{"id":17860,"date":"2016-07-25T07:44:23","date_gmt":"2016-07-25T12:44:23","guid":{"rendered":"http:\/\/hcstx.org\/?p=17860"},"modified":"2016-07-25T07:44:23","modified_gmt":"2016-07-25T12:44:23","slug":"espionage-files-how-putin-weaponized-wiki-leaks","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/07\/25\/espionage-files-how-putin-weaponized-wiki-leaks\/","title":{"rendered":"Espionage Files: How Putin Weaponized Wiki-Leaks"},"content":{"rendered":"<p class=\"d1-article-subhead\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-17861\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/07\/putin1.jpg?w=620\" alt=\"Putin1\" width=\"620\" height=\"284\" \/><\/p>\n<p class=\"d1-article-subhead\"><span class=\"d1-article-subhead-inner-a\"><span class=\"d1-article-subhead-inner-b\"><span class=\"d1-article-subhead-inner-c\">Evidence suggests that a Russian intelligence group was the source of the most recent Wikileaks intel dump, which was aimed to influence the U.S. election.<\/span><\/span><\/span><\/p>\n<div class=\"text d1-article-content\">\n<p><strong>Close your eyes and imagine that a <\/strong>hacking group backed by Russian President Vladimir Putin broke into the email system of a major <span class=\"caps\">U.S.<\/span> political party. The group stole thousands of sensitive messages and then published them through an obliging third party in a way that was strategically timed to influence the United States presidential election. Now open your eyes, because that\u2019s what just\u00a0happened.<\/p>\n<p>On Friday, Wikileaks published 20,000 emails stolen from the Democratic National Committee. They reveal, among other things,<a href=\"http:\/\/www.washingtonexaminer.com\/leaked-dnc-email-wasserman-schultz-called-sanders-aide-an-ass\/article\/2597476\">thuggish infighting<\/a>, a push by <a href=\"https:\/\/theintercept.com\/2016\/07\/22\/new-leak-top-dnc-official-wanted-to-use-bernie-sanderss-religious-beliefs-against-him\/\">a top <span class=\"caps\">DNC<\/span> official <\/a>to use Bernie Sanders\u2019 religious convictions against him in the South, and attempts <a href=\"http:\/\/www.salon.com\/2016\/07\/22\/dnc_emails_wasserman_schultz_furiously_pressured_msnbc_after_it_criticized_her_unfair_treatment_of_sanders\/\">to strong-arm<\/a> media outlets. In other words, they reveal the Washington campaign monster for what it\u00a0is.<\/p>\n<p>But leave aside the purported content of the Wikileaks data dump (to which numerous other outlets have devoted considerable attention) and consider the source. Considerable evidence shows that the Wikileaks dump was an orchestrated act by the Russian government, working through proxies, to undermine Hillary Clinton\u2019s Presidential\u00a0campaign.<\/p>\n<p>\u201cThis has all the hallmarks of tradecraft. The only rationale to release such data from the Russian bulletproof host was to empower one candidate against another. The Cold War is alive and well,\u201d Tom Kellermann, the <span class=\"caps\">CEO<\/span> of Strategic Cyber Ventures told <em>Defense\u00a0One.<\/em><\/p>\n<p>Here\u2019s the timeline: On June 14, cybersecurity company CrowdStrike, under contract with the <span class=\"caps\">DNC<\/span>, announced in a blog post that two separate Russian intelligence groups had gained access to the <span class=\"caps\">DNC<\/span> network. One group, <span class=\"caps\">FANCY<\/span> <span class=\"caps\">BEAR<\/span> or <span class=\"caps\">APT<\/span> 28, gained access in April. The other, <span class=\"caps\">COZY<\/span> <span class=\"caps\">BEAR<\/span>, (also called Cozy Duke and <span class=\"caps\">APT<\/span> 29) first breached the network in the summer of\u00a02015.<\/p>\n<p>Cybersecurity company FireEye first <a href=\"https:\/\/www2.fireeye.com\/rs\/848-DID-242\/images\/rpt-apt29-hammertoss.pdf\">discovered<\/a> <span class=\"caps\">APT<\/span> 29 in 2014 and was quick to point out a clear Kremlin connection. \u201cWe suspect the Russian government sponsors the group because of the organizations it targets and the data it steals. Additionally, <span class=\"caps\">APT<\/span>29 appeared to cease operations on Russian holidays, and their work hours seem to align with the <span class=\"caps\">UTC<\/span> +3 time zone, which contains cities such as Moscow and St. Petersburg,\u201d they wrote in their report on the group. <a href=\"http:\/\/www.cnbc.com\/2015\/08\/06\/russia-hacks-pentagon-computers-nbc-citing-sources.html\">Other <span class=\"caps\">U.S.<\/span> officials<\/a> have said that the group looks like it has sponsorship from the Russian government due in large part to the level of sophistication behind the group\u2019s\u00a0attacks.<\/p>\n<p>Read the Remainder at <strong><a href=\"http:\/\/www.defenseone.com\/technology\/2016\/07\/how-putin-weaponized-wikileaks-influence-election-american-president\/130163\/?oref=defenseone_today_nl\">Defense One<\/a><\/strong><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Evidence suggests that a Russian intelligence group was the source of the most recent Wikileaks intel dump, which was aimed to influence the U.S. election. Close your eyes and imagine that a hacking group backed by Russian President Vladimir Putin broke into the email system of a major U.S. political party. The group stole thousands&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[2805,3140,13,74,2908,4479,4333,2378,1725,5582,4880,5586,1894],"tags":[5001,2779,13074,1451,1453,792,10449,13075,13076,13077,13078],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/17860"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=17860"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/17860\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=17860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=17860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=17860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}