DHS Bulletin: Online Foreign Influence Snapshot August 2022

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

Read more: DHS Bulletin: Online Foreign Influence Snapshot August 2022

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

National Intelligence Council Map: Russian Filtration Operations

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

DHS Bulletin: Russia Cyber Threat Overview Substantive Revision

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

 This Intelligence In View provides federal, state, local, and private sector stakeholders an overview of Russian Government-affiliated cyber activity targeting the United States and Russian regional adversaries, including disruptive or destructive cyber activity, cyber espionage in support of intelligence collection, and malign foreign influence in service of Russian political agendas. This In View also provides examples of malware and tools used by Russian Government-affiliated cyber actors.

(U) CYBER THREAT TO THE HOMELAND

(U) Russia likely will remain a significant threat to US networks, data, and critical infrastructure as it refines and employs its sophisticated cyber espionage, influence, and attack capabilities, particularly in response to international pressure following its unprovoked attack on Ukraine. Russia has previously targeted critical infrastructure in the United States and allied countries to improve—and in some cases demonstrate—its ability to inflict damage during a crisis. Russia’s use of destructive malware against Ukrainian infrastructure highlights the potential for such attacks to unintentionally spill over to other countries and threatens the availability of US critical assets and data. Russia will likely use these tools to compromise infrastructure and networks, acquire intellectual property and other proprietary data, undercut public trust in US institutions, and sow discord in the Homeland.

(U) TARGETING AND ATTACKS

(U) The Russian Government almost certainly considers cyber attacks an acceptable option to deter adversaries and control escalation. We have not yet observed Russian Government-affiliated actors conducting a destructive or disruptive cyber attack against the United States. However, Russian Government-affiliated cyber actors have targeted US industrial control system (ICS) and operational technology networks with malware, which, if successful, would provide the Russian Government with the option to conduct disruptive or destructive cyber attacks against US ICS. Russian Government-affiliated cyber actors have targeted a number of US industries and use a range of techniques to gain initial access to target networks. These actors have also demonstrated the ability to maintain persistent, undetected, long-term access in compromised environments—including cloud environments—by using legitimate credentials. This access can enable cyber disruptions that could be used at a foreign policy level to shape other countries’ decisions, as well as a deterrence and military tool.

(U) ESPIONAGE

(U//FOUO) Russian Government-affiliated cyber espionage is a persistent threat to federal, state, and local governments, as well as entities in the energy, aviation, transportation, healthcare, and telecommunications industries. Russian Government-affiliated cyber espionage actors support the Kremlin’s intelligence requirements, build cyber attack capabilities, and provide Moscow with an asymmetric response to perceived transgressions by the West.

(U) INFLUENCE

(U) Russian Government-affiliated malign influence actors operate a network of state media outlets and covert online journals to amplify topics Russia perceives as divisive in the United States—such as vaccines, refugees and migrants, and mass shootings—likely to weaken US sociopolitical cohesion and undercut confidence in Western liberal democratic institutions. Moscow has used hack-and-leak operations to influence US elections—such as the leaking of 20,000 internal Democratic National CommitteeUSPER e-mails during the 2016 presidential election—and to highlight perceived injustices—as with the targeting of the US Anti-Doping AgencyUSPER—resulting in the release of medical records of US athletes in retaliation for the banning of Russian athletes from the 2016 Summer Olympic Games. Moscow will continue to seek new methods of circumventing US social media companies’ anti-disinformation activities to further expand its narratives globally.

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

US Delta Command and Control was hacked

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

The Joker DPR hacked into the much-vaunted American Delta command and control program, which is actively used by the AFU. To make it clear, this is a program in which all data on friendly and enemy troops is entered for command and control

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

RaHDIt Exposed Data of Ukrainian Spies

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

✌️SHARE

👉THE ONLY WEBSITE WITH THE LICENSE TO SPY!
http://www.berndpulch.org
👉JOIN @ABOVETOPSECRETXXL
https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://www.bitchute.com/channel/R55w1IXstR3h/
https://www.bitchute.com/accounts/referral/berndpulchofficial/
https://www.youtube.com/channel/UC

KPR_qNWDyJwtCK484A6A
https://www.youtube.com/channel/UC1sITXl9OPqpjxvDh2dQOuA
https://truthbook.social/berndpulch
👉JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL
SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

Leaked – Department Of Energy – Cybersecurity & Digital Components Supply Chain Deep Dive Assessment – Original Document

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

On February 24, 2021, President Biden issued Executive Order 14017 on America’s Supply Chains directing the Secretary of Energy to submit a supply chain strategy overview report for the energy sector industrial base (as determined by the Secretary of Energy). The U.S. Department of Energy (DOE) defines the Energy Sector Industrial Base (ESIB) as the energy sector and associated supply chains that include all industries/companies and stakeholders directly and indirectly involved in the energy sector. The energy sector industrial base involves a complex network of industries and stakeholders that spans from extractive industries, manufacturing industries, energy conversion and delivery industries, end of life and waste management industries, and service industries to include providers of digital goods and services.

READ ALL AT

https://t.me/ABOVETOPSECRETXXL/14414

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

BREAKING NEWS – MASSIVE CYBER ATTACK ON YOUTUBE GOING ON – NOW STOPPED

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

DHS: Warning Of Cyber Attacks Targeting US During Russian Invasion Of Ukraine – Original Document

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

Continue reading “DHS: Warning Of Cyber Attacks Targeting US During Russian Invasion Of Ukraine – Original Document”

NSA CYBERSECURITY YEAR IN REVIEW – ORIGINAL DOCUMENT

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

Continue reading “NSA CYBERSECURITY YEAR IN REVIEW – ORIGINAL DOCUMENT”

EU to Hold Large-Scale Cyber Attack ‘Supply Chain’ Drill

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

Cyber Attacks Top List Of Risks Impacting Supply Chain ...

The European Union will reportedly stage a far-reaching cyber security exercise intended to prepare for an attack on its distribution networks. (Bloomberg report)

Originally proposed by France, the drill is intended as a “stress test” to largely simulate a supply chain breach across Europe. The bloc will then coordinate diplomatic and public responses to the mock attacks, as well as to “spillover socio-economic effects in other member states.” 

The hacks will be modeled on past cyber attacks, or those thought to be likely in the future, in order to be “as realistic as possible,” according to a document cited in the report.

The exercise is supposed start sometime in the coming days and will continue for six weeks.

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

The New Goal Of “Protecting Critical Infrastructure” In Preparation For A Benign Omicron

SUPPORT US AND Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

Protecting Critical Infrastructure - YouTube

The German federal government’s Council of Experts has issued a major new goal for pandemic policy: Protecting critical infrastructure from personnel shortages. This is a successful measure of narrative diversification in case Omikron turns out to be a comparatively harmless mutant.

It has become increasingly difficult to justify policy hyperactivity in issuing disaster warnings and enacting new restrictions after weeks of weakening infection momentum. Reports from the source of the Omikron variant, South Africa, that the disease is mostly harmless did not make the task any easier.

But the crisis team, led by a general staff, knows rescue. After flattening the curve, protecting vulnerable groups, preventing the health care system from being overburdened and, most recently, preventing triage in intensive care beds, the staff is now focusing on ensuring that the critical infrastructure in as a goal.

This means police, fire, transportation, and all sorts of other things, and all sorts of things that can be put up with if bottlenecks were to show up somewhere.

The new narrative has two key advantages. It is strongly forward-looking, so one can make policy fairly independently of the current numbers with pure possibilities and real or invented dangers.

And it can be deployed regardless of the severity of the corona mutation that is currently circulating. If initial evidence substantiates that the Omicron variant, while highly contagious, leads to less severe courses and deaths than the Delta variant, that would not be a problem for the continuation of the restriction and control policy.

This is because for the new narrative, it is the infections that matter, not the severity of the disease. If the rules are not changed, and why should they be, then a great many critical infrastructure employees with minimal symptoms will be sent into long quarantine periods, exacerbating the staffing problem.

It is important to guard against this danger early on with strict contact restrictions and lockdowns. Q.e.d. What needed to be proven.

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

Threat Report On The Surveillance-For-Hire Industry

SUPPORT US AND Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

Continue reading “Threat Report On The Surveillance-For-Hire Industry”

250 Gigabytes Hacked From The Metropolitan D.C. Police By The Ransomware Group Babuk

SUPPORT US AND Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

Babuk Locker è il primo nuovo ransomware aziendale del ...

DDOsecrets reports: “250 gigabytes hacked from the Metropolitan D.C. police by the ransomware group known as Babuk. The data includes a 156.35 gigabyte “gang database” (released by the hackers as “all”) and two 64.19 gigabyte (released by the hackers as “HR”) and 29.03 gigabyte (released by the hackers as “part 2”) human resource datasets.

Distributed Denial of Secrets is immediately making the data available to journalists and researchers, and is in the process of reviewing it for portions that can be publicly released.

The hackers released the following screenshots (click to view enlarged versions) showing what they had access to and what is presumably contained in the data that is being released. The screenshots are offered to maintain a complete record and to offer a preliminary overview to journalists, researchers and curious citizens.

Distributed Denial of Secrets has located and converted 74,874 emails from the largely inaccessible .PST format to the universal .EML format, which are being made available to the public. The most recent collection of emails can be downloaded here. The emails come from the lead civilian analyst for the Department’s Intelligence Branch.

Some email conversions are also being provided directly to journalists and researchers.This includes 17,690 emails from the Director of Human Resources as well as 6,022 emails from then-intern Marvin “Ben” Haiman, now the Executive Director of the Professional Development Bureau and former Director for the Homeland Security Advisory Council for DHS.

The 98,586 emails are organized by archive, retain their original folder structure and are organized chronologically. Due to the way the emails were extracted and converted, they may not pass DKIM inspection. Forensic evaluation should only be performed on the original archives, as the conversions are provided only for convenience of journalists and other researchers.

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THE FULL DOCUMENT AND MANY MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

CISA: COST OF A CYBER INCIDENT: SYSTEMATIC REVIEW AND CROSS-VALIDATION – ORIGINAL DOCUMENT

SUPPORT US AND Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

Continue reading “CISA: COST OF A CYBER INCIDENT: SYSTEMATIC REVIEW AND CROSS-VALIDATION – ORIGINAL DOCUMENT”

NSA SECURITY GUIDANCE FOR 5G – ORIGINAL DOCUMENT

SUPPORT US AND Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

Continue reading “NSA SECURITY GUIDANCE FOR 5G – ORIGINAL DOCUMENT”

FACEBOOK, INSTAGRAM & WHATSAPP DISASTER – DNS WITHDRAWN – WHISTLEBLOWER – HACKER OFFER GENUINE DATA

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Facebook offering "vulnerable teens" to advertisers shows ...

Mark Zuckerberg – Domain For Sale ?

As the US site Privacy Affairs, which specializes in security, announced, hackers have just offered the data of 1.5 billion Facebook users for sale. Including the names, email addresses, places of residence and telephone numbers of those affected. A first data check showed that it is probably real user data from the social network. The Facebook, Messenger, Instagram and Whatsapp pages have been offline for hours for unknown reasons.

Continue reading “FACEBOOK, INSTAGRAM & WHATSAPP DISASTER – DNS WITHDRAWN – WHISTLEBLOWER – HACKER OFFER GENUINE DATA”

UNITED STATES VS HACKER WORKING FOR UAE – ORIGINAL DOCUMENT

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Continue reading “UNITED STATES VS HACKER WORKING FOR UAE – ORIGINAL DOCUMENT”

ANONYMOUS – These Insanely Strange Videos Will Keep You Awake At Night – WHAT IS GOING ON?

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

NSA – Scope Of Treasure Map – Map Of Every Router & Device On The Global Internet – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Page 1 of Treasure Map Presentation
Continue reading “NSA – Scope Of Treasure Map – Map Of Every Router & Device On The Global Internet – Original Document”

Anonymous – “Everyone Should Be Prepared” – Watch Within The Next 48 hrs

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Anonymous – “I Was KΙLLED For This Information” – They Don’t Want It Out

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Exposed – Google Kenosha WI -Warrant -Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Google is giving data to police based on search keywords, court docs show -  CNET
Continue reading “Exposed – Google Kenosha WI -Warrant -Original Document”

Background To Assessing Russian Influence In US Elections – Russia Hack Report – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Page 1 of Russia Hack Report
Continue reading “Background To Assessing Russian Influence In US Elections – Russia Hack Report – Original Document”

Presidential Order Against Russian Hackers – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

US expels Russian diplomats over cyber attack allegations - BBC News

This executive order announced publicly acknowledged measures taken by the Obama administration in response to Russia’s alleged involvement in the hacking of Democratic National Committee and other computer systems. The annex identifies the entities targeted by the measures – including the Russian security service (FSB) and military intelligence (GRU).

Page 1 of Document-10. Barack Obama, Executive Order, "Taking Additional Steps to Address the National Emergency with Respect to Significant Malicious Cyber-Enabled Activities," w/Annex. December 29, 2016. Unclassified.
Continue reading “Presidential Order Against Russian Hackers – Original Document”

Video – Iran Cyber Attack Tactics Revealed

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Documents have revealed how a cyber attack could be carried out against western nations by Iran. The secret research sets out details on how to attack various targets including sinking a cargo ship or blowing up a fuel pump at a petrol station.

It’s believed the documents were put together by a cyber unit in the Islamic Revolutionary Guard Corps.

Sky – ‘Enough Is Enough’: China ‘Named And Shamed’ By 30 Nations Over Cyber Attacks

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Assistant Defence Minister Andrew Hastie says it’s a “very sound development” that 30 nations came together and “named and shamed” China for cyber attacks on Microsoft.

This comes after Western world allies including Australia, the United States and Japan joined forces to directly blame the communist superpower for a major cyber attack on Microsoft software. The attack exploited weaknesses in Microsoft Exchange software which impacted thousands of computers and networks across the world.

“I think it’s a very sound development that we’ve named and shamed China behind these hacks – because it’s got to stop,” Mr Hastie told Sky News host Peta Credlin. “We have boundaries in our normal everyday relationships and so too have boundaries on the international stage. “And this is 30 nations saying to China ‘enough is enough – no more’.”

Chinese Cyber Attacks Getting To ‘Critical Stage’

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The Australian government, along with allies, has accused China of a major cyber attack on Microsoft software. It is alleged Chinese state-sponsored hackers compromised 400,000 servers across the world, including in Australia.

The Australian’s Chris Griffith told Sky News these attacks are becoming more prevalent and critical around the world. “It’s hard to pinpoint exactly if the state (China) is explicitly involved in it, or it is encouraging it, or if it is tacitly approving it,” he said. “In the last year we have seen the ramping up of cyber activity to a level we haven’t seen before. “It’s getting to a critical stage.”

Video – The Bizarre Rise & Suspicious Death Of John McAfee

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

This is John McAfee – the eccentric tech millionaire, playboy, suspected murderer, international fugitive, presidential candidate, crypto enthusiast… And the same man behind that annoying software called McAfee Antivirus that you probably have installed on your computer right now if you have windows John has lived a… wild existence Could he, as a 75 year old man with deteriorating health, not take it anymore? Or did the US government have something to do with it?

Continue reading “Video – The Bizarre Rise & Suspicious Death Of John McAfee”

Cryptome – NSA Cyber Commando East Campus Buildings – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Inside the U.S.' new state-of-the-art cyberwarfare bunker - CyberScoop
Continue reading “Cryptome – NSA Cyber Commando East Campus Buildings – Original Document”

Presidential Documents – Executive Order 14017 – America’s Supply Chains – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Ransomware Attack Hits Data Center Provider CyrusOne: Report | Threatpost

Colonial Pipeline, supplier of 45% of East Coast fuel, was paralyzed in February by DarkSide ransomware attack.

In response to the Colonial Pipeline event attributed to the ransomware group DarkSide, the Biden Administration has announced an all-of-government effort to mitigate potential energy supply disruptions. On top of temporary actions to relieve fuel shortages, agencies such as the FBI and CISA have released advisory documents to “help [critical infrastructure] owners and operators improve their entity’s functional resilience by reducing their vulnerability to ransomware.”

In addition, President Biden signed an Executive Order designed broadly to “improve the nation’s cybersecurity,” although experts are already questioning whether the anticipated measures could have prevented any of the recent serious cyber events such as SolarWinds or Colonial Pipeline.

Continue reading “Presidential Documents – Executive Order 14017 – America’s Supply Chains – Original Document”

CISA & FBI – DarkSide Ransomware – Best Practices For Preventing Business Disruption From Ransomware Attacks – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Lazarus Group Brings APT Tactics to Ransomware | Threatpost
Continue reading “CISA & FBI – DarkSide Ransomware – Best Practices For Preventing Business Disruption From Ransomware Attacks – Original Document”

NSA General Counsel Gerstell – “How We Need To Prepare For A Global Cyber Pandemic” – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Glenn S. Gerstell SPEECH | April 9, 2018

By some accounts, Russian meddling in the US election system may have originated from the depths of a hot dog cart. It’s a success story, of sorts.

In the early 1990s, an enterprising hot dog vendor in Russia seized upon the entrepreneurial opportunities created by the collapse of the Soviet Union to start his own catering company. He eventually grew his business enough to win lucrative catering contracts with the Russian government. He and his restaurants threw opulent banquets for Kremlin officials, earning him the nickname “Putin’s Cook.” Yevgeny Prigozhin’s company even won a contract in 2011 to deliver school lunches across Moscow, but children wouldn’t eat the food, complaining that it smelled rotten. Bad publicity ensued. Prigozhin’s company responded not by upgrading the food, but by hiring people to flood the internet with postings praising the food and rejecting complaints. Presumably, they found it cheaper to use the internet to write fake reviews than to fund deluxe hot dogs for schoolchildren.

Continue reading “NSA General Counsel Gerstell – “How We Need To Prepare For A Global Cyber Pandemic” – Original Document”

Israel Admits Attacking Iran’s Nuclear Programme, As Cyber-Attack Derails Iranian Nuke Plant

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Israel acknowledged that it was behind a cyberattack on Iran’s main nuclear facility on April 11. The cyberattack took place hours after officials at the Natanz reactor restarted spinning advanced centrifuges. These centrifuges could speed up the production of enriched uranium. Watch the video to know more.

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Cybersecurity And Infrastructure Security Agency Report: Protecting Against The Threat of Unmanned Aircraft Systems (UAS)

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Continue reading “Cybersecurity And Infrastructure Security Agency Report: Protecting Against The Threat of Unmanned Aircraft Systems (UAS)”

Exposed – Russia Likely To Continue Seeking To Undermine Faith In US Electoral Process

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Homeland Security Experts on the Biggest Threats and Challenges the U.S.  Faces in 2020 – Homeland Security Today
 
Page Count: 4 pages
Date: September 3, 2020
Restriction: For Official Use Only
Originating Organization: Cyber Mission Center, Office of Intelligence and Analysis, Department of Homeland Security
File Type: pdf
File Size: 167,819 bytes
File Hash (SHA-256): CD0E044E731342D57AB13DCBB9C8B56D2D5A6295D1E51F6409461D1CAB55C61A
 

Continue reading “Exposed – Russia Likely To Continue Seeking To Undermine Faith In US Electoral Process”

Fancy Bear – Die GRU – Hacking – Abteilung Unter Der Lupe

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Fancy Bear APT Uses New Cannon Trojan to Target Government Entities

Fancy Bear (auch bekannt als APT28 (von Mandiant), Pawn Storm, Sofacy Group (von Kaspersky), Sednit, Tsar Team (von FireEye) und STRONTIUM (von Microsoft)) ist eine russische Cyberspionagegruppe. Das Cybersicherheitsunternehmen CrowdStrike hat analysiert, dass es mit dem russischen Militärgeheimdienst GRU in Verbindung steht. Das britische Außen- und Commonwealth-Amt sowie die Sicherheitsfirmen SecureWorks ThreatConnect und Fireeyes Mandiant haben ebenfalls erklärt, dass die Gruppe von der russischen Regierung gesponsert wird. Im Jahr 2018 identifizierte eine Anklage des United States Special Counsel Fancy Bear als zwei GRU-Einheiten, bekannt als Unit 26165 und Unit 74455.

Continue reading “Fancy Bear – Die GRU – Hacking – Abteilung Unter Der Lupe”

Fancy Bear Zielte Auf Europäische Think Tanks Ab

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Internet of Things: Neue Angriffe der Hackergruppe Fancy Bear ...

In einem Blogbeitrag gab Microsoft bekannt, dass Hacker Ende letzten Jahres versucht haben, Konten europäischer Think Tanks zu verletzen. Während der laufenden Ermittlungen ist Microsoft “zuversichtlich”, dass viele der Versuche von der Spionagegruppe Fancy Bear stammen, die die US-Regierung Russland zugeschrieben hat.

Das große Ganze: Fancy Bear – oder wie Microsoft die Gruppe Strontium nennt – ist in den USA am bekanntesten dafür, dass er das Democratic National Committee und andere politische Ziele während der Wahlen 2016 gehackt hat. Insbesondere betreibt der German Marshall Fund eine russische Desinformations-Tracking-Site für soziale Medien namens Hamilton 68.

Die europäischen Hacking-Versuche fanden laut Microsoft zwischen September und Dezember statt.

Die Hacker richteten sich gegen 104 Konten von Mitarbeitern des Deutschen Rates für auswärtige Beziehungen sowie gegen die europäischen Büros des Aspen Institute und des German Marshall Fund in Belgien, Frankreich, Deutschland, Polen, Rumänien und Serbien.
Die Hacker versuchten, mithilfe von Phishing-Websites und E-Mails Anmeldeinformationen zu stehlen und Malware bereitzustellen.
Microsoft hat die betroffenen Think Tanks schnell benachrichtigt.
Think Tanks sind ein wertvolles Ziel für Spione, da sie häufig enge Beziehungen zu Regierungsbeamten und Daten über die Regierungsführung oder von der Regierung hinter den Kulissen haben.

Die Hacking-Gruppe “Fancy Bear” Fügt Neue Funktionen Und Ziele Hinzu

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Russian Fancy Bear hackers' UK link revealed - BBC News

Die in Russland ansässige Cyberspionage-Gruppe Fancy Bear, die in den letzten Jahren hochkarätige Cyberangriffe gegen Regierungen und Botschaften geführt hat, hat laut Untersuchungen des Sicherheitsunternehmens ESET eine Phishing-Kampagne gestartet, die eine neu gestaltete Hintertür (backdoor) umfasst.

Die Kampagne von Fancy Bear, auch bekannt als APT28, Sofacy, Strontium und Tsar Team, ist seit dem 20. August 2018 aktiv. Die Gruppe, die dem russischen Militärgeheimdienst GRU angeschlossen ist, war an den Hack des Demokratischen Nationalkomitees federführend beteiligt.

Jetzt zielt Fancy Bear hauptsächlich auf Außenministerien und Botschaften in Osteuropa und Zentralasien ab, sagen die Forscher. Die Ermittler fanden auch Hinweise auf eine neu gestaltete Hintertür sowie einen neuen Downloader, den die Hacker mit Nim erstellt haben, einer neuen Art von Programmiersprache, die Aspekte von Python, Ada und Modula kombiniert.

Diese neueste Kampagne beinhaltet Phishing-E-Mails an Opfer, die einen böswilligen Anhang enthalten, sagen die Forscher. Wenn das Ziel den Anhang öffnet, werden Downloader gestartet, die mit der Installation der Hintertür auf einem infizierten Gerät enden, heißt es in dem Bericht.

iese Hintertür ist in der Programmiersprache Golang oder Go geschrieben – eine weitere Ergänzung zum Toolset der Gruppe, so die Forscher.

Taktik überarbeiten
ESET-Forscher haben den Namen der Botschaften, auf die sich diese letzte Kampagne bezieht, nicht bekannt gegeben, aber der Bericht stellt fest, dass die Kampagne weiterhin aktiv ist.

Ein Grund, warum ESET diese neue Hintertür jetzt erkannt hat, ist, dass Fancy Bear-Hacker beschlossen haben, Taktiken und Tools zu wechseln, um der Sicherheitserkennung durch die Organisationen, auf die die Gruppe abzielt, besser zu entgehen. Dies ist ein Grund, warum Fancy Bear Tools wie die Programmiersprachen Golang und Nim verwendet, sagen ESET-Forscher.

“Während es für uns unmöglich ist, genau zu wissen, warum sie es tun, besteht eine wahrscheinliche Erklärung darin, Sicherheitslösungen zu umgehen, die bereits andere Varianten ihrer Tools erkennen”, sagt ein ESET-Forscher gegenüber der Information Security Media Group. “Es könnte auch die Zuordnung erschweren, da es einfacher ist, einer Gruppe eine Variation eines bestimmten Werkzeugs zuzuweisen, das in einer bestimmten Sprache geschrieben ist, als wenn eines in einer völlig neuen Sprache geschrieben ist.”

Phishing-Schema
Die Angriffe im August begannen mit einer Phishing-E-Mail, die ein angehängtes Microsoft Word-Dokument enthielt, obwohl es dem Opfer nach Ansicht der Forscher den Anschein hatte, dass diese bestimmte Datei leer ist. Die E-Mail enthält auch einen Verweis auf eine Dropbox-Vorlage, die laut Bericht einen Link – wordData.dotm – enthält.

Neben der Verwendung der neuen Programmiersprachen zum Umschreiben ihrer schädlichen Tools ist laut ESET auch die Verwendung von Dropbox durch Fancy Bear zur Bereitstellung von zusätzlichem Code neu.

“Der anfängliche Kompromissvektor bleibt unverändert, aber die Verwendung eines Dienstes wie Dropbox zum Herunterladen einer Remote-Vorlage ist für die Gruppe ungewöhnlich”, heißt es in dem Bericht.

Wenn ein Opfer auf den Link für die Dropbox-Vorlage klickt, werden im Hintergrund schädliche Makros heruntergeladen, die den Nim-basierten Downloader sowie einen Trojaner enthalten, den ESET Zebrocy aufruft.

Der Nim-basierte Downloader ist nur ein Teil eines sechsstufigen Prozesses dieses Angriffs. Sobald alle diese anderen Komponenten heruntergeladen sind, wird die endgültige Nutzlast geliefert: Die Hintertür, die in Golang geschrieben ist, sagen die Forscher.

Diese neue Hintertür ähnelt früheren Hintertüren, die von der Fancy Bear-Gruppe bereitgestellt wurden, ist jedoch in einer anderen Programmiersprache geschrieben. Neben dem Zurücksenden von Daten an den Befehls- und Steuerungsserver und der Verwendung der Verschlüsselung zum Ausblenden der Kommunikation umfassen diese anderen gemeinsamen Funktionen:

Dateimanipulation wie Erstellen, Ändern und Löschen;
Screenshot-Funktionen;
Laufwerksaufzählung;
Befehlsausführung.
Planen von Aufgaben in einem Teil von Windows, mit denen die Angreifer die Persistenz auf einem infizierten Gerät aufrechterhalten können.
“Es scheint, dass [Fancy Bear] den Originalcode in andere Sprachen portiert oder in andere Sprachen implementiert, in der Hoffnung, der Erkennung zu entgehen”, heißt es im ESET-Bericht.

Fancy Bear verfolgen
Fancy Bear ist seit etwa 2004 aktiv und hat Berichten zufolge Verbindungen zur russischen Regierung sowie zur Hauptnachrichtendirektion für das russische Militär oder zur GRU.

Die Gruppe war an mehrere hochkarätige Angriffe gebunden, darunter das Hacken von E-Mails des Demokratischen Nationalkomitees während der US-Präsidentschaftswahlen 2016 (siehe: Feds klagen 7 Russen wegen Hacking und Desinformation an).

Im Jahr 2017 versuchte Fancy Bear angeblich, die französischen Präsidentschaftswahlen 2017 zu beeinflussen, indem er einen Dump mit gehackten Daten veröffentlichte, die den Mitarbeitern des damaligen Präsidentschaftskandidaten Emmanuel Macron gehörten. Zu den gehackten Daten gehörten E-Mails, Buchhaltungsdokumente und Verträge der Personen, die an Macrons Kampagnenbewegung beteiligt waren (siehe: Au Revoir, angebliche russische “Fancy Bear” -Hacker).

Im November 2018 richtete die Gruppe ihre Aufmerksamkeit wieder auf die USA und führte einen gezielten Angriff gegen den Senat durch. Laut einem Bericht von Trend Micro startete die Gruppe mehrere Phishing-Sites, die die Active Directory Federation Services des Senats imitierten, um Zugriffsrechte auf verschiedene Regierungssysteme und -anwendungen zu erhalten

Must See Video – GRU-HACKER: Cyberattacken Wohl Werk Vom Russischen Militärgeheimdienst

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Der Westen wirft Russland offiziell vor, hinter vielen großen Hackerangriffen der vergangenen Jahre zu stecken. Die USA klagten sieben Agenten des Militärgeheimdiensts GRU unter anderem wegen der Cyberattacke auf Welt-Anti-Doping-Agentur WADA an. Niederländische Behörden erwischten nach eigenen Angaben GRU-Agenten beim Versuch, sich ins Computernetz der Organisation für ein Verbot von Chemiewaffen (OPCW) zu hacken. Die britische Cyberabwehr rechnet dem GRU auch die Hackergruppe APT 28 zu, die hinter den Cyberattacken auf den Deutschen Bundestag und das Datennetzwerk des Bundes vermutet wird. Die Enthüllungen aus London, Den Haag und Washington sind die bisher schärfsten Anschuldigungen im Zusammenhang mit mutmaßlich russischen Hackerangriffen. Besonders ausführlich und gut dokumentiert waren die Vorwürfe der Niederländer. Sie veröffentlichten am Donnerstag unter anderem Bilder von der Spionageausrüstung sowie Daten von beschlagnahmten Geräten. Nach Angaben der Ermittler wollten die GRU-Agenten im April ins WLAN-Netz der OPCW eindringen. Die Organisation untersuchte damals Chemiewaffen-Angriffe in Syrien sowie die Nervengift-Attacke auf den ehemaligen russischen Doppelagenten Sergej Skripal und seineTochterJulia in Großbritannien. Aus den Gerätedaten gehe hervor, dass auch Hacker-Attacken in der Schweiz und auf die strafrechtliche Untersuchung zum Abschuss des Passagierfluges MH17 geplant gewesen seien, hieß es. Mit den Angriffen auf die WADA und den Leichtathletikverband IAAF wollten die russischen Hacker nach Darstellung der US-Ermittler von den Vorwürfen eines staatlich Betriebenen Dopings gegen Russland ablenken. Sie hätten aber auch versucht, sich in den US-Atomkonzern Westinghouse zu hacken. Details dazu – etwa, ob die Attacke Erfolg hatte – gab es nicht. Bereits am Morgen veröffentlichte die britische Cyberabwehr eine Liste von Hackergruppen, hinter denen «so gut wie sicher» der GRU stehe. Darunter ist auch «APT 28», die hinter den Angriffen in Deutschland vermutet wird. Experten gingen bereits davon aus, die offizielle Anschuldigung aus London untermauert nun den Verdacht. Bei dem Angriff auf den Bundestag im Jahr 2015 hatten sich Angreifer so weitreichenden Zugang verschafft, dass die Bundestags-IT ausgetauscht werden musste. Bei dem im Februar bekannt gewordenen Angriff auf das Datennetzwerk des Bundes hatten Cyberspione unter anderem das deutsche Außen- und das Verteidigungsministerium attackiert. Dabei sollen sie auch Daten erbeutet haben. Das britische National Cyber ​​Security Center fand nach eigenen Angaben heraus, dass der GRU auch für Attacken auf die Demokratische Partei vor den US-Präsidentschaftswahlen 2016, einen Flughafen in der Ukraine sowie eine TV-Station in Großbritannien verantwortlich ist. Politiker griffen zu scharfen Worten: Laut dem britischen Außenminister Jeremy Hunt zeigen die Angriffe, dass Russland agiere, ohne das Völkerrecht zu beachten. Verteidigungsminister Gavin Williamson sagte am Rande eines Nato-Treffens in Brüssel: «So handelt keine Großmacht, das sind Handlungen eines Pariastaates.» «Ich habe genügend Beweise gesehen, um sagen zu können, dass die Niederländer und Briten zu 100 Prozent richtig liegen», sagte US-Verteidigungsminister James Mattis. EU-Ratspräsident Donald Tusk und Kommissionschef Jean-Claude Juncker verurteilten das Vorgehen.

Become a Patron!
True Information is the most valuable resource and we ask you to give back

FBI Cyber Research revealed

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The FBI identified incidents over the past few months in which cyber actors scanned for and sought to exploit audio and visual communication devices on networks to identify vulnerabilities which could later be used to gain access and unlawfully acquire information about the organization. In addition to targeting corporate information, vulnerable devices may be targeted for compromise for use in botnets or other criminal activities. The types of devices targeted include: Voice over Internet Protocol (VoIP) phones, video conferencing equipment, conference phones, VoIP routers, and cloud-based communication systems. While cyber actors have targeted VoIP and other communication devices in the past, the FBI continues to see these devices scanned by cyber actors for vulnerabilities.

Threat

Specifically, the FBI observed cyber actors identifying and probing communication devices by issuing HTTP GET requestsa to a business server or network to retrieve device configuration files. Information contained in configuration files often reveals IP addresses, usernames, passwords, system management URLs, and assigned phone numbers – all of which could be used by cyber actors for malicious purposes. Many of the requests are specific to particular brands of devices. Victims will often receive several GET requests in succession with the actors scanning for multiple brands of devices.

In addition, cyber actors retrieve IP addresses for further exploitation by using businesses’ customer service VoIP hyperlinks, which are traditionally made available for customers to use in contacting the business. Once those hyperlinked calls are answered, the actor retrieves the IP address belonging to the phone which answered the call. Once the IP address is retrieved, an actor could send a large volume of packets to the IP address, overloading it and taking the service offline for the targeted business and its legitimate customers.

In addition to the above techniques, cyber actors target devices with brute-force attacks, attempting unauthorized access through the use of common usernames and passwords. Open source scanning tools can also be used to identify vulnerable communication devices and any associated ports.

All of the information obtained through scans and other methods are likely used for specific targeting efforts by cyber actors. This includes leveraging access to compromised audio and video devices to eavesdrop on meetings or conference calls, placing fraudulent international phone calls, leveraging the compromised device for use in botnets, and conducting man-in-the-middle attacks to redirect corporate network traffic.

Recommendations

The following recommendations may limit the success of these types of attacks:

Conduct daily server log reviews to identify unusual activity, including GET and POST requests from external IP addresses.

Work with the communication device/system providers to ensure servers are patched and updated regularly.

Consider restricting access to configuration files or configuring firewalls to block traffic from unauthorized IP addresses.

Restrict communication devices/systems to only non-sensitive business networks.

Conduct regular penetration testing exercises on communication devices to identify and address vulnerabilities in a timely matter.

Enable encryption on teleconference programs and applications and consider disabling auto-answer capabilities.

Password protect configuration files, if possible.

Regularly review and update users with access to administrative accounts.

Segment configuration files on the network. Be sure to protect configuration and other device-related files after getting the device out of the box. Don’t just plug and play.

 

Revealed – The U.S. DoD Forensic Science Lexicon

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

DEPARTMENT OF DEFENSE
DoD Forensic Science Lexicon
May 27, 2018

Department of Defense Forensic Science Lexicon
Page Count: 99 pages
Date: January 2018
Restriction: None
Originating Organization: Defense Forensics and Biometrics Agency
File Type: pdf
File Size: 956,884 bytes
File Hash (SHA-256): 4C47BA0C862DB9F0E3775053480ED5715945EAEB78510D786286A554C8C2BDC1

Download File

https://info.publicintelligence.net/DoD-ForensicScienceLexicon.pdf

 

1 Introduction

The Department of Defense (DoD) performs forensic science in a collaborative environment which necessitates the clear communication of all activities and their results. A critical enabler of communication is the use of a clear, internally consistent vocabulary.

1.1 Purpose

The goal of the Department of Defense Forensics Lexicon is to provide an operational vocabulary to address Forensics. A shared vocabulary enables a common understanding of Forensics, enhances the fidelity and the utility of operational reporting, facilitates structured data sharing, and strengthens the decision making processes across the DoD.

1.2 Scope

This lexicon encompasses the broad spectrum of scientific disciplines, processes, and equipment associated with performing forensic activities. Additional terms include those related to the programmatic support domains (e.g., doctrine, policy, standards, and accreditation) which enable forensic activity within the DoD.

Excluded from this lexicon are terms and definitions that describe the various types of Improvised Explosive Devices (IEDs) and the specific components of IEDs, as those have been previously defined in other well established lexicons.

1.3 Approach

This Department of Defense Forensics Lexicon was authored by subject matter experts from key organizations and agencies engaged in the full range of forensic activities and the personnel that provide programmatic support to those experts. It was then staffed multiple times across the Defense Forensics Enterprise in order to obtain support and consensus.

DHS Reveals – Unmanned Aircrafts Systems Endanger Cybersecurity

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Image result for cybersecurity

The Department of Homeland Security (DHS)/National Protection and Programs Directorate (NPPD)/Office of Cyber and Infrastructure Analysis (OCIA) assesses that unmanned aircraft systems (UASs) provide malicious actors an additional method of gaining undetected proximity to networks and equipment within critical infrastructure sectors. Malicious actors could use this increased proximity to exploit unsecured wireless systems and exfiltrate information. Malicious actors could also exploit vulnerabilities within UASs and UAS supply chains to compromise UASs belonging to critical infrastructure operators and disrupt or interfere with legitimate UAS operations.

 

UAS FACILITATE PHYSICAL ACCESS TO UNSECURED SYSTEMS

UASs provide malicious actors an additional method of gaining proximity to networks and equipment within critical infrastructure sectors. Malicious actors could then use the proximity provided by a UAS to wirelessly exploit unsecured systems and extract information from systems they cannot otherwise access remotely or may not be able to access due to range limitations. This includes networks and devices within secured buildings, as well as networks and devices behind fencing and walls.

UASs can also allow a malicious actor to wirelessly exploit vulnerabilities from a distance (figure 1). The prevalent ownership and operation of UASs by the general public, the distance from which UAS can be operated, and a lack of tracking data can also provide malicious actors a level of anonymity that otherwise may not be available. UASs, in particular UASs, are typically more difficult to detect than a malicious actor attempting to trespass beyond physical barriers.

UAS FOR WIRELESS SYSTEM EXPLOITATION

Malicious actors could utilize UASs in order to wirelessly exploit access points and unsecured networks and devices. This can include using UASs in order to inject malware, execute malicious code, and perform man-in-the-middle attacks. UASs can also deliver hardware for exploiting unsecured wireless systems, allowing malicious actors persistent access to the wireless system until the hardware is detected or runs out of power. While OCIA does not know of a confirmed incident utilizing UASs to exploit wireless systems, researchers have demonstrated this capability.

MALICIOUS ACTORS CAN EXPLOIT COMPROMISED UAS

While UASs can be used as a tool for an attacker, they are also vulnerable to exploitation. Many commercial UAS variations, for example, currently communicate with ground stations and operators using unencrypted feeds. This can allow a malicious actor to intercept and review data sent to and from the UAS.