Posts Tagged ‘FBI’

China hackers

https://soundcloud.com/bloomberg-business/the-big-hack-part-1-read-aloud

https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies

Nested on the servers’ motherboards, the testers found a tiny microchip, not much bigger than a grain of rice, that wasn’t part of the boards’ original design. Amazon reported the discovery to U.S. authorities, sending a shudder through the intelligence community. Elemental’s servers could be found in Department of Defense data centers, the CIA’s drone operations, and the onboard networks of Navy warships. And Elemental was just one of hundreds of Supermicro customers.

interdiction, consists of manipulating devices as they’re in transit from manufacturer to customer. This approach is favored by U.S. spy agencies, according to documents leaked by former National Security Agency contractor Edward Snowden. The other method involves seeding changes from the very beginning.

In emailed statements, Amazon (which announced its acquisition of Elemental in September 2015), Apple, and Supermicro disputed summaries of Bloomberg Businessweek’s reporting.

The Chinese government didn’t directly address questions about manipulation of Supermicro servers, issuing a statement that read, in part, “Supply chain safety in cyberspace is an issue of common concern, and China is also a victim.” The FBI and the Office of the Director of National Intelligence, representing the CIA and NSA, declined to comment.

+++++++++++++
more on hackers in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker

fake social media accounts and politicians

Roger Stone Bought Hundreds of Fake Facebook Accounts to Promote His WikiLeaks Narrative from r/technology

https://gizmodo.com/roger-stone-bought-hundreds-of-fake-facebook-accounts-t-1843161716

The documents also reveal that Stone had run a mini-sock puppet outfit with hundreds of fake Facebook accounts

The documents claim that investigators are still unaware of what’s in his WhatsApp, Signal, Wickr, and ProtonMail logs. More importantly, what was the Swash Buckler up to?

+++++++++++++++
more on fake news in this IMS blog
https://blog.stcloudstate.edu/ims?s=%23fakenews

hacking voting

A Voice Cuts Through, and Adds to, the Intrigue of Russia’s Cyberattacks

++++++++++++++++++++
more on Eastern European hackers in this IMS blog:
https://blog.stcloudstate.edu/ims/2016/06/22/ukrainian-hacker-and-fbi/