{"id":188740,"date":"2017-04-21T02:09:00","date_gmt":"2017-04-21T06:09:00","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/is-there-a-russian-mole-inside-the-nsa-the-cia-both-daily-beast\/"},"modified":"2017-04-21T02:09:00","modified_gmt":"2017-04-21T06:09:00","slug":"is-there-a-russian-mole-inside-the-nsa-the-cia-both-daily-beast","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/is-there-a-russian-mole-inside-the-nsa-the-cia-both-daily-beast\/","title":{"rendered":"Is There a Russian Mole Inside the NSA? The CIA? Both? &#8211; Daily Beast"},"content":{"rendered":"<p><p>  The latest leak by the Shadow Brokers hackers exposed classified  information that could only have come from within the NSA,  setting the stage for a Cold War ritualthe mole hunt.<\/p>\n<p>      A message from Vladimir Putin can take many forms.    <\/p>\n<p>      It can be as heavy-handed as a pair of Russian bombers      buzzing the Alaska coast, or as lethal as the public       assassination of a defector on the streets of Kiev. Now      Putin may be sending a message to the American government      through a more subtle channel: an       escalating series of U.S. intelligence leaks that last      week exposed a National Security Agency operation in the      Middle East and the identity of an agency official who      participated.    <\/p>\n<p>      The leaks by       self-described hackers calling themselves the Shadow      Brokers began in the final months of the Obama      administration and increased in frequency and impact after      the       U.S. bombing of a Syrian airfield this montha move that            angered Russia. The group has not been tied to the      Kremlin with anything close to the forensic certitude of last      years election-related hacks, but security experts say the      Shadow Brokers attacks fit the pattern established by      Russias GRU during its election hacking. In that operation,      according to U.S. intelligence findings, Russia created      fictitious Internet personas to launder some of their stolen      emails, including the fake whistleblowing site called DCLeaks      and a notional Romanian hacker named Guccifer      2.0.    <\/p>\n<p>      I think theres something going on between the U.S. and      Russia that were just seeing pieces of, said security      technologist Bruce Schneier, chief technology officer at IBM      Resilient. What happens when the deep states go to war with      each other and dont tell the rest of us?    <\/p>\n<p>      The Shadow Brokers made their debut in August, appearing out      of nowhere to publish a set of secret hacking tools belonging      to the Equation Groupthe security industrys name for the      NSAs elite Tailored Access Operations program, which      penetrates foreign computers to gather intelligence. At that      time, the Shadow Brokers claimed to be mercenary hackers      trying to sell the NSAs secrets to the highest bidder. But      they went on to leak more files for free, seemingly timed      with the public thrusts and parries between the Obama      administration and the Russian government.    <\/p>\n<p>      From the start, outside experts had little doubt that Russian      intelligence was pulling the strings. Circumstantial      evidence and conventional wisdom indicates Russian      responsibility, exiled NSA whistleblower Edward Snowden      tweeted last August. Why did they do it? No one knows, but I      suspect this is more diplomacy than intelligence, related to      the escalation around the [Democratic National Committee]      hack.    <\/p>\n<p>      The FBI started investigating, and in August agents       arrested an NSA contractor named Hal Martin after      discovering that Martin had been stockpiling agency secrets      in his house for two decades. But even as Martin cooled his      heels in federal custody, the Shadow Brokers continued to      post messages and files.    <\/p>\n<p>      Snowden and other experts speculated that the Russians      obtained the code without the help of an insider. As a matter      of tradecraft, intelligence agencies, including the NSA,      secretly own, lease, or hack so-called staging servers on the      public internet to launch attacks anonymously. By necessity,      those machines are loaded up with at least some of the      agencys tools. Snowden theorized that the Russians      penetrated one of those servers and collected an NSA jackpot.      NSA malware staging servers getting hacked by a rival is not      new, he wrote.    <\/p>\n<p>      Whatever their origin, the leaks dried up on Jan. 12, when      the Shadow Brokers announced their retirement 10 days      before Donald Trumps swearing-in. The group didnt reemerge      until this month, after the Syrian militarys deadly      chemical-weapons attack in Ghouta. Reportedly moved by images      of the Syrian children injured or killed in the attack, Trump      responded by ordering the launch of 59 Tomahawk missiles at a      Syrian government air basedeparting drastically from the      will of Putin, who considers Syrian President Bashar al-Assad      a strategic ally.    <\/p>\n<p>      The Russian government immediately condemned the U.S.      response. Two days later, so did the Shadow Brokers. The      group broke its months-long silence and released another      tranche of NSA secrets along with a lengthy open letter to      Trump protesting the Syrian missile strike. Abandoning any      pretense of a profit motive, the Shadow Brokers claimed now      to be disillusioned U.S. votersthe peoples who getting you      elected, as they put in, using phrasing that holds dual      meaning coming from a suspected Kremlin operation.    <\/p>\n<p>      The Shadow Brokers have been playing hardball ever since.      Their most recent release, on Friday, exposed the code for a      sophisticated NSA toolkit targeting Windows machines, putting      some of the agencys capabilities, circa 2013, in the hands      of every newbie hacker able to use a keyboard.    <\/p>\n<p>      This time, the Shadow Brokers didnt stop with code. For the      first time in their short history, they also released      internal NSA spreadsheets, documents, and slide decks, some      bedecked with the insignia and Top Secret markings familiar      to anyone whos browsed the Snowden leaks.    <\/p>\n<p>          Thank You!        <\/p>\n<p>          You are now subscribed to the Daily Digest and Cheat          Sheet. We will not share your email with anyone for any          reason        <\/p>\n<p>      The leak exposes in detail a 2013 NSA hacking operation      called Jeep Flea Market that gained deep access to      Dubai-based EastNets, a company that handles wire transfers      for a number of Middle East banks, something of obvious      interest to U.S. intelligence. (EastNets denies the breach.) But the Shadow      Brokers exposed more than just an NSA operation. Metadata      left in the files identified the full name of a 35-year-old      NSA worker in San Antonio who was apparently involved in the      hack. (The Daily Beast was unable to reach him for comment.)    <\/p>\n<p>      NSA hackers dont face the same danger as CIA officers      working undercover in a foreign country, but the likelihood      that Russia has begun exposing them by name, while linking      them to specific operations, raises the stakes for the      intelligence community. If nothing else, the San Antonio NSA      worker could plausibly face criminal and civil charges in the      United Arab Emirates, just as hackers working for Russian and      Chinese intelligence have been indicted in the U.S.    <\/p>\n<p>      Its conceivable that the Shadow Brokers included the name by      mistake. Groups like WikiLeaks and the journalists with the      Snowden cache are accustomed to scrubbing identifying      metadata from documents. But a less-experienced hand might      overlook it. Schneier is doubtful. If were assuming an      intelligent and strategic actor, which I think we are, then      you have to assume that they did that on purpose, he said.    <\/p>\n<p>      Nothing is certain; the Shadow Brokers are a puzzle with      missing pieces. But Fridays Shadow Brokers release      obliterated one theory on the spot. The NSA would never have      put classified spreadsheets and PowerPoint slides on a      staging server. They could only have come from inside the      NSA.    <\/p>\n<p>      Which sets the stage for a revival of a storied Cold War      intelligence ritual, with the declining agency morale that      comes with it: the Russian mole hunt. I think were most      likely looking at someone who went rogue from within, or a      contractor who had access to this information, said Eric      ONeill, national-security strategist for Carbon      Black. Either way, we have someone in the intelligence      community thats a pretty high-placed spy.    <\/p>\n<p>      A former FBI surveillance specialist, in 2001 ONeill helped      bring down Robert Hannsen, a double agent in the bureau whod      been secretly spying for Russia. The FBI must be scrambling      right now, he said. Theres so many leaks going on: this      leak, the CIA Vault7 leaks, and at the same time theres the      investigation into any administration ties to Russia, and the      DNC intrusion, and all these leaks coming out of the White      House. Theres only so much that the FBIs national security      agents can do.    <\/p>\n<p>      If Russia did have a mole inside the NSA in 2013, the most      recent date of the documents, Schneier thinks it unlikely      that it does now, or else the Shadow Brokers wouldnt exist.      You only publish when its more useful as an embarrassment      than as intelligence, he said. So if you have a human asset      inside the NSA, you wouldnt publish. That asset is too      important.    <\/p>\n<p>      Its also possible, though unprecedented in the public      record, that Russia found a way into the NSAs classified      network. A competing theory focuses on the FBIs early      suspect, Hal Martin. Hes not the Shadow Brokers, but he      reportedly worked in the NSAs Tailored Access Operations      program and had 50,000 gigabytes of classified material in      his home. Might he himself have been hacked? Martin is      charged in Maryland with 20 counts of willful retention of      national defense information, but prosecutors have not made      any accusation that his trove slipped into enemy hands.    <\/p>\n<p>      As Snowden demonstrated when he walked out of the NSA with a      thumb drive of secrets, its comparatively easy now to steal      and smuggle classified information. But ONeill says the      FBIs counterintelligence mission is easier too, because of      the rampant audit trails and server logs in classified      networks.    <\/p>\n<p>      Its much easier getting the secrets out now, but on the      flip side, its also easier for law enforcement and the FBI      to track down who had access to the data, he says. I like      to think this mole hunt is going to be a little easier than      it was in the past.    <\/p>\n<p>      Until then, expect the Shadow Brokers to stick around. In      their Friday dump, they hinted at more revelations this week:      Who knows what we having next time?    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.thedailybeast.com\/articles\/2017\/04\/20\/is-there-a-russian-mole-inside-the-nsa-the-cia-or-both.html\" title=\"Is There a Russian Mole Inside the NSA? The CIA? Both? - Daily Beast\">Is There a Russian Mole Inside the NSA? The CIA? Both? - Daily Beast<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The latest leak by the Shadow Brokers hackers exposed classified information that could only have come from within the NSA, setting the stage for a Cold War ritualthe mole hunt. A message from Vladimir Putin can take many forms <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/is-there-a-russian-mole-inside-the-nsa-the-cia-both-daily-beast\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-188740","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/188740"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=188740"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/188740\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=188740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=188740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=188740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}