Venezuela military trafficking food as country goes hungry
Hannah Dreier, Joshua Goodman, AP, Jan 1 2017
In this Nov 14 2016 photo, a youth uses his pillow as a bag to collect rice from the pavement that shook loose from a food cargo truck waiting to enter the port in Puerto Cabello, Venezuela, the port that handles the majority of Venezuela’s food imports. As millions of Venezuelans go hungry this year, food trafficking has become one of the most lucrative businesses in the country. (Photo: Ariana Cubillos/AP)
PUERTO CABELLO, Venezuela – When hunger drew tens of thousands of Venezuelans to the streets last summer in protest, President Nicolas Maduro turned to the military to manage the country’s diminished food supply, putting generals in charge of everything from butter to rice. But instead of fighting hunger, the military is making money from it, an Associated Press investigation shows. That’s what grocer Jose Campos found when he ran out of pantry staples this year. In the middle of the night, he would travel to an illegal market run by the military to buy corn flour – at 100 times the government-set price. Campos said:
The military would be watching over whole bags of money. They always had what I needed.
With much of the oil country on the verge of starvation and malnourished children dying in pediatric wards, food trafficking has become big business in Venezuela. And the military is at the heart of the graft, according to documents and interviews with more than 60 officials, company owners and workers, including five former generals. As a result, food is not reaching those who most need it. The Pindo government has taken notice. Prosecutors have opened investigations against senior Venezuelan officials for laundering riches from food contracts through the Pindo financial system, according to several people with direct knowledge of the probes. No charges have been brought.
Now this will disgust you all even more than Szubin’s lies. This is the real Jewish crap:
Is This the Accidental Mastermind in the DNC Hack?
Patrick Tucker, ‘Defense One’, Dec 30 2017
The White House’s new list of sanctioned Russians includes a young Moscow-based hacker, much to her professed surprise. The list of characters that the White House is sanctioning for participating in the “Fancy Bear” DNC hacks reads like a casting call for a James Bond movie (the Roger Moore years.) A quick image search on the names turns up a handful of GRU officers in olive military uniforms, complete with red-piped epaulets, among others. But one company on the list stands out, and the founder, a young woman named Alisa Esage Shevchenko, is suddenly caught in the glare of a very unwanted spotlight. The White House, along with the Treasury Department and the DHS singled out Shevchenko’s company, Zorsecurity (aka Esage Lab), for providing the GRU with “technical research and development.” Shevchenko denies the accusations. Speaking to Forbes writer Thomas Fox-Brewster, she called them “sick.” On Twitter, Shevchenko claimed that the company went out of business more than a year ago.
Zorsecurity’s site is now blank, though at post time plenty of live HTML remained on the home page. Among other things, it advertises the company’s mission: “to protect Russian companies from professional computer attacks.” That’s the same mission the site listed on Apr 3 2015, when the site was archived. The page also notes Shevchenko’s first-place finish in a “competition for the breaking of critical infrastructure, held in the framework of an international conference Positive Hack Days 2014.” A quick search for zorsecurity.ru’s IP number takes you to 22.214.171.124, a modestly-designed page that serves as an anchor for more active social media accounts. Shevchenko worked at cyber security company Kaspersky from 2003 until 2009 before starting her own company called Esage Labs. At Kaspersky, she specialized in rootkits, according to a 2014 profile in Russian Forbes. A rootkit allows users to gain privileged access to a computer while hiding their presence on the network. Esage played a role in either creating or selling a program, Malwas, that has not been publicly released. The program allows a hacker to hop from computer to computer (or endpoints) to evade detection. Similar endpoint hopping was one characteristic of the Russian-backed attack on the Joint Chief’s non-classified email system in 2015. But it’s not unique to the DNC or the Pentagon hack. A representative from a company that the DoD called in to remediate the attacks said:
When you typically see these large-scale attacks, where you see these large amounts of lateral movement and especially when you have relatively tightly wound network controls, a lot of the time you don’t have the command-and-control architecture to be able to go in and see the attack, so the advance threat characteristics change to be more automated, a kind of pervasive deployment using common vulnerabilities and exploiting them widely.
Importantly, the government’s forensic case for the sanctions, and the accompanying appendix, does not link Shevchenko to any particular smoking guns. It makes references to various remote-access tools (named after integers) as well as a variant of a malware program called OnionDuke. Shevchenko’s material support could have come in the form of that OnionDuke variant, or the remote-access tools, or some other zero-day or bug along the way, or the Pindosi government could be making a mistake, as Shevchenko claims. In its lack of specificity connecting the individuals named to the actions and tools outlined, the report inadvertently pushes the reasonable reader to the lattermost conclusion. On a background call with reporters on Thursday, one senior administration official said that the evidence should be strong enough to “stand up in court.” So far, it resembles, to high degree, reports that have already come out publicly and serves as a poor indictment of anyone (at least according to many experts that have played a contributing role in the investigation.) None of that changes the consensus view among private researchers and the intelligence community, that Russian actors were indeed behind the DNC hack. As for Shevchenko, Forbes’ Brewster cited unnamed sources in Moscow as saying that she likely has sold zero-days to the government. Shevchenko has not responded to requests from Defense One or others. But her 2014 Forbes profile hinted at a somewhat nuanced moral character. At one point, she is asked about the possibility of submitting to a polygraph test, and she replies:
Hackers know how to get around it.
You may wonder what kind of cunt could write that. This is he: