POPULARITY
With a dramatic switch of camera style and the revelation that Pierce is dying (or not), the CR101 crew rush to the hospital to oversee the “bequeathings” of an insane man. It's time for a lively discussion of “Intermediate Documentary Filmmaking” (S2E16) with tiaras, Geordi, and Sourface! Listen to CR101 on Anchor, Spotify, Breaker, Google Podcasts, Pocket Casts, Radio Public Follow the CR101 crew on Twitter Thanks to Thomas Field for our theme song Other CR101 projects: Mutant Reviewers, Thomas Midena YouTube, Battle Bards, Heather's Twitch channel
RIP to a talented young musician & producer.
Russian Nation State Hackers & What We're Not Doing About It. - By Bob Flores – former Chief Technology Officer of the CIA & Babak Pasdar CEO and CTO of Acreto IoT Security The effective use of Russian nation state hackers led to a hacked election that has resulted in a hacked America. We're still licking our wounds and not doing anything about it. In fact we are arguing if it happened at all! Cybersecurity strategy incorporates the confluence of technology, business and geopolitics with so many moving parts that to call them complex is an understatement. Strategies must span multiple geographies across a plurality of nations and continents. That is why no one can “go it alone”. Today we need our friends more than ever – not just for geopolitics, but also for cyber defense. Collaboration is the underpinning of cybersecurity. As the largest global economy that comprises infrastructure, industry, enterprise and institutions, the US is the most technologically advanced. Many American companies span the globe making them one big glass house while the rest of the cyber world are kids with rocks on a dare. These "kids with rocks" fall into four major categories. First, there are hacktivists, who hack for their cause. The most well known of these being the loosely bound group called Anonymous. The second category is terrorist organizations such as ISIS and Al Qaeda. These organizations recognize cyber warfare as a cornerstone to their mid to long-term strategy and are working feverishly and investing heavily to get them to maturity. The third group is financial hackers. The best way to describe financial hackers is the Mob and Cartels' online arm. And finally, the most dangerous are state-sponsored hackers. Even though they operate behind triple or quadruple blind systems, which makes tracking them extremely difficult, they can be identified by their unique hacking techniques or fingerprints. Nation state hackers are not the moody lone-wolf nocturnal teenagers cranking death metal and surviving on Amp energy drinks. That's a TV cliche. And hacking is not an organic game of pickup, where individual hackers are swapped indiscriminately. Nation state hackers are carefully curated teams that train, collaborate and solve problems together. Not only do they have to get along and gel over time, but they have to build and test many foundational tools they need to perform the advanced objectives they are charged with. Sometimes this can take years! Lets Talk Hacking Fingerprints: Cyber-threat intelligence organizations that monitor and track Advanced Persistent Threats – APT.s - use their threat fingerprints to build a profile on each team over time. The collection of fingerprints defines each team, otherwise called an APT. The profile fingerprints for the Russians, Chinese, North Koreans and Iranians all vary. Each APT, or different hacking group, is assigned a unique number for identification. For example, APT37 is North Korea, APT34 is Iran, and the American election hacks are associated with APT.28 and AP.29 - which are obviously Russian nation state hackers. In fact, APT.28, otherwise known as "Fancy Bear", is a completely different team than APT29, "Cozy Bear", both of which work for the Russian Government. As an example, here is a sample of the fingerprint for Fancy Bear – APT28- that has been tracked since 2007, and the reasons for American intelligence agencies' confidence in Russia as source for the election hacks: Here are some quick hit details for APT28: Its Target Sectors includes: The Caucasus, particularly Georgia, eastern European countries and militaries, North Atlantic Treaty Organization (NATO) and other European security organizations and defense firms. APT. 28 is focused on Cyber-Espionage As a summary overview: APT28 is a skilled team of developers and operators collecting intelligence on defense and geopolitical issues—intelligence that would be useful only to a government. This APT group compiles malware samples with Russian language settings during working hours (8 a.m. to 6 p.m.), consistent with the time zone of Russia’s major cities, including Moscow and St. Petersburg. This suggests that APT28 receives direct ongoing financial and other resources from a well-established organization, most likely the Russian government. Tools commonly used by APT28 include the SOURFACE downloader, its second-stage backdoor EVILTOSS and a modular family of implants dubbed CHOPSTICK. APT28 has employed RSA encryption to protect files and stolen information moved from the victim’s network to the controller. It has also made incremental and systematic changes to the SOURFACE downloader and its surrounding ecosystem since 2007, indicating a long-standing and dedicated development effort. Known operations include Operation RussianDoll where Adobe & Windows Zero-Day Exploits were Leveraged in highly-targeted attacks. There are other means for determining the source of attacks. Aside from fingerprinting, intelligence agencies do track the sale of zero-day exploits purchased on the markets. Zero-days are exploits for previously unknown vulnerabilities. There are numerous commercial and underground organizations whose business is finding, exploiting and weaponizing vulnerabilities. Once the exploit is developed, it's put up for bid - and governments are the most affluent bidders. Commercial organizations offer them for sale on the public market to sanctioned agencies, while underground groups sell their exploits on the black market – Dark Net - to the highest bidder indiscriminately. In the case of juicy exploits, the buyer may pay significant sums for the privilege of exclusivity. The buyer wants the advantage of a weapon that nobody else has. All governments use a variety of proprietary techniques, technologies and informants to track the exploit inventory of both rival and ally countries. Ultimately the recourse to cyber attacks is a blunt instrument in the form of counter-attack. Counter attacks may include counter hacks, economic sanctions, embargoes, or a combination. However, for a government to get involved in countering attacks large organizations or critical infrastructure are usually involved and even then it is reserved for the largest and most egregious attacks. American election compromise is such an example. At this particular point in time, America has opted for a "go it alone" approach to global relationships. Collaboration on cyber issues is not exempt from this. As the occupant of "The Big Glass House" in a world of rock-throwing kids, especially Russian nation state hackers, America needs its friends more than ever. Even though we have been hacked, America is still Not Minding The Store. Collaboration between government and commercial threat intelligence is key to a successful cyber strategy. The nation’s top intelligence officer, Director of National Intelligence Dan Coats, indicated on Friday, July 13 and I quote: "persistent danger of Russian cyberattacks today was akin to the warnings the United States had of stepped-up terror threats ahead of the Sept. 11, 2001, attacks. The system was blinking red," Coats said. (nytimes.com) "Here we are nearly two decades later and I’m here to say the warning lights are blinking red again. Today, the digital infrastructure that serves this country is literally under attack. Every day, foreign actors - the worst offenders being Russia, China, Iran, and North Korea - are penetrating our digital infrastructure and conducting a range of cyber-intrusions and attacks against targets in the United States". Recently, Congress has zeroed out nearly $400 million from the fund used to protect the integrity of our election and has blocked subsequent efforts to fund it across partisan lines. In April 2018, the White House Cybersecurity coordinator was relieved from his role less than six months from the November elections. As of the end of July no replacement has been named. Moreover, tough sanctions passed by congress in July 2017 are yet to be implemented as of July 2018. It may be too late for anyone to take the helm and implement meaningful protections at such a late stage. Collaborating to stop these attacks requires leadership, funding, a competent team, communications and sharing. At this point in time we have the competent team members in the form of our intelligence agencies that are raring to be let loose. However there is no leadership, no mandate and no funding. We also find ourselves in a strange situation with sparse dialog with our allies due to newly formed political trust issues. The patient is not in trouble because a first- year med student is the surgeon. Rather, the patient has been abandoned by the surgeon with little time to live while the operating room is dark because nobody paid the utility bill. Next in this series we will look at an example of Russia's nation-state hacking teams and their construct in our blog: Putin's Eleven – Nation State hacker teams uncovered. Learn more by visiting our web site: Acreto.io -- On Twitter: @acretoio and if you haven’t done so, sign up for the Acreto Crypto-n-IoT podcast. You can get it from Apple – Google or your favorite podcast app. About Acreto IoT Security Acreto IoT Security delivers advanced security for IoT Ecosystems, from the cloud. IoTs are slated to grow to 50 Billion by 2021. Acreto’s Ecosystem security protects all Clouds, users, applications, and purpose-built IoTs that are unable to defend themselves in-the-wild. The Acreto platform offers simplicity and agility, and is guaranteed to protect IoTs for their entire 8-20 year lifespan. The company is founded and led by an experienced management team, with multiple successful cloud security innovations. Learn more by visiting Acreto IoT Security on the web at acreto.io or on Twitter @acretoio.
This time on the 7th edition of the Bare Elements podcast series @mykroboy and @SirronMusic are joined by someone who needs little introduction, drum and bass producer Malaky! As usual the lads have an in depth chat with him about his musical upbringing, his approach to production, career highlights and more, as well as previewing a couple of forthcoming releases. As always there is a UK Garage and a DNB mini-mix from Sirron in there too! This will be the last podcast from Sirron & mykroboy together for a while, so it's a special one. Look out for future podcasts and guestmixes from Sirron and others coming soon! Bare Elements would like to dedicate this podcast to the memory of friend and hip-hop genius Adam Bramwell, aka Sourface. You can check out his YouTube channel at www.youtube.com/snaresallday and hear/purchase his music from www.sourface.bandcamp.com. Rest in beats. Download: http://www.mediafire.com/file/sap0b0pnm9cb876/Bare_Elements_Podcast_007_Ft._Malaky.mp3 To find Malaky and our pages online: @malaky twitter.com/malakydnb www.facebook.com/malakydnb @bareelementsuk twitter.com/bareelementsuk www.mixcloud.com/bareelementsuk www.instagram.com/bareelementsuk www.facebook.com/bareelementsuk Music submissions: bareelementsuk@gmail.com Skeletone & Silence Groove - Wicked [Celcius Recordings] Jorja Smith - Carry Me Home (Pola & Bryson Bootleg) [Free Download] TQD Ft. Swindle & Skilliam - New Day [Butterz] Blinding - Tell Me [BlindingHQ] Wolfe - Swimming In Ting [In:Flux Audio] TQD - Touch [Butterz] AlunaGeorge Ft. Popcaan - I'm in Control (Soulecta Dark Dub) [Free Download] Smokey Bubblin' B - Daffy (Mind of a Dragon Remix) [LPR] Blackboxx - Estre [Slime Recordings] Nova - Artisan VIP [Free Download] Malaky - Renaissance [Fokuz Recordings] Malaky - Resolution [Celcius Recordings] Malaky - In My Eyes [Forthcoming 8/5/17 - Fokuz Recordings] Skeletone & Silence Groove - Brother [Celcius Recordings] Submorphics Ft. Christina Tamayo - Lost In The Lights [SGN:LTD] Skeptical & Alix Perez - Without A Trace [Exit Records] Cruk & Signal - Illusion [Invisible Recordings] Lenzman Ft. Steo - Tender Love [The North Quarter] Satl & Kasper Ft. Lurch - Sky Turns Black [Fokuz Recordings] Metrik Ft. Rothwell - We Got It (S.P.Y. Remix) [Hospital Records] Dexcell Ft. Champion & Charlotte Haining - Running [Spearhead Records] Document One - Hypnotic [Technique Recordings] Total Science & Break - Big Time Winners [Computer Integrated Audio] Phil Tangent - Illuminate [Integral Records] Malaky - Resolution [Celcius Recordings] Malaky Ft. GLXY - Serenade [Forthcoming - Integral Records] Lenzman - So Alone [The North Quarter] Sin-Seer - Deep Thoughts Ft. Dot Rotten, Nate & Bo'Nidle (Prod. Sourface) [https://itunes.apple.com/gb/album/deep-thoughts-single/id443898822]
Web radio show every 2nd & 4th tuesday of the month on www.music4live.fr Peace, love & hip hop ! JEAN P THE MC - courtyard TASK1ne - shut it down THE HIDEANDSEEKZOO - wonder LITTLE BROTHER - welcome to durham (Sourface rmx) DJ PANDAMONUIM ft BIG RAIN - everything i hoped REALM REALITY ft EASY MONEY & SPIT GEMZ - concrete jazz SLIM PICKENS - slam microphones THE HIDEANDSEEKZOO - banji BLUNDER - the hard way (prod Freddie Joachim) DEMIGODZ ft APATHY, CELPH TITLED, MOTIVE, BLACASTAN, RYU & SCOOP DEVILLE - just can't quit RAPSODY - believe me MOTHER SUPERIA - where u at BLACK MOON - headz ain't ready (Beatminerz rmx) FLIMODE SQUAD ft BUCKSHOT - we got u opin A+ ft CHICO DEBARGE - it's on you DA YOUNGSTA'S - no more hard time ERICK SERMON - welcome DA KING & I - tears KOOL G RAP - streets of new york NAS - street dreams (Fantastischen Vier mix) BRAND NUBIAN - sincerely HEAVY D & THE BOYZ - take your time THE PRUNES - pissed