Monday, December 21, 2020

Libyan bombmaker charged with 1988 Lockerbie 747 bombing


The US has announced charges against a Libyan suspected of making the bomb that blew up Pan Am Flight 103 over Lockerbie, Scotland, in 1988.

Abu Agila Mohammad Masud has been charged with terrorism-related crimes, Attorney General William Barr said on Monday, 32 years on from the atrocity.

The deadly bomb attack on the Boeing 747 killed 270 people, including 190 American citizens.

Prosecutors will seek the extradition of Mr Masud to stand trial in the US.

The attack on the London to New York flight remains the deadliest terrorist incident ever to have taken place in the UK, and the second deadliest air attack in US history.

Eleven people on the ground in Scotland were also killed. The victims included 35 study abroad US students who were returning home for Christmas.


The new charges bring Mr Barr's role in this lengthy terrorism investigation full circle, as he was also US Attorney General when charges were first announced against two Libyan suspects in 1991.

Back then, serving under President George H W Bush, Mr Barr tasked his criminal division head Robert Mueller to look into the bombing. Mr Mueller is now best known for leading the inquiry into Russian meddling in the 2016 presidential election.

Both Mr Barr and Mr Mueller have taken part in remembrance events with families over the years.

Police Scotland's chief constable, Iain Livingstone, said the charges were a "significant development" and that they will "continue to work closely" with the US and other international authorities. He said it was "inappropriate to comment further" at this time.


READ MORE HERE 

Friday, December 18, 2020

Hack may have exposed deep US secrets; damage yet unknown

 BOSTON (AP) — Some of America’s most deeply held secrets may have been stolen in a disciplined, monthslong operation being blamed on elite Russian government hackers. The possibilities of what might have been purloined are mind-boggling.

Could hackers have obtained nuclear secrets? COVID-19 vaccine data? Blueprints for next-generation weapons systems?

It will take weeks, maybe years in some cases, for digital sleuths combing through U.S. government and private industry networks to get the answers. These hackers are consummate pros at covering their tracks, experts say. Some theft may never be detected.

What’s seems clear is that this campaign — which cybersecurity experts says exhibits the tactics and techniques of Russia’s SVR foreign intelligence agency — will rank among the most prolific in the annals of cyberespionage.

U.S. government agencies, including the Treasury and Commerce departments, were among dozens of high-value public- and private-sector targets known to have been infiltrated as far back as March through a commercial software update distributed to thousands of companies and government agencies worldwide. A Pentagon statement Monday indicated it used the software. It said it had “issued guidance and directives to protect” its networks. It would not say — for “operational security reasons” — whether any of its systems may have been hacked.

On Tuesday, acting Defense Secretary Chris Miller told CBS News there was so far no evidence of compromise.

In the months since the update went out, the hackers carefully exfiltrated data, often encrypting it so it wasn’t clear what was being taken, and expertly covering their tracks.


Thomas Rid, a Johns Hopkins cyberconflict expert, said the campaign’s likely efficacy can be compared to Russia’s three-year 1990s “Moonlight Maze” hacking of U.S. government targets, including NASA and the Pentagon. A U.S. investigation determined the height of the documents stolen — if printed out and piled up — would triple the height of the Washington Monument.

In this case “several Washington Monument piles of documents that they took from different government agencies is probably a realistic estimate,” Rid said. “How would they use that? They themselves most likely don’t know yet.”

The Trump administration has not said which agencies were hacked. And so far no private-sector victims have come forward. Traditionally, defense contractors and telecommunications companies have been popular targets with state-backed cyber spies, Rid said.

Intelligence agents generally seek the latest on weapons technologies and missile defense s

ystems — anything vital to national security. They also develop dossiers on rival government employees, potentially for recruitment as spies.

President Donald Trump’s national security adviser, Robert O’Brien, cut short an overseas trip to hold meetings on the hack and was to convene a top-level interagency meeting later this week, the White House said in a statement.

O’Brien had been scheduled to return Saturday and had to scrap plans to visit officials in Italy, Germany, Switzerland and Britain, said an official familiar with his itinerary who was not authorized to discuss it and spoke on condition of anonymity.

Earlier, the White House said a coordinating team had been created to respond, including the FBI, the Department of Homeland Security and the Office of the Director of National Intelligence.

At a briefing for congressional staffers Monday, DHS did not say how many agencies were hacked, a reflection of how little the Trump administration has been sharing with Congress on the case.
Critics have long complained that the Trump administration failed to address snowballing cybersecurity threats — including from ransomware attacks that have hobbled state and local governments, hospitals and even grammar schools.

“It’s been a frustrating time, the last four years. I mean, nothing has happened seriously at all in cybersecurity,” said Brandon Valeriano, a Marine Corps University scholar and adviser to the Cyber Solarium Commission, which was created by Congress to fortify the nation’s cyber defenses. “It’s tough to find anything that we moved forward on at all.”

Trump eliminated two key government positions: White House cybersecurity coordinator and State Department cybersecurity policy chief.


READ MORE HERE

LinkWithin

Blog Widget by LinkWithin