intelligence community, led the researchers to wonder if Martin was connected to Shadow Brokers. The Twitter messages, along with clues Kaspersky researchers found that linked the Twitter account to Martin and his work in the U.S. Shadow Brokers, which is believed to be connected to Russian intelligence, said it had stolen the material from an NSA hacking unit that the cybersecurity community has dubbed the Equation Group. The timing was remarkable - the two messages arrived just 30 minutes before an anonymous group known as Shadow Brokers began dumping classified NSA tools online and announced an auction to sell more of the agency’s stolen code for the price of $1 million Bitcoin. The message didn’t indicate the reason for the conversation or the topic, but a second message following right afterward said, “Shelf life, three weeks,” suggesting the request, or the reason for it, would be relevant for a limited time. 13, 2016, asked one of the researchers to arrange a conversation with “Yevgeny” - presumably Kaspersky Lab CEO Eugene Kaspersky, whose given name is Yevgeny Kaspersky. After each researcher responded to the confusing messages, HAL999999999 blocked their Twitter accounts, preventing them from sending further communication, according to sources. The messages, which POLITICO has obtained, are brief, and the communication ended altogether as abruptly as it began. prosecutors believe was Martin used an anonymous Twitter account with the name “HAL999999999” to send five cryptic, private messages to two researchers at the Moscow-based security firm. He’s been charged with 20 counts of unauthorized and willful retention of national defense information, each of which carries up to 10 years in prison. 27, 2016 following a search of his home and was subsequently indicted in February 2017. Martin, who is set to go to trial in June, was arrested Aug. “We all thought got caught by renewed or heightened scrutiny, and instead it looks as though he got caught because he was an idiot,” he told POLITICO.Īs for Kaspersky, news about its assistance in apprehending Martin likely won’t satisfy detractors who believe the company can still be a tool of Russian intelligence even if it occasionally assists the U.S. It’s also discouraging, he noted, that the NSA apparently still hasn’t “figured out a good way to find unreliable employees who are mishandling some of their most sensitive stuff.” intelligence community, disclosed to them that they had this problem,” said Stewart Baker, general counsel for the NSA in the 1990s and a current partner at Steptoe and Johnson. “It’s irony piled on irony that people who worked at Kaspersky, who were already in the sights of the U.S. But even while the FBI was doing this, the Russian firm was tipping off the bureau to an alleged intelligence thief in the government’s own midst. government computers on national security grounds. Under both the Obama and Trump administrations, officials have accused the company of colluding with Russian intelligence to steal and expose classified NSA tools, and in 2016 the FBI engaged in an aggressive behind-the-scenes campaign to discredit the company and get its software banned from U.S. government has woven about the Russian company in recent years. The revelation also introduces an ironic turn in the negative narrative the U.S. It indicates that the government’s own internal monitoring systems and investigators had little to do with catching Martin, who prosecutors say took home an estimated 50 terabytes of data from the NSA and other government offices over a two-decade period, including some of the NSA’s most sophisticated and sensitive hacking tools. The company’s role in exposing Martin is a remarkable twist in an increasingly bizarre case that is believed to be the largest breach of classified material in U.S.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |