?

    What a parody….

    Bernd Pulch

    Magister Artium

    “Mandiant” – Announcing Mandiant Intelligence Center

    Organizations routinely struggle to understand which cyber threats pose the greatest
    risk to them. New threats appear in the news daily and create fire drills for
    security teams who must quickly determine what they can and should do to protect
    themselves. 
    
    Our newest offering, the Mandiant Intelligence Center
    <http://app.connect.mandiant.com/e/er?s=2855&lid=239&elq=99b6edb99b004015923dfbfb964a346f>,
    draws on our own proprietary intelligence to equip security teams like yours with
    the context required to effectively respond to and defend against the most advanced
    threat actors. 
    
    With the Mandiant Intelligence Center your security teams can:
    *Use tools embedded in the Center to query the Mandiant intelligence database and
    receive detailed information on which group is using particular malware, IPs and
    domains
    *Access detailed profiles of advanced threat groups including their latest tactics,
    techniques and procedures
    *Obtain detailed context on high profile threat events with analysis on the
    potential impact to your organization
    *Monitor emerging threat trends
    
    Read more
    <http://www.mandiant.com/assets/Mandiant_Intelligence_Center.pdf?elq=99b6edb99b004015923dfbfb964a346f&elqCampaignId=283>
    about Mandiant for Security Operations or request a call
    <http://app.connect.mandiant.com/e/er?s=2855&lid=235&elq=99b6edb99b004015923dfbfb964a346f>
    to receive a demonstration.
    
    ""            
    
    Mandiant In The Headlines
    
    January 30, 2013
    Hackers in China Attacked The Times for Last 4 Months
    <http://app.connect.mandiant.com/e/er?s=2855&lid=236&elq=99b6edb99b004015923dfbfb964a346f>
    By Nicole Perlroth – The New York Times 
    February 7, 2013
    Mandiant, the Go- To Security Firm for Cyber-Espionage Attacks
    <http://app.connect.mandiant.com/e/er?s=2855&lid=238&elq=99b6edb99b004015923dfbfb964a346f>
    By Brad Stone & Michael Riley – Bloomberg Businessweek 
    February 18, 2013
    Chinese Army Unit Is Seen as Tied to Hacking Against U.S.
    <http://app.connect.mandiant.com/e/er?s=2855&lid=237&elq=99b6edb99b004015923dfbfb964a346f>
    By David E. Sanger, David Barboza & Nicole Perlroth – The New York Times 
    
    Learn More About Mandiant®
    
    Mandiant Website
    <http://www.mandiant.com/?elq=99b6edb99b004015923dfbfb964a346f&elqCampaignId=283>
    www.mandiant.com
    M-Unition™
    <http://app.connect.mandiant.com/e/er?s=2855&lid=9&elq=99b6edb99b004015923dfbfb964a346f>
    Mandiant's official blog
    Mandiant on Twitter
    <http://app.connect.mandiant.com/e/er?s=2855&lid=10&elq=99b6edb99b004015923dfbfb964a346f>
    twitter.com/mandiant
    Be Part of Something More
    <http://www.mandiant.com/company/careers/?elq=99b6edb99b004015923dfbfb964a346f&elqCampaignId=283>
    Join the Mandiant Team

    “Mandiant” – Announcing Mandiant for Security Operations

    Citation: "Organizations spend millions of dollars investing in top-notch security teams and in
    building secure networks to keep would-be attackers out of their IT environments.
    Despite these investments, determined attackers routinely compromise well-secured
    organizations and steal their intellectual property and financial assets.
    
    Our newest product, Mandiant for Security Operations
    <http://app.connect.mandiant.com/e/er?s=2855&lid=234&elq=41deab51a75b472c90707e854f48b9e7>,
    equips security teams to confidently detect, analyze and resolve incidents in a
    fraction of the time it takes using conventional approaches. This appliance-based
    solution connects the dots between what’s happening on their network and what’s
    happening on their endpoints. 
    
    With Mandiant for Security Operations security teams can:
    *Search for advanced attackers and the APT
    *Integrate endpoint security with your network security
    *Accelerate triage of suspected incidents
    *Find out what happened, without forensics
    *Contain endpoints
    
    Read more
    <http://www.mandiant.com/assets/Mandiant_for_Security_Operations.pdf?elq=41deab51a75b472c90707e854f48b9e7&elqCampaignId=282>
    about Mandiant for Security Operations or request a call
    <http://app.connect.mandiant.com/e/er?s=2855&lid=235&elq=41deab51a75b472c90707e854f48b9e7>
    to receive a demonstration.
    
    ""            
    
    Mandiant In The Headlines
    
    January 30, 2013
    Hackers in China Attacked The Times for Last 4 Months
    <http://app.connect.mandiant.com/e/er?s=2855&lid=236&elq=41deab51a75b472c90707e854f48b9e7>
    By Nicole Perlroth – The New York Times 
    February 7, 2013
    Mandiant, the Go- To Security Firm for Cyber-Espionage Attacks
    <http://app.connect.mandiant.com/e/er?s=2855&lid=238&elq=41deab51a75b472c90707e854f48b9e7>
    By Brad Stone & Michael Riley – Bloomberg Businessweek 
    February 18, 2013
    Chinese Army Unit Is Seen as Tied to Hacking Against U.S.
    <http://app.connect.mandiant.com/e/er?s=2855&lid=237&elq=41deab51a75b472c90707e854f48b9e7>
    By David E. Sanger, David Barboza & Nicole Perlroth – The New York Times 
    
    Learn More About Mandiant®
    
    Mandiant Website
    <http://www.mandiant.com/?elq=41deab51a75b472c90707e854f48b9e7&elqCampaignId=282>
    www.mandiant.com
    M-Unition™
    <http://app.connect.mandiant.com/e/er?s=2855&lid=9&elq=41deab51a75b472c90707e854f48b9e7>
    Mandiant's official blog
    Mandiant on Twitter
    <http://app.connect.mandiant.com/e/er?s=2855&lid=10&elq=41deab51a75b472c90707e854f48b9e7>
    twitter.com/mandiant
    Be Part of Something More
    <http://www.mandiant.com/company/careers/?elq=41deab51a75b472c90707e854f48b9e7&elqCampaignId=282>
    Join the Mandiant Team
    
    To unsubscribe or manage your subscriptions, please click here
    <http://app.connect.mandiant.com/e/sl.aspx?s=2855&elq=41deab51a75b472c90707e854f48b9e7>.
    
    Mandiant® | 2318 Mill Road. Suite 500 | Alexandria, VA 22314
    1.800.647.7020
    Privacy Policy
    <http://www.mandiant.com/privacy?elq=41deab51a75b472c90707e854f48b9e7&elqCampaignId=282>"

    Proven – China ‘aiding hacker attacks on west’

    The building in Shanghai that hosts the Chinese military's Unit 61398

    The building in Shanghai that hosts the Chinese military’s Unit 61398, which has been accused of involvement in hacking attacks. Photograph: Peter Parks/AFP/Getty Images

    The Chinese army has launched hundreds of cyber-attacks against western companies and defence groups from a nondescript office building in Shanghai, according to a report that warns hackers have stolen vast amounts of data from their targets.

    Mandiant, a security company that has been investigating attacks against western organisations for over six years, said in a report (PDF)the attacks came from a 12-storey building belonging to the People’s Liberation Army (PLA) general staff’s department, also known as Unit 61398.

    Mandiant said it believed a hacking network named the Comment Crew or the Shanghai Group was based inside the compound, in a rundown residential neighbourhood. Although the report fails directly to place the hackers inside the building, it argues there is no other logical reason why so many attacks have emanated from such a small area.

    “It is time to acknowledge the threat is originating in China, and we wanted to do our part to arm and prepare security professionals to combat that threat effectively,” said the report.

    The discovery will further raise the temperature in the intergovernmental cyberwars, which have heated up in recent years as the US, IsraelIran, China and UK have all used computer subterfuge to undermine rival state or terrorist organisations. One security expert warned that companies in high-profile fields should assume they will be targeted and hacked, and build systems that will fence sensitive data off from each other.

    Rik Ferguson, global vice-president of security research at the data security company Trend Micro, said: “We need to concentrate less on building castles and assuming they will be impervious, and more on building better dungeons so that when people get in they can’t get anything else.” .

    Mandiant says Unit 61398 could house “hundreds or thousands” of people and has military-grade, high-speed fibre-optic connections from China Mobile, the world’s largest telecoms carrier. “The nature of Unit 61398’s work is considered by China to be a state secret; however, we believe it engages in harmful computer network operations,” Mandiant said in the report.

    It said Unit 61398 had been operating since 2006, and was one of the most prolific hacking groups “in terms of quantity of information stolen”. This it estimated at hundreds of terabytes, enough for thousands of 3D designs and blueprints.

    “APT1”, as Mandiant calls it, is only one of 20 groups Mandiant says has carried out scores of hacking attacks against businesses and organisations in the west, including companies that work in strategic industries such as US power and water infrastructure.

    A typical attack would leave software that hid its presence from the user or administrator and silently siphon data to a remote server elsewhere on the internet at the instruction of a separate “command and control” (C&C) computer. By analysing the hidden software, the pattern of connections and links from the C&C server, the team at Mandiant said they were confident of the source of the threat.

    A Chinese foreign ministry spokesman denied the government was behind the attacks, saying: “Hacking attacks are transnational and anonymous. Determining their origins is extremely difficult. We don’t know how the evidence in this so-called report can be tenable. Arbitrary criticism based on rudimentary data is irresponsible, unprofessional and not helpful in resolving the issue.”

    But Ferguson told the Guardian: “This is a pretty compelling report, with evidence collected over a prolonged period of time. It points very strongly to marked Chinese involvement.”

    Mandiant, based in Alexandria, Virginia, in the US, investigated the New York Times break-in, for which it suggested Chinese sources could be to blame.

    President Barack Obama is already beefing up US security, introducing an executive order in his State of the Union speech this month that would let the government work with the private sector to fend off hacking. But it will take until February 2014 to have a final version ready for implementation.

    The revelation comes days after the New York TimesWall Street Journaland Washington Post, as well as the social networks Facebook and Twitter, said they had been subjected to “highly sophisticated” hacks that in some cases focused on correspondents writing about China and its government.

    Separate investigations by the computer company Dell, working with the news company Bloombergtracked down another alleged hacker, Zhang Changhe, who has written a number of papers on PC hacking. Zhang works at the PLA’s “information engineering university” in Zhengzhou, Henan province, north-central China.

    The allegations will raise the temperature in the continuing cyberwar between the west and China, which has been steadily rising since the Pentagon and MI6 uncovered Titan Rain, a scheme that tried to siphon data from the Pentagon and the House of Commons in 2006, and which one security expert said at the time dated back at least to 2004.

    Ferguson suggested that western governments were also carrying out attacks against Chinese targets – “but that’s not a culture which would open up about being hit. I would be surprised and disappointed if most western nations don’t have a cybersecurity force.”

    The Stuxnet virus, which hit Iran’s uranium reprocessing plant in 2010, is believed to have been written jointly by the US and Israel, while Iranian sources are believed to have hacked companies that issue email security certificates so that they can crack secure connections used by Iranian dissidents on Google’s Gmail system. China is also reckoned to have been behind the hacking of Google’s email servers in that country in late 2009, in an operation that files from WikiLeaks suggested was inspired by the Beijing government.

    A timeline of government-sponsored hacking attacks

     

    2004 suspected: Chinese group in Shanghai begins probing US companies and military targets.

     

    2005: Titan Rain” pulls data from the Pentagon’s systems, and a specialist says of a December 2005 attack on the House of Commons computer system that “The degree of sophistication was extremely high. They were very clever programmers.”

     

    2007: Estonia’s government and other internet services are knocked offline by a coordinated attack from more than a million computers around the world – reckoned to have been run from a group acting at the urging of the Russian government. Nobody is ever arrested over the attack.

     

    2008: Russia’s government is suspected of carrying out a cyberattack to knock out government and other websites inside Georgia, with which it is fighting a border skirmish over the territory of Ossetia.

     

    December 2009: Google’s email systems in China are hacked by a group which tries to identify and take over the accounts of Chinese dissidents. Google withdraws its search engine from the Chinese mainland in protest at the actions. Wikileaks cables suggest that the Chinese government was aware of the hacking.

     

    2010: The Flame virus begins silently infecting computers in Iran. Itincorporates cutting-edge cryptography breakthroughs which would require world-class experts to write. That is then used to infect Windows PCs via the Windows Update mechanism which normally creates a cryptographically secure link to Microsoft. Instead, Flame puts software that watches every keystroke and frame on the PC. Analysts say that only a “wealthy” nation state could have written the virus, which breaks new ground in encryption.

     

    The Stuxnet worm is discovered to have been affecting systems inside Iran’s uranium reprocessing establishment, passing from Windows PCs to the industrial systems which control centrifuges that separate out heavier uranium. The worm makes the centrifuges spin out of control, while suggesting on their control panel that they are operating normally – and so break them. Iran denies that the attack has affected its project. The US and Israel are later fingered as being behind the code.

     

    September 2011: a new virus that silently captures data from transactions in Middle Eastern online banking is unleashed. The principal targets use Lebanese banks. It is not identified until August 2012, when Russian security company Kaspersky discovers the name “Gauss” embedded inside it. The company says the malware it is “nation state-sponsored” – probably by a western state seeking to trace transactions by specific targets.

     

    2012: About 30,000 Windows PCs at Saudi Aramco, the world’s most valuable company, are rendered unusable after a virus called “Shamoon” wipes and corrupts data and the part of the hard drive needed to “bootstrap” the machine when it is turned on. In the US, Secretary of Defense Leon Panetta described Shamoon as “one of the most destructive viruses ever” and suggested it could be used to launch an attack as destructive as the 9/11 attacks of 2001.

    Unveiled – Mandiant Report on Chinese Hackers

    Chinese Hackers Screen-Shot-2013-02-19-at-2.17.49-AM

    When Mandiant, the company that investigated the recent cyber attacks on the New York Times, released its report yesterday, APT1: Exposing One of China’s Cyber Espionage Units, the media grabbed it. They zinged off one news story after another about how this company had exposed the cybercriminals that the Chinese government claimed to know nothing about.

    News? No. It was simply another layer of evidence that cyber activists/hackers/criminals/agents/whatever have been stealthily conducting cyber reconnaissance missions, infecting computers with malware, exfiltrating data, and in general, being bad guys. In 2011, Dmitri Alperovitch, then vice president of Threat Research for McAfee, authored a report about Shady RAT (Remote Access Tool), the malware that had been used by Chinese cybercriminals to exfiltrate data from a broad cross-section of organizations over a 2-5 year period — undetected. Alperovitch broke new ground when he included a table of more than 70 companies, organizations, and government agencies from around the globe that had been compromised. It included the U.N., the International Olympic Committee, and numerous U.S. entities. Now, that was news.

    Mandiant’s report gave the world more of the same about Chinese cyber bad guys. In fact, it was the same Chinese bad guys. Mandiant acknowledges that the group behind the attacks in their investigation is the same group that Alperovitch identified in Shady RAT.

    What is news in the Mandiant report is how they conducted their forensic investigation. Mandiant actually tracked the attackers’ communications back to a compromised “hop point” (middle man computer), obtained the cooperation of the compromised middle organization, and captured the keystrokes of the criminals as they were conducting their “work.”

    Mandiant and its client companies turned the tactics of the criminals against them and carefully compiled evidence over several years. They observed this particular group of cyber hackers attack more than 141 companies in 20 industries since 2006. Mandiant courageously published its findings, including a video of screenshots captured as the criminals engaged in their acts, and acknowledged that they “expect reprisals from China.”

    A lot of credit goes to the unsung heroes: the companies that made Mandiant’s work possible:
    the victim organizations that were determined to track the criminals and funded substantial forensic investigations, and
    the “middle-man” organizations that accepted Mandiant’s help when notified of their role and cooperated to advance the investigations.

    This does not happen because forensic and computer geeks decide to chase cybercriminals. It happens because senior management understands both the importance of what is happening and their fiduciary duty to protect the assets of the organization.

    Alperovitch, who is now co-founder and CTO of forensic firm CrowdStrike, notes that “Mandiant’s report is important and makes it starkly clear that it is becoming harder and harder for the Chinese government to deny that they know nothing about this.” Nevertheless, according to Alperovitch, “the identified group is just one of two dozen in China that are engaged in similar activities, many of them linked to units in the People’s Liberation Army.”

    So, here is the bottom line for corporate America: unlike traditional crimes, companies cannot just call the cops and let them chase the cyber criminals. Affected organizations play a leading role in every investigation because it is their systems and data that are being stolen or leveraged. The lesson from Mandiant is that we must all come together and collectively fight cybercrime, irrespective of whether the criminal is a rogue hacker or a nation state.

    A few tips to get started: Be on the alert for malicious code on your system and, when detected, don’t shirk from funding a proper forensic investigation. If your company is approached by a reputable firm or law enforcement agency with evidence that your corporate systems are being used as a hop point, cooperate as fully as possible. Stay engaged and ensure the investigation stays within the rule of law. Understand these are hard problems and take time.

     

    Download the original document here:

    PDF_MTrends_2012