• The Shadow Brokers - When The Hunters Became The Hunted (2/2)

    From LowRider44M@1:229/2 to All on Monday, November 13, 2017 13:06:03
    [continued from previous message]

    Mr. Martin’s gargantuan collection of stolen files included much of what the Shadow Brokers have, and he has been scrutinized by investigators as a possible
    source for them. Officials say they do not believe he deliberately supplied the
    material,
    though they have examined whether he might have been targeted by thieves or hackers.

    But according to former N.S.A. employees who are still in touch with active workers, investigators of the Shadow Brokers thefts are clearly worried that one or more leakers may still be inside the agency. Some T.A.O. employees have been asked to turn
    over their passports, take time off their jobs and submit to questioning. The small number of specialists who have worked both at T.A.O. and at the C.I.A. have come in for particular attention, out of concern that a single leaker might be responsible for
    both the Shadow Brokers and the C.I.A.’s Vault7 breaches.

    Then there are the Shadow Brokers’ writings, which betray a seeming immersion
    in American culture. Last April, about the time Mr. Williams was discovering their inside knowledge of T.A.O. operations, the Shadow Brokers posted an appeal to President
    Trump: “Don’t Forget Your Base.” With the ease of a seasoned pundit, they
    tossed around details about Stephen K. Bannon, the president’s now departed adviser; the Freedom Caucus in Congress; the “deep state”; the Alien and Sedition Acts; and
    white privilege.

    “TheShadowBrokers is wanting to see you succeed,” the post said, addressing
    Mr. Trump. “TheShadowBrokers is wanting America to be great again.”

    The mole hunt is inevitably creating an atmosphere of suspicion and anxiety, former employees say. While the attraction of the N.S.A. for skilled operators is unique — nowhere else can they hack without getting into legal trouble —
    the boom in
    cybersecurity hiring by private companies gives T.A.O. veterans lucrative exit options.
    Got a confidential news tip?

    The New York Times would like to hear from readers who want to share messages and materials with our journalists.

    Young T.A.O. hackers are lucky to make $80,000 a year, while those who leave routinely find jobs paying well over $100,000, security specialists say. For many workers, the appeal of the N.S.A’s mission has been more than enough to make up the
    difference. But over the past year, former T.A.O. employees say an increasing number of former colleagues have called them looking for private-sector work, including “graybeards” they thought would be N.S.A. lifers.

    “Snowden killed morale,” another T.A.O. analyst said. “But at least we knew who he was. Now you have a situation where the agency is questioning people who have been 100 percent mission-oriented, telling them they’re liars.”

    Because the N.S.A. hacking unit has grown so rapidly over the past decade, the pool of potential leakers has expanded into the hundreds. Trust has eroded as anyone who had access to the leaked code is regarded as the potential culprit.

    Some agency veterans have seen projects they worked on for a decade shut down because implants they relied on were dumped online by the Shadow Brokers. The number of new operations has declined because the malware tools must be rebuilt. And no end is in
    sight.

    “How much longer are the releases going to come?” a former T.A.O. employee asked. “The agency doesn’t know how to stop it — or even what ‘it’ is.”

    One N.S.A. official who almost saw his career ended by the Shadow Brokers is at
    the very top of the organization: Adm. Michael S. Rogers, director of the N.S.A. and commander of its sister military organization, United States Cyber Command. President
    Barack Obama’s director of national intelligence, James R. Clapper Jr., and defense secretary, Ashton B. Carter, recommended removing Admiral Rogers from his post to create accountability for the breaches.

    But Mr. Obama did not act on the advice, in part because Admiral Rogers’s agency was at the center of the investigation into Russia’s interference in the 2016 election. Mr. Trump, who again on Saturday disputed his intelligence agencies’ findings
    on Russia and the election, extended the admiral’s time in office. Some former intelligence officials say they are flabbergasted that he has been able to hold on to his job.

    A Shadow War With Russia?

    Lurking in the background of the Shadow Brokers investigation is American officials’ strong belief that it is a Russian operation. The pattern of dribbling out stolen documents over many months, they say, echoes the slow release of Democratic emails
    purloined by Russian hackers last year.

    But there is a more specific back story to the United States-Russia rivalry.

    Starting in 2014, American security researchers who had been tracking Russia’s state-sponsored hacking groups for years began to expose them in a series of research reports. American firms, including Symantec, CrowdStrike and
    FireEye, reported that
    Moscow was behind certain attacks and identified government-sponsored Russian hacking groups.

    In the meantime, Russia’s most prominent cybersecurity firm, Kaspersky Lab, had started work on a report that would turn the tables on the United States. Kaspersky hunted for the spying malware planted by N.S.A. hackers, guided in part by the keywords
    and code names in the files taken by Mr. Snowden and published by journalists, officials said.

    Kaspersky was, in a sense, simply doing to the N.S.A. what the American companies had just done to Russian intelligence: expose their operations. And American officials believe Russian intelligence was piggybacking on Kaspersky’s efforts to find and
    retrieve the N.S.A.’s secrets wherever they could be found. The T.A.O. hackers knew that when Kaspersky updated its popular antivirus software to find
    and block the N.S.A. malware, it could thwart spying operations around the world.

    So T.A.O. personnel rushed to replace implants in many countries with new malware they did not believe the Russian company could detect.

    In February 2015, Kaspersky published its report on the Equation Group — the company’s name for T.A.O. hackers — and updated its antivirus software to uproot the N.S.A. malware wherever it had not been replaced. The agency temporarily lost access
    to a considerable flow of intelligence. By some accounts, however, N.S.A. officials were relieved that the Kaspersky report did not include certain tools
    they feared the Russian company had found.

    As it would turn out, any celebration was premature.

    On Aug. 13 last year, a new Twitter account using the Shadow Brokers’ name announced with fanfare an online auction of stolen N.S.A. hacking tools.

    “We hack Equation Group,” the Shadow Brokers wrote. “We find many many Equation Group cyber weapons.”

    Inside the N.S.A., the declaration was like a bomb exploding. A zip file posted
    online contained the first free sample of the agency’s hacking tools. It was immediately evident that the Shadow Brokers were not hoaxsters, and that the agency was in
    trouble.

    The leaks have renewed a debate over whether the N.S.A. should be permitted to stockpile vulnerabilities it discovers in commercial software to use for spying
    — rather than immediately alert software makers so the holes can be plugged. The agency
    claims it has shared with the industry more than 90 percent of flaws it has found, reserving only the most valuable for its own hackers. But if it can’t keep those from leaking, as the last year has demonstrated, the resulting damage to businesses and
    ordinary computer users around the world can be colossal. The Trump administration says it will soon announce revisions to the system, making it more transparent.

    Mr. Williams said it may be years before the “full fallout” of the Shadow Brokers breach is understood. Even the arrest of whoever is responsible for the
    leaks may not end them, he said — because the sophisticated perpetrators may have built a “
    dead man’s switch” to release all remaining files automatically upon their arrest.

    “We’re obviously dealing with people who have operational security knowledge,” he said. “They have the whole law enforcement system and intelligence system after them. And they haven’t been caught.”

    --- SoupGate-Win32 v1.05
    * Origin: www.darkrealms.ca (1:229/2)