The biggest leak in the United States reveals that the Russian company found the real murder in the information about the gunsteemCreated with Sketch.

in data •  6 years ago 

The most serious case of confidential disclosure in the history of the United States is actually Russia's help?

Not only, it can even be said that the Russians found it.

In August 2016, two researchers at Kaspersky Lab received an encrypted private message from the mysterious account HAL999999999 on Twitter .

The two men stalked and found the identity clues of the account owner, pointing directly to the US intelligence department.

At the time, there was an incident in which the National Security Agency (NSA)'s secret hacking tools were hanged on online auctions. Kaspersky Lab reported the information to the NSA.

In the end, a leak of 50 TB of confidential data and a time span of 20 years emerged, and Harold Martin , known as Snowden II, was brought to justice.

Ironically, NSA has always regarded Kaspersky Lab as a major hidden danger in the United States. Kaspersky employees live under the supervision of US intelligence agencies throughout the day. Instead, they provided intelligence to the Americans.

The information about the gun is leaking

US media POLITICO reported that on August 13, 2016, the Twitter account HAL999999999 issued two encrypted private messages to two researchers at Kaspersky Lab.

At first, they did not notice the two private letters. After all, without paying attention to the other party, the message goes directly to the request folder.

Three days later, the researchers on the vacation discovered the private message:

One is to ask for a dialogue with “Yevgeny”; the other is “Shelf life, three weeks”.

Yevgeny Kaspersky is the name of the CEO of Kaspersky Lab (Given Name).

During the same period, NSA's secret hacking tools were publicly auctioned by the anonymous “Shadow Brokers” and sold in 10 bitcoins (then worth $24,000). The news is overwhelming.

The researchers also saw the news, compared the time of the private letter, and found that it was 30 minutes before the NSA hacking tool leaked online.

In addition, there is a man's back on the avatar of the mysterious account, and a CD with the words TAO2.

TAO, Tailored TAO is short for Tailored Access Operations, which is a highly confidential department under the NSA.

The researcher replied to the private message and asked if there was any encryption key that could be used to contact, but found that the other party was blacked out and the private message could not be sent out.

Perhaps it was the drive of curiosity that could not be contacted, and the researchers began investigating the identity of the account owner.

First, Google searched for an unspoken website with a treaty cannon advertisement, also published by a user named HAL999999999. The user has a real photo (it turns out to be Martin himself).

Continuing the search, the researchers found a LinkedIn account called Hal Martin. Personal data shows that he is a researcher at Annapolis Junction and a technical consultant and investigator for "aggressive network problems."

The information does not directly indicate the NSA, but shows that Hal Martin has served as a consultant for the US Department of Defense and intelligence.

So the two handed over the information they found to the National Security Agency (NSA).

In the same year, Martin Harold was arrested and the fact that he worked in the TAO department was verified. The FBI applied for a search warrant for Martin’s house and property, using Twitter’s private letter as evidence.

In the 20 years from 1996 to 2016, he has stolen up to 50 terabytes of confidential data and has not been discovered.

Stewart Baker, who served as NSA's general counsel in the 1990s, said that before everyone thought that the review mechanism had become stricter, Martin was discovered.

The emergence of Kaspersky became a wonderful turning point in this case, which means that the intelligence department did not have the ability to monitor internal personnel for self-stealing.

Obama and the Trump administration have also accused Kaspersky and Russian intelligence agencies of colluding with stealing NSA secrets.

Even this time Kaspersky helped the US government catch Martin, it is difficult to lift people's suspicions: they may still be used by Russian intelligence agencies in the future.

50TB stealing case

The leaked protagonist Martin, a 1964-born uncle, lives in Maryland.

He served on the US Navy's Seattle carrier and received the Kuwait Liberation Medal. Later, Martin was transferred to the US Marine Corps, where he had access to some confidential information from the United States.

After retiring from the Navy, Martin has changed seven jobs, but his career has been stable in the intelligence community, the company's customers are government departments, so you can also access the US state secrets, including the use of some US government-defined Hacking software.

He was an employee of Booz Allen Consulting when he was in trouble . The company is a US defense project contractor. Prior to Martin, the company's most famous employee was the prism door protagonist Edward Snowden .

Since August 1996, Martin has been stealing secret information from the National Security Agency (NSA), the US Central Intelligence Agency (CIA), and the US Army's "Network Command," which covers how the US National Security Agency invades foreign computers. How to protect the information of the US computer system, as well as the various kinds of intelligence about extremists and terrorists, and the advantages and disadvantages of the US military network operations.

In addition, Martin was a member of the National Security Bureau's “Top Hacking Team” and “Specific Invasion Team”, which is responsible for making and using specific software to invade foreign computer systems and steal foreign intelligence. During this team work, Martin also quietly remembered the way they work.

It is equivalent to saying that the US security department is stealing information from abroad, and Martin is stealing information from the US security department.

The total amount of these materials reached 50 TB. However, Martin did not expose the information to the media like Snowden, but quietly hid it in his own home and in the car - which also led Martin's lawyer to explain to him after the incident, Martin It’s just a bit of a psychological problem, it’s a collection of jealousy, and it’s not ready to leak state secrets.

It was not until August 2016 that Martin’s collection activities took place 20 years later. The FBI and SWAT Special Police Force formed a detachment of more than 20 people, and they were fully armed and ran to the Martin home to search.

The squad had been searching at Martin's house until three or four in the morning, and Martin's neighbors found that there were several vans in the house. They found thousands of pages of paper-based documents, as well as electronic versions of files on dozens of computers, including six documents from sensitive intelligence.

After that, they handcuffed Martin and took it away.

The 50 TB data seized by the FBI and SWAT Special Police Forces also includes the cyber attack tool "Equation Group" sold by Shadow Brokers.

The encryption of the equations is very complicated and was once suspected to be related to the National Security Agency. Kaspersky Lab called it "one of the most sophisticated cyberattack tools in the world" and likes to attack computers in Iran, Russia, Pakistan, Afghanistan, India, Syria and Mali. According to Kaspersky, as of 2015, the equation The group has launched at least 500 attacks in 42 countries.

However, there is no evidence that the equations sold by the shadow broker were obtained from Martin, so Martin was not charged with espionage.

The US security department was once again shocked. The Pentagon pressure put the then US President Barack Obama out of the job of the National Security Director Michael Rogers, but Obama did not agree. Martin himself was also accused of 20 counts for stealing US state secrets. Each of his charges may be detained for 10 years in prison.

After two years of pulling back and forth in court, Martin finally pleaded guilty at the beginning of last year.

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order: