comparemela.com

Next week and with the evolution fiercest lung associate professor a former Wilson Center fellow with university of maryland. At the Cannes Institute for publications. Also read part two to focus on russia and that focuses on the ukraine. To todays event to know about Russian Hackers and as an expert with that journalist based in moscow with that russian independent website working for the biggest russian news website at the time. And with the publication and with that refugee problem with cybersecurity in the islamic state. Getting an award in journalism and the stories have been cited in the New York Times and other respected publications. Those that are the most prestigious award. And also a fellow here at the moment we are pleased to have such a strong representation here. It is great to see you here. And then to get the news about russia. So now in december after three years to write these narrative stories about the asus influence and link to russia. And with those groups but the last two years reading the stories of the Russian Hackers. And for example this is an article from around the country for the russian cyberarmy. So then there were some stories. And over the last two years but sometimes with the company that provides services and in 2015 leaving russia. And the story about the russian cyberweapons. But in 2015 and with that definition but to bring in the minister of defense. But. [inaudible] but then with those services may be two months and then to change the name to work in the Government Company because there is the case with the interest of the russian state and those services in a public space and that maintenance from which we can understand it has its own cyberarmy. But but then to conduct cyberwar. In those two years of my researchers and with these corporations that this is professional criminal affliction. And that selection and those where those programs they compete with each other. And this is popular with the security guide and also and from russia but to instigate beyond those programmers by the military. To train those specialist and then to communicate with them. But then to prepare the course. But teaching those Computer Sciences and in order to release to support the american way of life. But the other way but in 2013 the Russian Defense minister so that defense minister published and one video, thank you. So that video that cybersoldier and then we give you the opportunity to have a comfortable accommodation in the spring of 2014 with that confrontation and with the technical universities or programmers or engineers without knowledge of software and then to explain with those method of cyberattacks that they have to walk off of the cyberattacks. One of those documents indicate and with the military as a representative to not tell anyone about them. And not only to put yourself aside. Also but isnt in english but with the cyberarmy from the minister of defense and with that development of special software. And with those criminals. And is a good example but then the computer could not play those videogame so needed Something Else to do. But together eventually they were interested but the interestonly group. And with this cybersecurity and have those Different Levels and now in a few years to become the best cybersecurity in russia and those from american prisons. Then to be in those crazy conditions to get that information to them. And they said in those safe houses across the country and knows about a few cases one of the russian cyberafter the cold war was the Intelligence Service to extract information. But there are hopes and then to be put in a room and is confident with the cyberweapons that could get out of control. Because of personal correspondence and for example the Critical Infrastructure but usually those groups by those cyberspecialist but it was from those who were not afraid. But with those criminals selections but those cybercrews and cybersecurity members with that 15 million from the russian bank but then they were thrown into moscow with the war chest with the diamond but altogether with about 15 different regions that the experts for this investigation and with those Group Leaders recruited so they failed to mention with the market layoff. Every morning except on the weekends every morning except on the weekends. [inaudible conversations] [inaudible conversations] [inaudible conversations] the leader of this group because of the banks. And in particular and also with the united states. Some of those said that she is insane. And with some publicity. But in my book to the similars to spy novels. Thank you. [applause] this is a fascinating window into that world im sure the audience has questions but for one you made a distinction between the professional selection and those that work as a criminal selection are they complete the separate . With that professional connection and then to work with the government. What are the chances you said that the cyberweapons will go out of control in the future but those very people trained to work on the russian government . Russia will have that story against the russian government as the group of hackers that now they are all in jail and with that group in russia but because if you work in russia you will be discovered. That is what they want to find the cybersecurity. He for. Have a lot of i know that casper ski have a lot of guys inside, they work in kaspersky and have possibility to make some decisions in this company. Thank you. Mikeser in, u. S. Senate staff. I wonder if you can talk about the probably one of the more wellknown hacks in russia which was mr. Medvedevs permanent account and i personal account and also got peskov if im not mistaken. Anything known about who might have done that and an example of real world effects where that played into the opposition mobilization and protests against the government in thank you. You say, in 2011, yaw. Recently. Medvedev . I believe. [inaudible question] palaces and so on. Ah. [inaudible question] yeah. Medvedev accounts is hacked by and once a question is about how does operate with oppositions . Well, [inaudible question] the real world effect of when that became public, known as a motivation towards antigovernment protests. We havent seep that level of protest since 2011. Theres some groups, i think some of these groups are working whose government who which have desks from administration, president , ap in russia, like his name is in russianed administration, he is the main figure by monetary internet and he in some investigations told that he was a man who did this make this decision to hack some positions like some other guys in russia. The hackers name who hocked some opposition in is his name is now i think he is in jail in germany. Ill just fill out that question. If i understood it correctly, maybe just a followup question, the video that you referring to made when they sent that the people sent a drone to look over medvedevs estate and all that, thats not hacking. Their research was not based on hacking. It was based on journalistic, forensic search of records of medvedev that were available online. But im wondering, are there i dont know. Are there hackers who work specifically maybe with the russian opposition . Is that something that happens . Maybe. Just to clarify. They sent a drone but also hacked mr. Medvedevs personal account, including the orders he had made for clothes and sneakers and so on and able to corroborate pictures of him at Public Forums wearing those exact items and the addresses where they were shipped to, which was not public information. It was obtained through hacking. Sir, i not know who maybe. So let see. Two more questions on that side. Lets take those okay. Hi, im very and a graduate student at georgetown. My question might be basic but you said if you knack russia you will either join the government or go to jail. Do you find that the hackers that are sent to jail just like the adage, theres no such thing as a drugfree prison, theres no such thing as a prison without hackers, do you think its an effective solution to jail or does it have any real impact on their impact there . Whether the hackers have any effect on the curbing the hacking situation. This is a big question of how jail how people dont help people. In recent years, we have in russia we have a lot of stories when hackers going to jail, and we have a stories when hackers is not published stories when hackers work in on security cells because they want to go into jail. Because they they want to . Because they are they dont want. They dont want to. Yeah. What happens if they good to jail . Can they maybe continue hacking . No. They dont have access. Yeah. Right there in the back we have two questions. Thank you, good morning. Could you clarify, please, when the government outreach to hackers began, you gave a couple different dates and authorities. I know this will be a tough one but can you just give us an estimate since that date, how many hackers the government has recruited and who theyre primary targets are . Thank you. Ten years ago i talked about as i know, theres some of 300, 400 people working around the country, and to your question about main target, dont know because they can like in this American Election hacking, we can talk here about the situation of the hackers. This is maybe the espionage around every country, every guy, every journalist around the i myself is a target because from things i know from ap investigation. Journalists expect political people. Im sorry. When would you say this government recruiting really began with intensity . Began . Yeah to get these folks to help. Three years, i think. Thank you. Okay. Lets see. Right there was one question in the back hat i promised to take and then move forward from there. My name is john. I have a you mentioned both the criminal and the professional hacking organizations, how they recruited. Are the type of hacking activities you may have talked about it and i missed it for example, like, for certain type of hacking activities more oriented from the criminalbased hacking organizations rather then professional. For example, the criminal base may be a good type to use for certain activities, to provide plausible deniability which harder to trait back to the government than if youre able to trace it back later to, like, governorsponsored type entity. As i know, professional science controls, they popular and the selection criminal hackers were not these attacks when because they need to have a lot of time to explore and find abilities. Okay. I think we had right there. Thank you very much for your preparation. I am Research Fellow another Johns Hopkins university. I have brief question. My only email was hacked in 2014 by cyber. Could you explain more about this organization because after it was hacked so my emails were released and it wasnt even a story on tv so probably they work for the government. Can you focus on specific their work in ukraine . Do they try to check the ground and then just spread it to other countries, and cyber backup, please. Yes, as i think is you will be a target. Yes . Phishing . What kind of an attack. Phishing attack . Guest no, they just corrected and i watched the story, and its interesting because we did some project and National Endowment for democracy and it was like at the beginning of the revolution but it had nothing to do with this. It was a year withit started. Had nothing to do but they tried to connect is as we were the net was behind financial of our organization and we were among those who organized well, its a way that is famous but still. Basically they broke they kicked they broke it and used this mail so it was interpreted in their understanding it was felt, of course, but like basic thank you. Yeah. Cyber beckett is famous part of russian, i think. They hacked a lot of ukrainian journalists and some reporter whos reporters who work in i think you know him, the expert from conflicting Intelligence Organization who investigate russian connections. Cyber beckett is a part of russian hacking groups but i dont know what this is a defensive minister of defense or now sorry. Im curious, as you talk about it, do do these groups sort of receive a Team Assignment . Your group is going to work on ukrainian journalists and bloggers. Are they kept kind of disconnected and separate . Because the more you connect, the easier the information will leak out. How does it work. All Russian Cyber Army and this groups are really separated. No one building where theyre all hackers sit and work all day. As president putin say, told the directors of universities in beginning of last year, the hackers who can so, that recruiting picture we saw, the happy military guy sitting, it doesnt work that way. No. All right. Right there. The lady in the middle. Hi. Thank you for your presentation. I actually have couple of questions, very briefly. First, this is something you alluded to, especially through criminal recruitment, theres obviously the question of the allegiances of the hackers. If the most control seems to happen through the point of the gun, right . In order to do that there are any highranking fbi officers or hierarchy that you have got absence of who are experts in hacking themselves in order to be able to know what these hackers are doing some how does that supervision happen . Because to me the even though theyre working on the project of hack for the russian government, theyre verydayold also create some sort of additional insurance, i presume. So i dont know if you have got absence of that and how that works but just curious. And the second is, are you mostly focusing on Russian Hackers located in russia itself or all over the world and if you have got absence of Geographic Scope of where they are because you dont have to be in same room to do the work they do. Thank you. When i say Russian Hackers, i mean the guys who type in russian in ukraine or belarus and pakistan, i think. Can you repeat the first question, please . The hierarchy. How are they supervised that work . You have to be an expert, right . They stay experts, yeah. I think you know that have the named where i dent know how its do it in russian. Maybe center of information security. A lot of experts who are good in this and some of this guys, as some investigations working of with hackers, who are, as we know, working with this guy, his nickname is forp and his have a lot of hacking big ground from early 90s, i think. Then in the middle of 25th 25th year he became expert. So, the reason the hackers often sit, as you said in ukraine or kazakhstan, is is that to create a coverup. No, because they bomb here. These are okay. Not because they work in ukraine. I think we had question right there let go to the we have three questions in a row here. Let go one after the other. Thank you. I want to come back the presentation and spoke about schedules. Were established by minister of defense. Right . And it was advertised as a special department, and those who received a good Technical Education would be enrolled in Different Research on behalf of national defense. Computerbased research and then so on. You say that they possibly may take part in hacking attacks as well. The rest of your speech you spoke mostly about the hacking attacks of those belong the question do is you know it was proved that different hacker attacks or different Cyber Threats were produced by those who research . Really difficult question because its not really its really difficult to root attack. Really difficult and we hear, we can only talk about motivation, not talk about attacks from minister or defense of fsby. What do you mean motivation of Russian Security services, some political experts or hacking some emails really big fact. Okay. There was a lady behind there. Thank you. I have a question about process. So youre a journalist, working with medusa, which is based, if im not incorrect in latvia. Outside of russia. So i wonder how what is it like for you to work as a journalist on these topics and what do you ski as do you see as the roll of the periphery countries as a base, perhaps are, for russian independent journalism. Thank you. I guess medusa is based in latvia, but i live in moscow, as a because we writing about russia and if we dont live here, we dont understand anything. This topic is really difficult in russia but this topic is difficult in every country, i think. Most of time of my reporting on this term is wait, wait, wait, wait for some guy who talk me to some to tell me that he need to talk with this guy or i think its a difficult topic for everyone but from what we hear about what happens in russia, how hard it is to be an independent journalist there, do you fine that this do you have a feel its actually dangerous for you to report this topic . No. If you go to chechneya and if you have meetings with radical groups and lgbt but this is i dont know what they think about this investigation and only response is this guy from minister of defense at the top, then who called me and said that you dont need to investigate, and finally a response from the government. We had a question right here. If you could wait for the mic. Hello. Thank you for being here. Im constantine. My question is, it seems like its very polarized in terms of when people think about russias meddling or supposed meddling in election andow write for i guess an opposition media source. Do you think based on evidence, what is your opinion based on evidence of the role of what was the role, the extent of the role of russian meddling in this election from dnc hacking to i think now you have the news about the supposed dossier on trump. So what is your opinion as somebody who writes for an opposition source and yet obviously in russia, people who are supporting putin, they think its just ridiculous, or preposterous. So what its your open view of russias extent of involvement or meddling . Thank you. I dont really like to talk about this because you have opinion about this and you read a lot of articles about this, but my opinion will be in fact what i know and what i investigate, that this is part that we have not 100 of Russian Hackers hacked Hillary Clinton emails. But of course russia and have information for to do this, russian cyberarmy, Russian Hackers who are this my opinion. Ill also say i dont know what you would say but we have had the publisher of medusa and the possibly would have objected to medusa being in the position media. Think they just say theyre simply good media, good publication, but in the current landscape we look for the opposition, they would say theyre. No question right there. Hi. Jeff hahn, a protective intelligence analyst. Much of the conversation about Russian Hackers has been dominated about the election hacking, profession warfare and propaganda. Over the last coup of year wed have seen an increasing number of hacks in western superukraine which are remarkably sophisticated and growing which are targeting infrastructure and appear to be almost swan someone testing how to cause massive destruction on a kinetic level and shutting down infrastructure. Last year ukraine was hate by crash override, which disrupted the iranian program. My question is, while were seeing these disinformation and propaganda on the surface is russian also investing heavily in kinetic Cyber Weapons which could be deployed whenever they feel is necessary . I think yes. Okay. Thanks for your brevity. Now have time for one more question. Lets go to this question right here. Thank you for your good work, sir. Can you clarify because of the science squad dragons are they squadrons are the reporting to the diu or other agencies in. Its a separate squadron who which in minister of defense or squadron who is some other part of minister of defense. So theyre separate from the gru. No. One squadron have in gru, other squadron is working with other department. A lot of a lot of squadrons. I think we have just come to the conclusion of the meeting. I want to thank we all agree well be looking forward your book very much. Thank you. [applause] [inaudible conversations] tonight, state of the state address from new Jersey Governor Chris Christie and then allege investigation of Russian Hackers and later a discussion about Law Enforcement and civil rights from the null convention of the Muslim Public Affairs council. In his final state of the state address new Jersey Governor Chris Christie talks about his administrations accomplishments, including reforms to the criminal justice system, property taxes and economic revitalization in camden and atlantic city. He also discussed the response to super storm sandy in 2012. His successor, democrat phil murphy will be sworn in on tuesday

© 2024 Vimarsana

comparemela.com © 2020. All Rights Reserved.