"I am the Way, the Truth, and the Life"

Father God, thank you for the love of the truth you have given me. Please bless me with the wisdom, knowledge and discernment needed to always present the truth in an attitude of grace and love. Use this blog and Northwoods Ministries for your glory. Help us all to read and to study Your Word without preconceived notions, but rather, let scripture interpret scripture in the presence of the Holy Spirit. All praise to our Lord and Saviour Jesus Christ.

Please note: All my writings and comments appear in bold italics in this colour
Showing posts with label cyber security. Show all posts
Showing posts with label cyber security. Show all posts

Thursday, December 9, 2021

Five Eyes Countries Fight Back Against Cyber Crimes, But Ignore CSAM

..

Canadian spy agency targeted foreign hackers to ‘impose a cost’

for cybercrime

Unfortunately, Child Sex Abuse Images are not one of them

By Alex Boutilier  Global News
Posted December 7, 2021 9:47 am


Canada’s electronic spy agency acknowledged Monday it has conducted cyber operations against foreign hackers to “impose a cost” for the growing levels of cybercrime.

It is the first time the Communications Security Establishment (CSE) has publicly acknowledged the use of “foreign cyber operations” — a category of operations that can include both “active” (offensive) or defensive cyber tools.

The agency said its new mandate “gives CSE the legal authority to conduct cyber operations to disrupt foreign-based threats to Canada, including cybercriminals.”

“Although we cannot comment on our use of foreign cyber operations (active and defensive cyber operations) or provide operational statistics, we can confirm we have the tools we need to impose a cost on the people behind these kinds of incidents,” wrote CSE spokesperson Evan Koronewski in a statement to Global News.

“We can also confirm we are using these tools for such purposes, and working together with Canadian law enforcement where appropriate against cybercrime.”

CSE’s acknowledgment of cyber operations against non-state actors is being called a “watershed” moment for the agency, which operated largely in the shadows until thrust into headlines by Edward Snowden’s disclosures in 2013.

The agency was given explicit authority to conduct “active” operations by the Liberal government in 2019 — albeit under considerable restrictions. The example the agency likes to use is taking action to disrupt a terrorist group’s communications networks to prevent them from planning an attack. Another example would be shutting down networks of a criminal or state-backed group that is actively hacking the Canadian government.

Because hacking a criminal group, intelligence agency or terrorist organization based in a foreign country could violate that country’s laws, CSE’s active measures require the sign-off of both the minister of defence and the foreign affairs minister. The actions must not target Canadians or anyone in Canada.

“(This) marks a time where, rather than relying on a criminal justice agency to address criminal behaviours, the Canadian government is instead using its most secretive and best-resourced intelligence agency to impede the activities of criminals,” Christopher Parsons, a cybersecurity researcher with Citizen Lab, told Global News.

“While it is positive that the CSE is admitting it has used these powers — and, in doing so, has joined the ranks of its other Five Eyes intelligence partners — there is still much to learn. … (Does this) signify the Government of Canada will be increasingly reliant on cyber operations to disrupt criminals, without trial or conviction, instead of trying to bring them to justice?”

The cyber intelligence agency, along with the RCMP, warned Monday that ransomware attacks against critical Canadian sectors — such as health care, energy and manufacturing — are on the rise.

The Liberal government released an open letter to Canadians urging organizations to beef up their cybersecurity, noting that the cost of ransomware attacks —where hackers lock down networks and data, and demand a ransom to unlock them — are increasing dramatically over the course of the COVID-19 pandemic.

“Together with law enforcement, and other federal and international partners, we are working hard to make threat information more publicly available and provide you with specific advice and guidance to help you stay safe from the impacts of ransomware,” the letter, signed by four Liberal cabinet ministers, read.

“Canada is also working closely with our allies to pursue cyber threat actors and disrupt their capabilities.”

There are signs — including CSE’s public acknowledgment Monday — that those “disruption” efforts are increasing.

On Monday, the New York Times reported that Gen. Paul Nakasone, the head of U.S. Cyber Command, acknowledged the military had turned its sophisticated cyber arsenal against criminal hackers.

“The first thing we have to do is to understand the adversary and their insights better than we’ve ever understood them before,” Nakasone told the Times, indicating ransomware groups were among those targeted.

“Before, during and since, with a number of elements of our government, we have taken actions and we have imposed costs. … That’s an important piece that we should always be mindful of.”

That language of “imposing costs” — which CSE also deployed — is significant, said Carleton University professor and security researcher Stephanie Carvin. Carvin said it implies the actions CSE is taking is not just to stop hacks against Canadian organizations, but as a deterrent.

“It’s a big day in Canadian cybersecurity history,” Carvin, a former intelligence analyst, said in an interview.

“Cybercrime is the primary cyber threat to Canada. … I wonder if the confirmation itself is just kind of the CSE acknowledging the scope of the problem is so severe that they have to become involved as well.”

Unfortunately, the primary cyber threat in Canada and most other countries is child sexual abuse images. But governments don't understand this, nor do they understand the destruction being done especially to a generation of girls by this horrific crime. 


Canada has done literally nothing to address this issue in the 6 years of Trudeau's hapless government.






Saturday, January 28, 2017

Big-Time Spy Thriller Playing Out in Public in Russia

Russia charges four top intelligence officials
with treason
By Eric DuVall 

Russian President Vladimir Putin's government arrested four top intelligence officials and charged
them with treason. U.S. analysts speculated the treason charges could be in response to Russian
cooperation with an investigation by U.S. officials into whether Russia intentionally meddled in
the presidential election on behalf of Donald Trump. Photo by Sergei Ilnitsky/EPA

Jan. 28 (UPI) -- The Russian government arrested four men for treason after an investigation that U.S. intelligence officials speculated was in response to their own inquiry about Russia's hacking of the U.S. presidential election.

The men arrested include three high profile leaders of its intelligence agency and a contractor working for the cyber security office of the Russian national intelligence agency FSB, the successor to the KGB.

U.S. officials said they could not be certain whether the arrests are in response to U.S. officials citing with "high confidence" that Russia intentionally interfered with the election to help Donald Trump win. However, for Director of National Intelligence James Clapper to make the proclamation the U.S. government is as close to certain as it can be of Russia's role in hacking Democratic groups and Hillary Clinton's campaign, it likely would require human intelligence in addition to Russia's electronic fingerprints.

If the United States did obtain confirmation about Russian hacking from a mole inside the FSB, it would have had to been a source high up in the power structure because knowledge of such an operation would likely not have spread beyond the senior-most officials there.

U.S. analysts cautioned it was also possible the FSB was using the existence of a potential leak to the United States as cover to purge itself of members involved in an internal power struggle.

Though the reason for the arrests remains unclear, one thing appears certain: The Russian government wanted news of the charges to become public. As opposed to handling the matter internally, the arrests were reported almost simultaneously by multiple Russian media outlets on Thursday.

Russian officials went so far as to arrest one of the suspects, Sergei Mikhailov, a deputy director of the Center for Information Security, in a scene that could have been torn out of a spy novel. They barged into a meeting between senior intelligence officials, put a bag over Mikhailov's head and hauled him out of the room, according to multiple accounts in the Russian media.

The arrests are believed to have taken place in early December, just days after the U.S. intelligence report was published.

Analysts told The New York Times there could be several reasons the Kremlin would want the information public. If the arrests are indeed tied to the U.S. intelligence report, it would be a tacit acknowledgment Russia successfully meddled in a U.S. presidential election -- a way to take credit and show other foreign governments the Kremlin has the ability to do so again. Analysts also speculated a public treason trial could serve as a venue to air more potentially damaging information gleaned about the United States -- and new President Donald Trump -- without using back channels such as the website WikiLeaks to make it public.

Or, it could be a way for Putin to distance himself from the mess. Who knows. But it should be fun finding out.