Revealed: DEA’s massive phone tapping scheme that preceded NSA’s
April 8, 2015 1 Comment
By JOSEPH FITSANAKIS | intelNews.org
For nearly a decade before 9/11 and the controversial phone tapping program enacted by the National Security Agency, another American intelligence organization, the Drug Enforcement Administration, operated a mass phone surveillance scheme. The scheme, which is no longer in effect, collected data on billions of phone exchanges involving Americans and became a blueprint for NSA’s post-9/11 monitoring efforts. The DEA surveillance program was first disclosed in a report by the Department of Justice in January of this year. But its history, as well as its full extent, were fully revealed on Tuesday by USA Today.
The paper said the DEA program was initiated in 1992, during the presidency of George Bush, Sr., and was aimed at monitoring call data to and from “designated foreign countries” that were “linked to drug trafficking”. But the program grew to monitor data on every call made to and from the US to as many as 116 nations, said the paper, including every country in the Americas. In all, billions of calls were monitored in the over two decades that the program lasted. Citing interviews with “more than a dozen current and former intelligence officials”, USA Today said the DEA surveillance program did not access the content of intercepted phone calls, but rather the pen-register data, namely which numbers were dialed and when.
The intercepted information enabled the DEA to trace transnational networks of traffickers and money handlers used by large drug cartels. Information acquired through the program was also used for non-narcotics-related investigations, said the paper. However, the two-decade-long program did not utilize court warrants, and was thus very similar to the NSA’s controversial wiretapping scheme revealed by a series of whistleblowers in the years following 9/11. USA Today said the DEA stopped the surveillance program in September of 2013. Shortly after that, said the paper, the database containing the information collected through the program was deliberately purged.








By JOSEPH FITSANAKIS | intelNews.org










Hezbollah likely behind malware that attacked Israeli servers
April 9, 2015 by Joseph Fitsanakis 2 Comments
A report by a major Israeli computer security firm claims that “a Lebanese entity”, possibly Hezbollah, was behind a cyberespionage operation that targeted companies connected to the Israeli military. In late March, Israeli computer security experts announced they had uncovered an extensive cyberespionage operation that targeted computers in Israel, and to a lesser extent in the United States, Britain, Turkey and Canada. The cyberespionage operation, dubbed VOLATILE CEDAR by Israeli computer security experts, was allegedly launched in 2012. It employed a sophisticated malicious software, also known as malware, codenamed EXPLOSIVE. One Israeli security expert, Yaniv Balmas, said the malware was not particularly sophisticated, but it was advanced enough to perform its mission undetected for over three years.
It is worth noting that, during the period of operation, the EXPLOSIVE malware kept surreptitiously updating itself with at least four different versions, which periodically supplemented the original malware code. Additionally, once the discovery of the malware was publicized in the media, security experts recorded several incoming messages sent to the installed malware asking it to self-destruct. These clues point to a level of programming and operational sophistication that exceeds those usually found in criminal cyberattacks.
According to Israeli computer security firm CheckPoint, there is little doubt that the source of the malware was in Lebanon, while a number of programming clues point to Lebanese Shiite group Hezbollah as “a major player” in the operation. In a report published this week, CheckPoint reveals that most of the Israeli targets infected with the malware belong to data-storage and communications firms that provide services to the Israel Defense Forces. According to one expert in the firm, the malware designers took great care to avoid “a frontal attack on the IDF network”, preferring instead to target private entities that are connected to the Israeli military. More specifically, the web shells used to control compromised servers after successful penetration attempts were of Iranian origin. Additionally, the initial command and control servers that handled EXPLOSIVE appear to belong to a Lebanese company.
The head of CheckPoint’s security and vulnerability research unit, Shahar Tal, told Ha’aretz newspaper: “We are not experts on international relations and do not pretend to analyze the geopolitical situation in Lebanon”. But these attacks originated from there, and were specifically designed to infiltrate “systems that are connected to the IDF”, he added.
Filed under Expert news and commentary on intelligence, espionage, spies and spying Tagged with 0 Sophisticated malware found in 10 countries ‘came from Lebanon’, CheckPoint (Israel), computer hacking, Hezbollah, IDF, Israel, Lebanon, News, VOLATILE CEDAR