Category Archives: cybersecurity

From the Web 2021

2021-08-10: A Simple Test for the Extent of Vote Fraud with Absentee Ballots in the 2020 Presidential Election: Georgia and Pennsylvania Data by John R. Lott, December 2020 remains the top paper on SSRN!

2021-07-10: From the WSJ, Dec 2016 (https://archive.is/DuwAF):

“In January 2015, the CIA account tweeted in Russian, to note how the spy network sneaked Russian copies of Boris Pasternak’s banned “Dr. Zhivago” into the Soviet Union during the Cold War. First it had to notify recipients who might misinterpret the significance of a CIA tweet in Russian. “We told our colleagues ahead of time so they wouldn’t be confused or afraid we were hacked,” said CIA social media manager Carolyn Reams.”

Notice the tender relationships between John Brennan and his “colleagues” in Russia in 2015. Warning them about a tweet citing a well known Russian author. And why would they be afraid that the CIA were hacked?

Continue reading From the Web 2021

SolarWinds Malware

Malware, distributed by SolarWinds Orion software updates, infected the networks of the White House, the DOJ, the State Department, NASA, NSA, the military, the top IT and telecommunications companies, and most of the Fortune 500 companies. Foreign governments and private companies have been hit, too. In total, up to 18,000 large entities have been infected by the malware.

The perpetrators of this malware attack were SolarWinds employees, not any outside party.

The idea that the malware was not inserted by SolarWinds employees, but by outside attackers is preposterous and not supported by any evidence. The one and only source of this allegation is FireEye’s blog, which also claims that there is a nation-state behind the attack, without naming it. Remarkably, when filing the special SEC report on the subject, FireEye did not directly repeat this claim, but stated that it is on the company’s blog. SolarWinds, who should know for certain how the company became a malware distributor, refused to directly support this theory, but hinted at it: “On Saturday, December 12, our CEO was advised by an executive at FireEye of a security vulnerability in our Orion Software Platform … While security professionals and other experts have attributed the attack to an outside nation-state, we have not independently verified the identity of the attacker.

The call that he alleged nation-state is Russia was made by the media without any evidence for purely political reasons. Then these allegations have been repeated in an echo-chamber and circularly referenced.

The motives of the SolarWinds employees behind the malware creation and distribution could be numerous, from opposition to President Trump, to aiding espionage by foreign nation-state(s). Ordinary criminal interest cannot be excluded. Continue reading SolarWinds Malware

Recently Published

Big Tech and IT Security was published in the American Thinker on December 16.

UVB Activation of AMPs Production in the Skin and the Innate Respiratory Immunity has been published in WUWT today, November 29. Yes, we do need exposure to the UVB to maintain healthy immune system against COVID-19 and other respiratory infections. Vitamin D supplementation does not replace sunlight. Moderate exposure to sunlight is beneficial, not harmful. Blacks and other dark-skinned folks need more sunlight, and have been hit by the ozone hoax worse than others. The current increase in COVID-19 hospitalizations is likely caused by decrease in the UVB exposure. Lockdowns aggravate the situation. Continue reading Recently Published

Did Microsoft betray the US in exchange for Russian visas?!

Microsoft, Google, Facebook, and Twitter consider themselves supranational corporations. When they speak of “securing democracy,” they mean removal of Trump, or “prevention of another Trump situation.” Microsoft had no problem in colluding with the Russian government and acting under its directions in the US, even at the height of the anti-Russian hysteria. Continue reading Did Microsoft betray the US in exchange for Russian visas?!

Dominion Voting Systems is Caught

Dominion Voting Systems’ Democracy Suite has features that allow for election results manipulation. The back-end software has an elections results editor, called Results Tally and Reporting (RTR). Its users are election officials. RTR is an equivalent of Microsoft Excel, but for election results. The software allows its users to enter “election results” from removable memory cards, local file system, and network. It allows you to merge multiple election results files. It allows the users to manually edit election result files. It allows users to reject election results files. In other words, it allows arbitrary change of results. 

RTR runs not on a voting machine, but on an ordinary Windows laptop, which can be connected to the Internet, and even controlled remotely.

The Dominion’s training video (https://www.dominionvoting.com/training/rtr/index.html) has a subsection Flexible management of results after the election occurred (starting at 4:20). Look at a few screenshots from it: Continue reading Dominion Voting Systems is Caught

Shocking History of Dominion Voting

2020-11-15 update: since 2009, Dominion Voting Systems operated from 215 Spadina Ave., Toronto, ON, M5T 2C7,Canada – an office space of the radical Tides Foundation. This building houses (or housed until a few months ago) a Toronto office of Tides Canada and a Tides’ incubation space for leftist groups.

Dominion Voting Systems Corp. is the Canadian company behind the ballot switching software.

Dominion was founded in 2003, with a mission to provide electronic voting systems friendly for progressives. Because of such partisanship, it languished with almost no customers for the next 5-6 years, until the Obama administration came to power. In 2010, the Obama administration confiscated electronic voting systems assets (software, intellectual property, manufacturing tools, customer base, etc.) from two established American companies, and gave them to Dominion. At the same time, Dominion got some employees and assets from a foreign EVS company, tied to Hugo Chavez.  Continue reading Shocking History of Dominion Voting

Rigging Voting Machines by Woke Left is a Big Threat

The biggest threat to this election’s integrity:  voting machines might be hacked or rigged, maliciously re-programmed by leftist software engineers, current or prospective employees of Big Tech or its partners. Remember how much praise the fake news media showered on the content moderator Bahtiyar Duysak who de-platformed Trump off twitter for 10 minutes? He also worked for Google.

The Twitter employee who deactivated POTUS’ account on twitter was praised. Now imagine the praise showered on a voting machine saboteur, who “de-platforms” Trump from the Presidency!

Why is Critical IT and Communications Infrastructure Insecure?

Google Search, YouTube, Facebook, and Twitter are communications services which have become central part of the critical national infrastructure. These services are owned by Alphabet Inc (GOOG), Facebook Inc. (FB), and Twitter Inc. (TWTR). The federal government gives the critical infrastructure special protection. Currently, the Department of Homeland Security designates sixteen Critical Infrastructure Sectors, because they are vital to the United States. Google Search, YouTube, Facebook, and Twitter appear to fall within two of these designated sectors: Information Technology and Communications. Other sectors include Dams; Defense Industrial Base; Nuclear Reactors, Materials, and Waste. Most of the plants and services in these sectors are owned by private corporations. The ownership does not allow them or their employees to misuse them or to threaten their integrity or functionality. The federal government must secure IT and communications infrastructure and hence must protect Twitter service from abuse by Twitter Inc., its CEO Jack Dorsey, and their woke employees in the same way as it protects nuclear power plants. The same applies to Facebook, YouTube, Google Search, and a few other services, operated by Big Tech. A smooth operation of these services is especially important during the current state of national emergency, declared due to the COVID-19 pandemic. Continue reading Why is Critical IT and Communications Infrastructure Insecure?

Do Obama Tech Holdovers Sabotage Congressional Websites?

Speaking of alternative realities. The HPSCI website intelligence.house.gov is apparently operated in a malicious way: hiding and disrupting access to Committee reports and other documents from when it had a Republican majority and content that reflected the views of Republican members. The website readily shows only documents expressing views of the Democrats. This was happening even before the House majority changed from Republicans to Democrats. Continue reading Do Obama Tech Holdovers Sabotage Congressional Websites?

FBI Warned the DNC about Hacking 30 Times

2019-06-21 update: crooked DC prosecutors in Roger Stone’s case wrote:

Stone asserts that the government did not “collect[] any evidence of the DNC breach directly” or “independently verify” the findings of Company 1 about Russia’s involvement in the hack of DNC computer systems. … That statement is incorrect.

Company 1 is assumed to be CrowdStrike (CRWD). The FBI Response to Intelligence Committee shows that that statement is correct. The FBI has not only taken the CrowdStrike’s word in place of the evidence, but uncritically adopted its methodology and even terminology! And even there they made mistakes – Fancy Bear and Cozy Bear became FancyBear and CozyBear! Also, see a different rebuttal by Adam Carter.

CrowdStrike was first hired by the DNC in December 2015 to investigate disagreement about access to NGP VAN by Sanders staffers. Then Barack Obama appointed CrowdStrike’s general counsel Steven Chabinsky, former assistant director to the FBI Director Robert Mueller, to the Commission on Enhancing National Cybersecurity. Then the DNC hired CrowdStrike to investigate (or to pretend investigating) its network breach. Then the Obama administration used the DNC/CrowdStrike allegations to spy on and to sabotage the Trump campaign. CrowdStrike and Steele (Fusion GPS) reports have been coordinated by the DNC through its law firm Perkins Coie. Continue reading FBI Warned the DNC about Hacking 30 Times

In American Thinker: The External Roots of Spygate

My article The External Roots of Spygate is published in the American Thinker.

On another topic – the putative “Russian government hacker group” Fancy Bear / APT 28 / GRU Military Units 26165 and/or 74455, according to the mythologies of CrowdStrike (CRWD) / FireEye (FEYE) / Robert Mueller & Angry Democrats (MAD), respectively. From Wired (August 2017):

Since as early as last fall, the Russian hacker group known as APT28, or Fancy Bear, has targeted victims … including its breach of the Democratic National Committee ahead of last year’s election. Last month, FireEye says those hackers, believed to be associated with the Russian military intelligence service GRU, have begun to use EternalBlue, the leaked NSA hacking tool

Anybody applying methodology of CrowdStrike and FireEye would identify “Fancy Bear / APT28” as an American government hacking group with much higher confidence than they have identified it as a Russian one. This is a contradiction, proving that their identification/attribution methodology is wrong.

Kudos to TheForensicator

The latest analysis of the WikiLeaks DNC emails by TheForensicator tends to confirm the opinion that at least the emails, published by WikiLeaks in July 2016, were leaked by a DNC insider who was an unhappy Bernie supporter.

  • The emails were apparently extracted from a Microsoft Exchange email server on May 23-25. This was the time when Hillary’s victory became obvious, and the Bernie supporters were angry at the DNC for supposed cheating. (Sample media reporting: https://www.latimes.com/politics/la-na-clinton-sanders-democrats-20160516-snap-story.html)
  • Only emails from seven accounts were extracted and transferred to WikiLeaks. Five out of seven were finance directors’. That suggests that the leaker was not only a DNC insider, but a high placed insider with confident knowledge of the DNC’s internal workings.

Sources on How the DNC Faked “Russian Interference”

This post expands my article “Russian Interference” Didn’t Happen in the American Thinker.

The DNC Used its Hack to Entrap Trump

The DNC and CrowdStrike Destroyed Evidence in June 2016

The Support for the “Russian Hacking” Theory Came from EU Intel

Steele was Known to the State Department as an Unreliable Source

The DNC, Hillary’s Campaign & FBI Colluded with Ukraine against Trump

The DNC, Hillary’s Campaign & the Obama administration attempted to Collude with Russia

The Obama Administration Hid its “Russian” Activities from Congressional Republicans

Misc Continue reading Sources on How the DNC Faked “Russian Interference”

Karim Baratov and cyber incidents misattribution

This case of Karim Baratov is another refutation of the conspiracy theory of cyber incident attribution. This theory lamps together multiple network security breaches, performed by many unrelated individuals or small groups. Then it attributes these breaches to a small number of alleged government backed hacker groups. This theory was introduced by CrowdStrike, and promoted by CrowdStrike and FireEye (FEYE). One of apparently decent attribution criterias is use of the same network infrastructure — domain names and/or IP addresses — in multiple breaches. But even this criteria doesn’t work, because cyber criminals specialize and divide labor vertically. Spear-phishing incidents using the same deceptive domain and/or IP address are not necessarily connected to a single beneficiary entity. An owner of the domain name can steal passwords from many victims for many unrelated clients, knowing nothing about the clients, like this case.  Continue reading Karim Baratov and cyber incidents misattribution