Curious article on arrests and NATO cyber-hacking in Italian news

Thank you Gary for the translation:

From the image below:

Defense in the Crosshairs

A hacker at Leonardo arrested . Worked for NATO and PM

D’Elia was consultant for the group. Removed 100,000 files. “Sensitive and military data saved” House arrest also for an employee
-by Claudio Antonelli

An “earthquake” in the world of cybersecurity. A raid by the Prosecutor’s (Office) in Naples has resulted in house arrest for an interim consultant and an employee of Leonardo directly employed at the CERT. (Cyber emergency readiness team), The division that is assigned to block hacker intrusions. The accusation by the Public Prosecutor is very serious. It is believed that for two consecutive years, he (penetrated) 33 computers used at the establishment of Pomigliano d’Arco, used by employees of Leonardo and approximately another 60 used from outside or other companies like Alcatel.

“It has emerged, in fact,
Inset: According to the prosecutor a trojan was used in the computers of Pomigliano d’Arco
……that the malicious software , in the statement released by Prosecutor Giovanni Melillo, for a year, the husband of English ambassador, Jill Morris, “acted like a true trojan of new engineering, inoculated through the insertion of a small USB key in the personal computers being spied on, in a way as to automatically forward each action of the operating system.”

In practice, it was possible for the hacker to intercept what was typed on the keyboard of the infected (computer) station and capture the frames, making a sort of screenshot.
The investigations finally have allowed the reconstruction of the “anti-forensic” activity of the attacker, who, connecting it to the command and control center of the website “fujinama”, after downloading the stolen data, remotely cancelled each trace on the compromised machines.

“The informatic attack, thus carried out, according to the reconstruction by the communications police is classified as extremely serious given the persistence and length of time, the statement continues. According to the charges, over 100,000 files are believed to have been taken from just 33 computers, equal to at least 10 gigabytes of data, chiefly from Leonardo.

The company, for its part, has released a statement pointing out that the activity relative to the site of Pomigliano is not of a military nature and that “ classified or strategic data is handled in segregated areas without connectivity, and therefore, not present in the establishment.” According to Verita, in the network of illegal fishing, there is no end of sensitive files for national security, so much that in these months of investigation, the Dis.* (Sistema di Informazione per la Sicurezza della Repubblica) would not have been alerted.

To understand, however, the exact contours of the matter will be difficult Giving the alert was the same giant (Leonardo) led by Alessandro Profumo, reporting (in January 2017) devious flows coming from computers in use at the establishment where they insist that Boeing, for over a year, was interested in a partnership with the Chinese of Comac. Verita is able to reveal that the representative of the company to conduct the investigation was reportedly Antonio Rossi, among the responsible persons at Cert. who, however, has ended up under house arrest charged with corrupting the tests.

Finally, to stir interest from a journalistic point of view, there is the name of another protagonist of the story, as of yesterday, under house arrest with the even heavier charge of illegal access, illegal intercepts, and illicit handling of data. This is Arturo D’Elia, certainly not a novice in the field of cybersecurity. Over the years, he is believed to have worked for several Italian prosecutors’ offices and for other sensitive companies. Like Alenia Aermachi and Alcatel. Now an injured party of the Naples case. In the curriculum of the expert, there are “spicier” jobs. From 2010-2015, he was a consultant for NCI, the government agency of NATO, concerned with cybersecurity, missile defense, and NATO information technology systems spread around the globe. Work that has brought him considerable expertise (or money?) given that he was reportedly tapped in the past with piercing the security of an Alliance site on Italian territory.
If that isn’t enough to comprehend the weight (importance) of D’Elia, it is helpful to take a further step back in his resume to the beginning of his activity.

He himself on Linkedin states that he has lent his consultant services to Afosi. The acronym will not say much to most (people). This is the Air Force Office of Special Investigation, with its base at Quantico. Translated: The counter espionage of American aviation. We don’t have knowledge if what is stated in Linkedin is true. For sure, if D’Elia decided to talk to investigators , he could say a lot about his cyber capacity.

It remains to be understood what caused the sudden acceleration of handcuffs (arrests) in a case initiated almost three years ago. And that it happened at a very delicate moment for the world of Defense and geopolitics in general. Change of presidents beyond the Ocean and Europe confronts a delicate transition destined to modify the (particulars) of numerous bi-lateral relations on four corners of the Continent.

[Some of this doesn’t make perfect sense. If anyone who speaks Italian wishes to add corrections to this, please post them in the comments. Thank you Gary for the work on this.]

Geopolitics: Leftists in US Intel and more

1. October 10th, Paris: Antifa does major demonstration against the leftist leader, showing it doesn’t matter one bit who wins or loses elections. Their goal is the take down of the entire system.

2. This one seems a bit technical at first but read it through. “active and former US agents” blew an operation where Israel and the US worked together to neutralize a very serious Russian cyber-op against us all.

This Twitter feed seems worth following on this, and possibly other related issues.

And the world became a little less private and in the hands of worse people

Shadow Brokers hackers release NSA hacking tools to punish Trump for ‘abandoning’ his base

(This story passed vetting)

Hacking group Shadow Brokers has released the password to a trove of NSA exploits in what they say is a form of protest against President Donald Trump for going back on his campaign promises, and warning the president, “Don’t forget your base.”

The shadowy group first emerged last August and released hacking exploits used by the NSA’s Equation Group, which included vulnerabilities in firewall products, and a list of IP addresses the NSA had exploited, which the group released at a later date.


Wait, who is influencing foreign elections?

The Democrat party, President Obama and leftist media (afraid the party is over and they may have to return to real journalism instead of crony-stenography) have been trumpeting that the Russians hacked DNC emails and influenced the election towards Trump.

No evidence has been provided for this claim, leading one to suspect its merely a tactic to disenfranchise the incoming president, and add gravitas to the shadow government it looks a lot like Obama is setting up in his new office building in DC.

But what about Obama’s attempts, successful and not, to subvert democracy in other countries?

Starting locally at the Globe & Mail:

Justin Trudeau’s Liberals have quietly been getting regular advice from Jennifer O’Malley Dillon, Barack Obama’s deputy campaign manager in the last U.S. presidential campaign.

Somewhat more openly, Tom Mulcair’s New Democrats have been receiving guidance from Jeremy Bird, who was Mr. Obama’s national field director.

Thinking globally:

Obama admin. sent taxpayer money to campaign to oust Netanyahu.

The State Department paid hundreds of thousands of dollars in taxpayers grants to an Israeli group that used the money to build a campaign to oust Prime Minister Benjamin Netanyahu in last year’s Israeli parliamentary elections, a congressional investigation concluded Tuesday.

Some $350,000 was sent to OneVoice, ostensibly to support the group’s efforts to back Israeli-Palestinian peace settlement negotiations. But OneVoice used the money to build a voter database, train activists and hire a political consulting firm with ties to President Obama’s campaign — all of which set the stage for an anti-Netanyahu campaign, the Senate Permanent Subcommittee on Investigations said in a bipartisan staff report.

Then of course, there is Honduras where the Obama administration seems to have played a very dodgy role in a coup against an elected non-leftist and the reinstallation of a leftist leader.

Hillary Clinton’s dodgy answers on Honduras coup.

Clinton had no problem with the forced removal of a democratically elected leader of a country; she only took issue with the fact that things got a little messier than she would have liked. In her glib response, Clinton never elaborates on what the “strong arguments” were that justified the United States not calling the ouster a coup, despite the fact that various governments around the world, as well as the United Nations, condemned Zelaya’s ouster as a coup and called for his restoration as president. Dana Frank, a professor of history and expert on U.S. relations with Honduras called it “chilling that a leading presidential candidate would say this was not a coup . . .  .  She’s baldly lying when she says [the United States] never called it a coup.” Indeed,  President Obama himself said soon after, “We believe the coup was not legal, and that President Zelaya remains the president of Honduras, the democratically elected leader of the country.” By November 2009, the United States had backtracked on its position and focused on pushing for elections, but the claim that it didn’t call it a coup is simply not true.


Obama is On the Wrong Side of Honduras Coup.

Obama is  touting the illegality of the apparent coup in Honduras as if it’s evil incarnate, but he doesn’t seem to be talking any further into why this coup happened. There must be something else at work here because his (along with other world leaders) judgment seems quite  illogical based on the actual facts of the case:

Not only is there no evidence that the Russians did hack the DNC and use that information to PET’s advantage, (I am certain that the Russians did hack Hillary’s private server as did anyone else who wanted to as there was no security on it) but there is plenty of evidence that they did not leak that information or use it for Trump’s advantage.

Lets begin with the founder of anti-virus firm, John McAfee of McAfee anti-virus.

“If it looks like the Russians did it, then I can guarantee you it was not the Russians”

The article is worth the read. But you get the gist of it in one line.

Then there is the excellent interview with Julian Assange, owner, founder and operator of Wikileaks which is at the centre of all of this commotion, who quite clearly states that none of his information comes from hacks, all of it is leaks and none if it is from the Russians.

White House fails to make case that Russian hackers tampered with election.

Sadly, the JAR, as the Joint Analysis Report is called, does little to end the debate. Instead of providing smoking guns that the Russian government was behind specific hacks, it largely restates previous private-sector claims without providing any support for their validity. Even worse, it provides an effective bait and switch by promising newly declassified intelligence into Russian hackers’ “tradecraft and techniques” and instead delivering generic methods carried out by just about all state-sponsored hacking groups.

We can use our own reasoning of course  as well. If I were Putin, I would just as likely prefer to have a corrupt, dishonest megalomaniac in charge of the USA on whom I have enough information to cause an internal coup-d’etat anytime I felt it would be a good way to motive her policies my way.

We can also use CNN coverage of the non-event, which changes depending on the message the Democrats want out.

It also shouldn’t be needed to point out, that shooting the messenger is the worst form of reasoning. Even the DNC, the president and Clinton herself is not denying the validity of the information.

In the Hannity/Assange interview above, Julian explains that they did also release several pages of leaked information about Trump but it was trivial by comparison. That, is the real issue. Not how the information got into the hands of the American public.

So it appears that it is the Obama admin who is guilty of using either illegal or just unethical means, as in Canada, to subvert democracy in other countries

Thank you Tundra Tabloids (great looking new interface by the way) and ML. for your links on this one.

Eeyore for VladTepesBlog, and a very happy New Year to all our readers, friends, and opponents. May we see a year of peace, prosperity, security and wellness for all people.

A commenter just sent in this observation:
Wasn’t the US administration backing the muslim brotherhood in ousting president Mubarak
of Egypt. Weren’t they also promoting and supporting anti Brexit faction in the run up to the
British referendum. Talk about interfering in other countries business.
Too true on both counts. And in fact when the people of Egypt had the largest people’s revolution in the history of the world, both in absolute numbers and in percentage of the population involved to oust Mohammad Morsi of the Muslim Brotherhood and put Al Sisi in, Obama did everything he could to oppose it in favour of the tyrannical Morsi.

Obama admits the Democrats rigged elections back in 2008

Moroccan hackers declare cyberwar on Spain…

An original translation by Hermes

From The Confidential:

Moroccan hackers declare cyberwar to Spain: They have carried out 150 attacks already. They say: “We will be your nightmare, we will finish your weak economy”

They call themselves “Moroccan ghosts”, and they have already attacked 150 webpages of Spanish enterprises, leaving on them messages in favor of the (Moroccan) Sahara and the king of Morocco, threats of “sinking” the Spanish economy and pictures of the Spanish flag in flames.

One of the messages they left in a website was: “Long live the Moroccan Sahara, long live forever the Moroccan king. You must know that we will not allow you to touch our home. We are here to defend our land and the Sahara will be forever Moroccan. We will remain strong and united against anybody willing to harm our country”.

This group is beginning to be known throughout the world because of their massive attacks against webpages in USA, South Africa, France and Israel, which are the countries most affected by their actions.

They attacked a large number of webpages in Spain this week. Among those affected are medical societies, business associations, foundations, airlines, foreign consulates and service webs.

Continue Reading →

South Korea raises alert after hackers attack broadcasters, banks

H/T Tundra T


A man walks at the main office of television network YTN in Seoul March 20, 2013. REUTERS-Lee Jae-Won

A man uses his mobile phone at Shinhan Bank automated teller machines (ATM) as employees (L) of the bank put a 'out of service' notice for the ATMs, on a window after a hacking attack in central Seoul March 20, 2013. REUTERS-Lee Jae-Won

A computer is seen down after hacking at main office of broadcaster YTN in Seoul March 20, 2013. REUTERS-Handout-YTN

1 of 5. A man walks at the main office of television network YTN in Seoul March 20, 2013.

Credit: Reuters/Lee Jae-Won

By Se Young Lee

SEOUL | Wed Mar 20, 2013 7:12am EDT

(Reuters) – South Korean authorities were investigating a hacking attack that brought down the servers of three broadcasters and two major banks on Wednesday, and the army raised its alert level due to concerns of North Korean involvement.

Servers at television networks YTN, MBC and KBS were affected as well as Shinhan Bank and NongHyup Bank, two major banks, the police and government officials said. At least some of the computers affected by the attacks had some files deleted, according to the authorities.

Click to continue:


China’s expansionism echoes history

This article is behind a pay wall, but you get the gist from the paragraph or two that is public.

The Australian:

IN recent months five uninhabited islands east of Taiwan and southwest of Japan have become a new global flashpoint. The Chinese now claim these islands – called the Diaoyu in China, the Diaoyutai in Taiwan and the Senkaku in Japan – and have repeatedly threatened Japanese control with military overflights and naval activity, including the provocative locking of weapons control radar on to a Japanese ship.

These East China Sea activities follow increased Chinese actions and threats in the South China Sea. China argues such coercion is appropriate since all such locations belong to China, but history shows these Chinese territorial claims lack substance.

Unusually detailed report links Chinese military to hacks against US


Chinese intrusions are increasingly targeting critical industrial systems.

by – Feb 19 2013, 4:30pm EST

The emblem of the People’s Liberation Army.

Security firm Mandiant has published an unusually detailed report documenting China-sponsored hacking intrusions that have siphoned terabytes of sensitive data from 141 organizations over the past seven years.

The 74-page study is only the latest report to lay a battery of computer intrusions at the feet at hackers linked to China’s government or military apparatus. But until now, many of those claims lacked crucial details, opening them up to skeptics who complained that the lack of specificity made it difficult or impossible to conclude Chinese actors were behind attacks targeting US governmental agencies, corporations, and human rights organizations. Given the anonymity that shrouds most network intrusions, critics have pointed out, the use of Chinese domain names, IP addresses, and localized language in computer espionage campaigns could almost as easily have been chosen by perpetrators from other countries who want to divert the attention of investigators.

Click to continue:


Anonymous hacker behind Stratfor attack faces life in prison


Published: 23 November, 2012, 22:17

Jeremy Hammond (AFP Photo / Chicago Police Department)

Jeremy Hammond (AFP Photo / Chicago Police Department)

A pretrial hearing in the case against accused LulzSec hacker Jeremy Hammond this week ended with the 27-year-old Chicago man being told he could be sentenced to life in prison for compromising the computers of Stratfor.

Judge Loretta Preska told Hammond in a Manhattan courtroom on Tuesday that he could be sentenced to serve anywhere from 360 months-to-life if convicted on all charges relating to last year’s hack of Strategic Forecasting, or Stratfor, a global intelligence company whose servers were infiltrated by an offshoot of the hacktivist collective Anonymous.

Hammond is not likely to take the stand until next year, but so far has been imprisoned for eight months without trial. Legal proceedings in the case might soon be called into question, however, after it’s been revealed that Judge Preska’s husband was a victim of the Stratfor hack.

Click to continue: