Saturday, January 11, 2020

How Will Americans Secure the Elections in 2020?

Ed.'s note: There was a Red team operating in the cyberspace attempting to hack into the US elections in 2020 in a simulation defended by a Blue team. Having a Red team and a Blue team in place is the same scenario under which war games were being run on September 11, 2001. Our first question is why is the Israeli cybersecurity firm known as Cybereason running an exercise in America gaming different scenarios in which scores of Americans end up dead in their simulation? Here we have an Israeli cyber technology firm gaming terrorist scenarios in America preparing for the elections in 2020. Why is the Department of Homeland Security (DoHS) allowing this simulation to even go on as if equating elections in America would be compromised by terrorism? In the coming election how will you know what you are seeing and experiencing isn't fake? The purpose ultimately for Israel's cyber warfare firm Cybereason operating in America is for massive data collection so that at some point Israel will become the dominant cyber warfare superpower. Everyone has heard of "cyber warfare" correct? Now there is "cyber con." That's where you run a sophisticated "Russian hacking election" info commercial based on fear through a cooperative media to ramp up the artificially induced need to open the way for large investments in software and cyber security tech companies like Cybereason.

Nothing is worse than the US elections. Will Trump go down because of Iran like Carter did? (On the flip side, the US has always had a strange back-channel relationship with Iran.)

OPERATION BLACKOUT: Israel Hacking America 2020 (Video)
________

Source: Arutz Sheva

AI makes 'DeepFake' videos more difficult to detect

The latest in artificial intelligence: 'Deep Fake' videos.

June 8, 2019

AI Makes 'DeepFake' Videos More Difficult to Detect 
________


Source: Mint Press News

Why a Shadowy Tech Firm With Ties to Israeli Intelligence Is Running Doomsday Election Simulations

A shadowy tech firm with deep ties to Israeli intelligence and newly inked contracts to protect Pentagon computers is partnering with Lockheed Martin to gain unprecedented access to the heart of America’s democracy.

by Whitney Webb | 4 January 2020

Election Day 2020: 32 Americans dead, over 200 injured, martial law declared and the election itself is canceled. While this horrific scenario seems more like the plot of a Hollywood film, such was the end result of a recent simulation examining the preparedness of U.S. officials from the Federal Bureau of Investigation (FBI), the Department of Homeland Security (DHS) and the U.S. Secret Service against "bad actors" seeking to undermine the upcoming presidential election.

Yet, this simulation was not a government-organized exercise but was instead orchestrated by a private company with deep ties to foreign and domestic intelligence services, a company that is also funded by investors with clear connections to individuals who would stand to benefit if such a catastrophic election outcome were to become reality.

Much of the rhetoric since the last presidential election in 2016 has focused on the issue of foreign meddling by U.S. rival states like Russia, while China has emerged as the new "meddler" of choice in American corporate media as the 2020 election approaches. Though time has revealed that many of the post-2016 election meddling claims were not as significant as initially claimed, the constant media discussion of foreign threats to U.S. democracy and electoral processes – whether real or imagined – has undeniably created a climate of fear.

Those fears have since been preyed upon by neoconservative groups and the U.S. military-industrial complex, both of which are hardly known for their love of demcratic processes, to offer a series of ready-made solutions to these threats that actually undermine key pillars of American democracy, including independent reporting and voting machine software.

However, many of the very same media outlets and groups that frequently fretted about Russia, China or another rival state meddling in U.S. democracy have largely ignored the role of other nation states, such as Israel, in efforts to sway the last U.S. election in 2016 and meddle in numerous elections in Africa, Latin America and Asia in the years since.

As a consequence of this climate of fear, it should be hardly surprising that the corporate media lauded the recent 2020 election simulation that ended in an abysmal failure for U.S. officials, the cancellation of the U.S. election and the imposition of martial law. Yet, none of those reports on the exercise noted that the company that hosted the simulation, called Cybereason, is led by ex-members of Israel's military intelligence unit 8200, advised by former top and current officials in both Israeli military intelligence and the CIA. In addition, it is funded by and partnered with top U.S. weapons manufacturer and government contractor Lockheed Martin and financial institutions with clear and direct ties to Saudi Crown Prince Mohammed bin Salman and White House adviser and the president's son-in-law Jared Kushner. Also left unmentioned in media reports on Cybereason's election simulations is the fact that Cybereason's CEO, Lior Div, has openly admitted that he views his work at Cybereason as a "continuation" of his service to Israel's intelligence apparatus.

With Cybereason planning to host more simulations in cooperation with federal agencies as the U.S. election inches closer, a deeper exploration of this company, its ties to intelligence and military contractors in the U.S. and Israel and its financial ties to key Trump allies both domestically and abroad warrants further investigation.

In this two part series, MintPress will not only explore these aspects but also how many of the technologies wielded by the "bad actors" in the Cybereason election simulation have been pioneered and perfected, not by U.S. rival states, but by Israeli companies and start-ups with clear ties to that country’s intelligence apparatus.

Also notable is the fact that Cybereason itself has covertly become a major software provider to the U.S. government and military through its direct partnership with Lockheed Martin, which followed the defense company's decision to open an office at the Israeli military's new cyber operations hub in the Negev desert. In examining all of these interlocking pieces, a picture emerges of a potentially sinister motive for Cybereason's simulations aimed at gauging how U.S. federal officials respond to crisis situations on Election Day.

Understanding "Operation Blackout"

In early November, a team of "hackers" working for the private U.S.-based, Israeli-founded company Cybereason conducted a 2020 election simulation with members of various U.S. agencies, namely the DHS, FBI and the U.S. Secret Service. The simulation was organized by Cybereason and the law firm Venable and the U.S. agencies in attendance were invited and appear to not have been charged to participate.

The simulation, titled "Operation Blackout," was set in a fictional swing state called "Adversaria" and pitted "ethical hackers” from Cybereason against a team of federal and local law enforcement officials. The opposing teams were supervised by a "white team" composed of members of Cybereason's staff and Ari Schwartz — a former member of the White House's National Security Council and the National Institute of Standards and Technology (NIST) — who set the rules of the simulation and would ultimately decide its outcome. Schwartz also used to work for the Center for Democracy and Technology (CDT), a major backer of Microsoft's ElectionGuard software.

Operation Blackout did not involve hackers targeting election software or voting machines, instead, it focused on civilian infrastructure and psychological operations against the American citizens in the fictitious "Adversaria" on election day. The hacker team was led by Cybereason co-founder Yonathan Striem-Amit, a former contractor for Israeli government agencies and a former operative for the elite Israeli military intelligence Unit 8200, best known for its cyber offensives against other governments.

"In a country as fragmented as the US, the number of people needed to influence an election is surprisingly small," Striem-Amit told Quartz of the exercise. "We attempted to create havoc and show law enforcement that protecting the electoral process is much more than the machine."

Streim-Amit’s team completely devastated the U.S. law enforcement team in Operation Blackout by not only causing chaos but murdering numerous civilians. Hackers took control of city buses, ramming them into civilians waiting in line at polling stations, killing 32 and injuring over 200. They also took control of city traffic lights in order to cause traffic accidents, used so-called "deepfakes" to conduct psychological operations on the populace and created fake bomb threats posing as the terror group ISIS, which incidentally has its own ties to Israeli intelligence. Telecom networks and news outlets within the fictitious states were also hacked and flooded with deepfakes aimed at spreading disinformation and panic among U.S. citizens.

Please go to Mint Press News to read the entire article.
________


Japan's Softbank is a huge investor in these tech firms:

SoftBank is the 'Berkshire Hathaway of tech' despite WeWork debacle, Bernstein says


How is this supposed to work? Israel doesn't want to be "America's pawns in the Middle East?" Israel has walked off with enormous technological advantages removed from America and transferred to Israel, while America has bombed and destroyed every country around Israel over the past roughly 23 years. But of course this article is from the UK Independent, a known UK intelligence source. And while we're mentioning the UK, did anyone else notice the British ambassador Robert Macaire was arrested in Iran who is accused of inciting protests? Robert Macaire came out of the UK Ministry of Defense so it is a good bet he is British Intelligence operating as an "ambassador to Iran.

Israelis don't want to be America's pawns in the Middle East any longer. We've suffered enough


Have a look. These people can fake anything they want to and most people submissively accept this without being able to review or ascertain the actual evidence. Where is the evidence? Where is the document and why isn't it being made public? Who is the person or the people who put this alleged "terrorist threat warning" out?

Exclusive: Border Patrol Circulates Intel Alert Titled 'Suspected Suicide Bomber en Route to the U.S.'


Good interview on the material in the MPN article above:

DOOMSDAY ELECTION 2020: ISRAELI SPIES RUN DRILL PREDICTING OVERTHROW OF AMERICA


In all likelihood Jeffrey Epstein was used to extort concessions and for the blackmail purposes of US government, military and corporate leaders to extend the reach of Israel's dominance over cyber security and technology much to it removed from America and taken to Israel.

Mossad Used Jeffrey Epstein to Blackmail Politicians, Former Israeli Spy Claims

KOSHER COVER-UP: U.S. Ruling Class Hides Epstein’s Child Sex Blackmail Operation (Video)

Tragic: Footage Of Epstein Suicide Found Hanging In Cell


Ed.'s note: In geopolitics you can blame any country you want for any crime you can think of to further your own geopolitical goals of respective countries. You simply blame enemy hierarchies for the exact same thing you are guilty of yourself and is done all the time. All countries do it and they do it frequently and with impunity. In this case outlined in this article below, China is being blamed for hacking into telecommunications companies and stealing "gigabytes of information." Right out this article is fake news used to further guarantee future contracts for the Israeli tech firm Cybereason. Cybereason, can we have all the proof in the form of documentation and facts on this alleged Chinese hacking? And what about all the technology being provided to China through Israel? Not available are they? Yeah, that's what we thought.


Source: Cyber Scoop

Chinese spies have been sucking up call records at multinational telecoms, researchers say

Written by Sean Lyngaas | JUN 24, 2019 | CYBERSCOOP

Chinese hackers have hit the soft underbelly of global telecommunications companies to siphon off hundreds of gigabytes of data, according to an investigation by security company Cybereason.

The long-running hacking campaign, which has breached about 10 cellular providers in Africa, Europe, the Middle East and Asia, bears all the hallmarks of an intelligence operation, Cybereason researchers said. In one instance, the spies targeted roughly 20 customers of a cellular provider.

"No one siphons out hundreds of gigabytes of data about a very specific amount of individuals unless it's for intelligence [purposes]," said Amit Serper, principal security researcher at Cybereason, which published research on the campaign Tuesday. "The attackers knew exactly what they were after."

Cybereason declined to name the breached telecommunications providers, but said they had hundreds of millions of customers in total.

Since at least 2017, the hackers have burrowed their way, computer by computer, deep into the victim organizations until they had access to records that included caller location and identity, phone call length, and the amount of data sent between callers. The attackers eventually set up their own domain administration accounts and installed a virtual private network (VPN) on the victim's server – crowning themselves the "de facto shadow IT department" for the victim organization, Serper told CyberScoop.

Working backward from one of its customers, which was a victim, Cybereason traced the campaign to some nine other telecom firms. To do that, analysts dumped one of the hacking tools they found on their client's network and looked for clues buried in the code. Serper said he started to find the same code in other malware samples, and was able to stitch together a pattern by tracing the malware back to similar computer servers.

Cybereason analysts found hacking tools such as a modified web shell and a remote access trojan that are commonly associated with, but not unique to, Chinese hackers. While not ruling out a possible false flag or copycat, the analysts concluded with a "high level of certainty" that the campaign was state-sponsored and affiliated with China.

The Chinese Embassy in Washington did not respond to a request for comment.

Please go to Cyber Scoop to read the entire article.
________


Ed.'s note: Do you have a well paying job in Silicon Valley or with an American tech firm? Well, say good bye to your job because they are disappearing fast.

How NeoCon Billionaire Paul Singer Is Driving the Outsourcing of US Tech Jobs to Israel


Listen carefully:

FULL: Netanyahu Speech at 2019 Tel Aviv Cybertech Conference
 


Wait until the robots (CGI demo) show up on your front door as Israel is a world leader in robotics also leading in autonomous systems:

New Robot Makes Soldiers Obsolete (Corridor Digital) 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Looking into our circumstances...