Latest news with #USNationalSecurityAgency
Yahoo
30-05-2025
- General
- Yahoo
Tax number reveals whistleblower Snowden to be resident near Moscow
Edward Snowden, the whistleblower who leaked classified material from the US National Security Agency (NSA) more than a decade ago, has been located in or near the city of Lyubertsy near Moscow, the Sistema research project announced on Friday. Sistema based its information on Snowden's tax number, which reveals him to be registered in the city. The Lyubertsy tax office is responsible for three other cities in the Moscow area. Snowden's location in Russia has to date been kept secret. In 2013, Snowden funnelled thousands of confidential documents from the NSA and the Five Eyes intelligence agencies of the United Kingdom, Canada, Australia and New Zealand, along with the US. At the time, he said he aimed to seek asylum in Ecuador, but was stranded in Moscow, after the US authorities revoked his passport. Under pressure from the US, various countries refused to take him in until Russia under President Vladimir Putin offered him asylum. He has since taken Russian citizenship.


Euronews
23-05-2025
- Euronews
Report: Russian army hackers target Western aid supply to Ukraine
Hackers linked to Russian military intelligence have targeted Western logistics and technology firms involved in transporting aid to Ukraine, the US National Security Agency (NSA) said. The cyber operation, attributed to the notorious Russian military intelligence agency GRU unit 26165, better known as Fancy Bear, sought to gather information on the types and timing of assistance entering Ukraine. According to the NSA's report published late Wednesday, the campaign aimed to breach companies in the defence, transport and logistics sectors across multiple Western countries, including the US. It also targeted ports, airports and railway infrastructure. As part of the operation, hackers attempted to access footage from more than 10,000 internet-connected cameras — both private and public — situated near strategic transit points such as border crossings, ports and rail hubs. While the majority of these cameras were located in Ukraine, others were based in neighbouring countries including Poland, Romania and elsewhere in eastern and central Europe. The cyber attacks reportedly began in 2022, when Russia launched its full-scale invasion of Ukraine. Authorities have not disclosed how successful the hackers were or how long they remained undetected. The NSA, along with the FBI and cybersecurity agencies from allied nations, warned that Russia is likely to continue its surveillance efforts and advised companies involved in support delivery to remain vigilant. 'To defend against and mitigate these threats, at-risk entities should anticipate targeting,' the NSA said in the advisory. The hackers employed spearphishing tactics — sending deceptive, official-looking messages designed to extract sensitive information or install malware — as well as exploiting vulnerabilities in remote access devices typically used in small or home office networks, which often lack enterprise-level protection. Grant Geyer, chief strategy officer at cybersecurity firm Claroty, said the hackers' methods were not especially sophisticated but were methodically executed. 'They have done detailed targeting across the entire supply chain to understand what equipment is moving, when and how — whether it's by aircraft, ship or rail,' he noted. Geyer warned that the intelligence gathered could help Russia refine its military strategy or potentially plan future cyber or physical disruptions to Ukraine's aid routes. In a related move last autumn, US intelligence agencies issued guidance urging US defence contractors and logistics firms to bolster their cybersecurity, following a series of suspected Russian-linked sabotage incidents in Europe. Evidence gathered by Western countries over the years has shown that FancyBear has been behind a slew of attacks on Ukraine, Georgia and NATO, as well as political enemies of the Kremlin, international journalists and others. The man arrested as the lone suspect in the fatal shooting of two Israeli embassy employees in Washington was charged on Thursday with two counts of first-degree murder and murder of foreign officials. Chicago-born Elias Rodriguez, 31, shouted 'Free, free Palestine' as he was led away after shooting and killing two Israeli embassy employees outside an event in the US capital on Wednesday, according to court documents. US citizen Sarah Milgrim and an Israeli-German national Yaron Lischinsky were killed in the attack. The two were a young couple set to become engaged, according to Israeli ambassador to the US Yechiel Leiter. After his arrest, Rodriguez told police, 'I did it for Palestine, I did it for Gaza,' federal authorities said on Thursday as they announced the charges in what they described as a targeted act of terrorism. Rodriguez appeared in a US federal court in Washington on Thursday but did not enter a plea. Prosecutors said additional charges are likely as they investigate the incident as both a hate crime and an act of terrorism. If convicted, Rodriguez could face the death penalty. According to an FBI affidavit, Rodriguez flew to Washington from Chicago with a handgun in his checked baggage. The document said law enforcement has seen and reviewed security footage showing Rodriguez first walking past the victims — who were part of a group of four people —outside the museum, then turning, pulling a firearm and shooting them in the back. One of the victims fell to the ground, while the other, identified as Milgrim, tried to crawl away from him. He approached both and fired several more times, according to the affidavit. Witnesses say he entered the building visibly distressed after the attack, prompting bystanders to help him before realising he was the alleged perpetrator. The event at the Capital Jewish Museum was dedicated to helping Gazans, organisers said. The killings prompted Israeli embassies around the world to increase their security and lower flags to half-staff and caused a slew of condemnations from world leaders. Israeli Prime Minister Benjamin Netanyahu's office said he was 'shocked' by the 'horrific, antisemitic' shooting.


Powys County Times
22-05-2025
- Politics
- Powys County Times
Russian hackers hit Western firms sending aid to Ukraine, US intelligence says
Hackers working for Russian military intelligence targeted Western technology and logistics companies involved in shipping assistance to Ukraine, the US National Security Agency said. The hackers were trying to obtain details about the type of assistance entering Ukraine and, as part of the effort, sought access to the feeds of internet-connected cameras near Ukrainian border crossings, according to the NSA's report on the cyberattack, which was issued late on Wednesday. The cyber campaign sought to penetrate defence, transportation and logistics companies in several Western countries, including the US, as well as ports, airports and rail systems. The report did not specify which types of aid Russia was surveilling, but Ukraine's allies have contributed significant amounts of military and humanitarian assistance since the war began. More than 10,000 internet-connected cameras were targeted, including private devices and public traffic cameras near critical transportation points, such as ports, rail hubs or border crossings. Most were in Ukraine, though some were in Romania, Poland and other eastern or central European countries. Officials did not disclose details of the hackers' success or how long they remained unnoticed. The activity detailed in the report began in 2022, the same year that Russia invaded Ukraine. Russia is expected to continue its efforts to spy on aid shipments, and companies involved in aid logistics or shipments should be on guard, according to the report, which was issued jointly by the NSA, the FBI and security agencies in several allied nations. 'To defend against and mitigate these threats, at-risk entities should anticipate targeting,' the NSA said. Authorities linked the activity to a Russian military intelligence unit dubbed 'Fancy Bear' that is well known for its past campaigns targeting the US and its allies. The hackers used a variety of tactics to gain access, including spear phishing, which involves sending authentic-looking messages to a potential victim that contain links to harmful software or requests for sensitive information. The Russian team also exploited security vulnerabilities in computer devices used at small and in-home offices, networks that often lack the security measures found in larger systems. The hackers did not use particularly innovative techniques, according to Grant Geyer, chief strategy officer at the cybersecurity company Claroty. Nevertheless, the sprawling yet carefully orchestrated effort gives the Russians a 'granular understanding' of the aid sent to Ukraine, he said. 'They have done detailed targeting across the entire supply chain to understand what equipment is moving, when and how — whether it's by aircraft, ship or rail,' Mr Geyer said. Russia could use the information it obtained to hone its war planning, Mr Geyer said, or to plot further cyber or physical attacks on the supply chain to Ukraine. Last autumn, US intelligence officials issued a public bulletin directing American defence companies and suppliers to increase security precautions following several acts of sabotage in Europe that officials have blamed on Russia.


Irish Examiner
22-05-2025
- Politics
- Irish Examiner
Russian hackers hit Western firms sending aid to Ukraine, US intelligence says
Hackers working for Russian military intelligence targeted Western technology and logistics companies involved in shipping assistance to Ukraine, the US National Security Agency said. The hackers were trying to obtain details about the type of assistance entering Ukraine and, as part of the effort, sought access to the feeds of internet-connected cameras near Ukrainian border crossings, according to the NSA's report on the cyberattack, which was issued late on Wednesday. The cyber campaign sought to penetrate defence, transportation and logistics companies in several Western countries, including the US, as well as ports, airports and rail systems. The report did not specify which types of aid Russia was surveilling, but Ukraine's allies have contributed significant amounts of military and humanitarian assistance since the war began. More than 10,000 internet-connected cameras were targeted, including private devices and public traffic cameras near critical transportation points, such as ports, rail hubs or border crossings. Most were in Ukraine, though some were in Romania, Poland and other eastern or central European countries. Officials did not disclose details of the hackers' success or how long they remained unnoticed. The activity detailed in the report began in 2022, the same year that Russia invaded Ukraine. Russia is expected to continue its efforts to spy on aid shipments, and companies involved in aid logistics or shipments should be on guard, according to the report, which was issued jointly by the NSA, the FBI and security agencies in several allied nations. 'To defend against and mitigate these threats, at-risk entities should anticipate targeting,' the NSA said. Authorities linked the activity to a Russian military intelligence unit dubbed 'Fancy Bear' that is well known for its past campaigns targeting the US and its allies. The hackers used a variety of tactics to gain access, including spear phishing, which involves sending authentic-looking messages to a potential victim that contain links to harmful software or requests for sensitive information. The Russian team also exploited security vulnerabilities in computer devices used at small and in-home offices, networks that often lack the security measures found in larger systems. The hackers did not use particularly innovative techniques, according to Grant Geyer, chief strategy officer at the cybersecurity company Claroty. Nevertheless, the sprawling yet carefully orchestrated effort gives the Russians a 'granular understanding' of the aid sent to Ukraine, he said. 'They have done detailed targeting across the entire supply chain to understand what equipment is moving, when and how — whether it's by aircraft, ship or rail,' Mr Geyer said. Russia could use the information it obtained to hone its war planning, Mr Geyer said, or to plot further cyber or physical attacks on the supply chain to Ukraine. Last autumn, US intelligence officials issued a public bulletin directing American defence companies and suppliers to increase security precautions following several acts of sabotage in Europe that officials have blamed on Russia. The Russian Embassy in Washington did not immediately respond requests for comment.


AsiaOne
15-05-2025
- Politics
- AsiaOne
Rogue communication devices found in Chinese solar power inverters, World News
LONDON — US energy officials are reassessing the risk posed by Chinese-made devices that play a critical role in renewable energy infrastructure after unexplained communication equipment was found inside some of them, two people familiar with the matter said. Power inverters, which are predominantly produced in China, are used throughout the world to connect solar panels and wind turbines to electricity grids. They are also found in batteries, heat pumps and electric vehicle chargers. While inverters are built to allow remote access for updates and maintenance, the utility companies that use them typically install firewalls to prevent direct communication back to China. However, rogue communication devices not listed in product documents have been found in some Chinese solar power inverters by US experts who strip down equipment hooked up to grids to check for security issues, the two people said. Over the past nine months, undocumented communication devices, including cellular radios, have also been found in some batteries from multiple Chinese suppliers, one of them said. Reuters was unable to determine how many solar power inverters and batteries they have looked at. The rogue components provide additional, undocumented communication channels that could allow firewalls to be circumvented remotely, with potentially catastrophic consequences, the two people said. Both declined to be named because they did not have permission to speak to the media. "We know that China believes there is value in placing at least some elements of our core infrastructure at risk of destruction or disruption," said Mike Rogers, a former director of the US National Security Agency. "I think that the Chinese are, in part, hoping that the widespread use of inverters limits the options that the West has to deal with the security issue." A spokesperson for the Chinese embassy in Washington said: "We oppose the generalisation of the concept of national security, distorting and smearing China's infrastructure achievements." Using the rogue communication devices to skirt firewalls and switch off inverters remotely, or change their settings, could destabilise power grids, damage energy infrastructure, and trigger widespread blackouts, experts said. "That effectively means there is a built-in way to physically destroy the grid," one of the people said, The two people declined to name the Chinese manufacturers of the inverters and batteries with extra communication devices, nor say how many they had found in total. The existence of the rogue devices has not previously been reported. The US government has not publicly acknowledged the discoveries. Asked for comment, the US Department of Energy (DOE) said it continually assesses risk associated with emerging technologies and that there were significant challenges with manufacturers disclosing and documenting functionalities. "While this functionality may not have malicious intent, it is critical for those procuring to have a full understanding of the capabilities of the products received," a spokesperson said. Work is ongoing to address any gaps in disclosures through "Software Bill of Materials" — or inventories of all the components that make up a software application — and other contractual requirements, the spokesperson said. Trusted equipment As US-China tensions escalate, the US and others are reassessing China's role in strategic infrastructure because of concerns about potential security vulnerabilities, two former government officials said. "The threat we face from the Chinese Communist Party (CCP) is real and growing. Whether it's telecom hacks or remotely accessing solar and battery inverters, the CCP stops at nothing to target our sensitive infrastructure and components," said US Representative August Pfluger, a Republican member of the Committee on Homeland Security. "It is about time we ramp up our efforts to show China that compromising us will no longer be acceptable," he told Reuters. In February, two US Senators introduced the Decoupling from Foreign Adversarial Battery Dependence Act, banning the Department of Homeland Security from purchasing batteries from some Chinese entities, starting October 2027, due to national security concerns. The bill was referred to the Senate Committee on Homeland Security and Governmental Affairs on March 11 and has yet to be enacted. It aims to prevent Homeland Security from procuring batteries from six Chinese companies Washington says are closely linked to the Chinese Communist Party: Contemporary Amperex Technology Company (CATL), BYD Company, Envision Energy, EVE Energy Company, Hithium Energy Storage Technology Company, and Gotion High-tech Company. None of the companies responded to requests for comment. Utilities are now preparing for similar bans on Chinese inverter manufacturers, three people with knowledge of the matter said. Some utilities, including Florida's largest power supplier Florida Power & Light Company, are attempting to minimise the use of Chinese inverters by sourcing equipment from elsewhere, according to two people familiar with the matter. FPL did not respond to requests for comment. The DOE spokesperson said: "As more domestic manufacturing takes hold, DOE is working across the federal government to strengthen US supply chains, providing additional opportunities to integrate trusted equipment into the power grid." 'Catastrophic implications' Huawei is the world's largest supplier of inverters, accounting for 29 per cent of shipments globally in 2022, followed by Chinese peers Sungrow and Ginlong Solis, according to consultancy Wood Mackenzie. German solar developer 1Komma5 said, however, that it avoids Huawei inverters, because of the brand's associations with security risks. "Ten years ago, if you switched off the Chinese inverters, it would not have caused a dramatic thing to happen to European grids, but now the critical mass is much larger," 1Komma5 Chief Executive Philipp Schroeder said. "China's dominance is becoming a bigger issue because of the growing renewables capacity on Western grids and the increased likelihood of a prolonged and serious confrontation between China and the West," he said. Since 2019, the US has restricted Huawei's access to US technology, accusing the company of activities contrary to national security, which Huawei denies. Chinese companies are required by law to co-operate with China's intelligence agencies, giving the government potential control over Chinese-made inverters connected to foreign grids, experts said. While Huawei decided to leave the US inverter market in 2019 — the year its 5G telecoms equipment was banned — it remains a dominant supplier elsewhere. Huawei declined to comment. In Europe, exercising control over just 3 to 4 gigawatts of energy could cause widespread disruption to electricity supplies, experts said. The European Solar Manufacturing Council estimates over 200 GW of European solar power capacity is linked to inverters made in China — equivalent to more than 200 nuclear power plants. At the end of last year, there was 338 GW of installed solar power in Europe, according to industry association SolarPower Europe. "If you remotely control a large enough number of home solar inverters, and do something nefarious at once, that could have catastrophic implications to the grid for a prolonged period of time," said Uri Sadot, cyber security programme director at Israeli inverter manufacturer SolarEdge. Strategic dependencies Other countries such as Lithuania and Estonia acknowledge the threats to energy security. In November, the Lithuanian government passed a law blocking remote Chinese access to solar, wind and battery installations above 100 kilowatts — by default restricting the use of Chinese inverters. Energy minister Zygimantas Vaiciunas said this could be extended to smaller rooftop solar installations. Estonia's Director General of the Foreign Intelligence Service, Kaupo Rosin, said the country could be at risk of blackmail from China if it did not ban Chinese technology in crucial parts of the economy, such as solar inverters. Estonia's Ministries of Defence and Climate declined to comment when asked if they had taken any action. In Britain, the government's review of Chinese renewable energy technology in the energy system — due to be concluded in the coming months — includes looking at inverters, a person familiar with the matter said. In November, solar power inverters in the US and elsewhere were disabled from China, highlighting the risk of foreign influence over local electricity supplies and causing concern among government officials, three people familiar with the matter said. Reuters was unable to determine how many inverters were switched off, or the extent of disruption to grids. The DOE declined to comment on the incident. The incident led to a commercial dispute between inverter suppliers Sol-Ark and Deye, the people said. "Sol-Ark does not comment on vendor relationships, including any relationship with Deye, nor does it have any control over inverters that are not branded Sol-Ark, as was the case in the November 2024 situation you referenced," a Sol-Ark spokesperson said. Deye did not respond to requests for comment. The energy sector is trailing other industries such as telecoms and semiconductors, where regulations have been introduced in Europe and the US to mitigate China's dominance. Security analysts say this is partly because decisions about whether to secure energy infrastructure are mostly dictated by the size of any installation. Household solar or battery storage systems fall below thresholds where security requirements typically kick-in, they said, despite now contributing a significant share of power on many Western grids. Nato, the 32-country Western security alliance, said China's efforts to control member states' critical infrastructure — including inverters — were intensifying. "We must identify strategic dependencies and take steps to reduce them," said a Nato official. [[nid:716541]]