Greg Miller - The Apprentice

Здесь есть возможность читать онлайн «Greg Miller - The Apprentice» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

The Apprentice: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «The Apprentice»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

From Pulitzer Prize-winning Washington Post reporter Greg Miller comes an exclusive book uncovering the truth behind the Kremlin’s attempt to destroy Hillary Clinton and help Donald Trump win the presidency, Trump’s steadfast allegiance to Vladimir Putin and Robert Mueller’s ensuing investigation of the president and his entourage.This exclusive book uncovers the truth behind the Kremlin’s interference in Donald Trump’s win and Trump’s steadfast allegiance to Vladimir Putin. Drawing on interviews with hundreds of people in Trump’s inner circle, the intelligence communities, foreign officials, and confidential documents. The Apprentice offers exclusive information about:• the hacking of the Democrats by Russian intelligence; • Russian hijacking of Facebook and Twitter; • National Security Adviser Michael Flynn’s hidden communications with the Russians; • the attempt by Jared Kushner, Trump’s son-in-law, to create a secret backchannel to Moscow using Russian diplomatic facilities; • Trump’s disclosure to Russian officials of highly classified information about Israeli intelligence operations; • Trump’s battles with the CIA and the FBI and fierce clashes within the West Wing; • Trump’s efforts to enlist the director of national intelligence and the director of the National Security Agency to push back against the FBI’s investigation of his campaign; • the mysterious Trump Tower meeting; • the firing of FBI Director James Comey; • the appointment of Mueller and the investigation that has followed; • the internal battles within Trump’s legal camp; • and Trump’s jaw-dropping behaviour in Helsinki.Deeply reported and masterfully told, The Apprentice is essential reading for anyone trying to understand Vladimir Putin’s secret operation, its catastrophic impact, and the nature of betrayal.

The Apprentice — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «The Apprentice», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

The AIVD had achieved what cyber spies call “exquisite access.” It was in the process of carefully exploiting this penetration a year later that the Dutch began to see a suspicious new stream of data flowing into the SVR system. AIVD spies traced its origin to a Democratic National Committee server in Northern Virginia.

The DNC functions as the war chest and back office of the Democratic Party, raising money and helping to field and fund candidates across the country. In presidential races, it oversees the party’s primaries, its debates, its convention, and the process of selecting its nominee for president. The breach of its systems was at that stage almost imperceptible, intermittent signals between a pair of computers on opposite sides of the Atlantic. In reality each ping was a silent betrayal, an expression of obedience by a DNC server to a distant machine secretly working for the Kremlin.

The Russian hackers’ forays into the DNC network had easily eluded the organization’s security, but U.S. intelligence agencies also failed to see the breach, even though the hackers behind it were already well known, having pulled off a spree of attacks in previous months on high-profile targets including the Pentagon, the State Department, and the White House—operations the Dutch had also detected and warned the Americans about. Certainly the DNC wasn’t as alarming a target as those repositories of U.S. government secrets, but the failure to detect the intrusion would mean that by the time it was first noticed by the DNC, Moscow was already tunneling toward troves of material, including internal DNC emails and research files, that it would use to sow chaos in the U.S. election.

The Dutch relayed what they had learned to the National Security Agency, the massive U.S. spy organization responsible for all forms of electronic espionage. The AIVD turned over images of the hackers, IP addresses (numeric codes that correspond to specific computers on the network), and other information that the NSA was able to corroborate.

From that moment in 2015, the scale of the Russian operation and its consequences for the United States would only expand. But at the time, U.S. officials saw the alert about the penetration of the DNC as falling into the category of conventional espionage, the sort of data gathering that Russia, China, and every other country with enough hacking capability—including the United States—pursues. Such probing of government, institutional, and corporate networks was so persistent and aggressive by state-level hacking enterprises that the adversaries involved acquired distinct reputations. The Russians were seen as the most sophisticated and—ironically, given how the year would play out—adept at hiding their tracks. China was “noisier,” less concerned with getting caught. While improving, Iran and North Korea were second-tier players. Attacks on think tanks and political organizations like the DNC were a problem, but defending against them was not necessarily the job of the U.S. government, which had enough on its hands fending off the equally frequent assaults on higher-stakes targets: classified networks, black budget programs, weapons designs.

Protecting those assets required constant vigilance. In November 2014, less than a year before the DNC attack, the White House experienced a Russian offensive so brazen that American officials saw it as a turning point in Kremlin tactics. The hackers gained entry with a common “spearphishing” ruse—sending bogus emails with disguised links or attachments that, once clicked, led to a malware-infested site set up to gather passwords and other sensitive information. The most striking aspect of the intrusion wasn’t that Russian hackers got into a White House network—in this case an unclassified email system that allowed White House staff to correspond when the issue at hand wasn’t sensitive, such as writing your husband that you’d be home late, or a congressional staffer that you’d received her letter. What was exceptional was how they reacted when confronted in that digital space by American cyber defenders. Rather than retreat and move on as the Americans patched holes, the Russian operatives stayed and fought. Every time the Americans severed the Russians’ connection to the malware they had installed—key to their survival inside the White House network—the intruders managed to repair the link or create a new one.

The NSA team had a remarkable penetration of its own: through secret “implants”—the software equivalent of a Trojan horse, bits of pre-positioned code—the Americans were able to monitor the Russians’ computers and see their adversaries’ every move in advance, as if watching them wheel new weapons into position before firing. The advantage proved decisive, but only after a protracted fight. At a 2017 security conference, Richard Ledgett, who was deputy director of the NSA at the time, described the battle as the online equivalent of “hand-to-hand” combat and a game changer unlike any the agency had ever waged.

The DNC penetration detected by the Dutch did not prompt such a daring showdown. The information was noted on internal NSA report logs and shared with other agencies, including the FBI. On August 6, 2015, an agent from the FBI’s Washington, D.C., field office called the DNC’s front desk and asked to speak with the “person in charge of technology.” Inevitably, he was transferred to the computer help desk and put in touch with an IT contractor, Yared Tamene.

FBI special agent Adrian Hawkins told Tamene that there were signs of compromise in the DNC system and provided some computer IP addresses that he said would help to locate the intrusion. But the address was the one the DNC used for its entire network—tied to more than a thousand laptops, servers, and phone lines. Tamene was a former college math instructor who had been an IT consultant at the DNC for four years but was no cybersecurity expert. He had heard plenty about how individuals were conned out of their passwords by hackers pretending to be from the government, a bank, or a credit card company, and was wary. He pressed Hawkins to provide proof of his position, but remained unswayed by the agent’s attempts to convince him.

The call lasted several minutes, as Hawkins outlined in somewhat cryptic terms the bureau’s concerns about the breach. He wanted to know whether the committee had detected the intrusion on its own and done anything about it. Tamene hesitantly acknowledged that the committee had endured some phishing attacks, but dodged detailed questions about the organization’s staff and systems. Hawkins then offered the first hint—although an indirect one—that the bureau suspected Russia. Check for malware associated with “the Dukes,” he said, an industry nickname for the hacking group with ties to Moscow. Tamene seemed unfamiliar with the moniker but agreed to have a look. After hanging up, he and a colleague did a quick internet search, read up on the group’s methods, and performed a cursory search of DNC log files. They found nothing and Tamene couldn’t help wondering whether he had fallen for a prank. Tamene informed his supervisor, Andrew Brown, the DNC’s chief technology officer, of the incident.

The disconnect persisted through subsequent interactions—that is, when both sides managed to connect at all. In October, two months after he first called the DNC, Hawkins left a series of voice mails for Tamene, who ignored them, later explaining he had nothing new to report. Behind the scenes, he appealed to Brown for help, telling him, “We need better tools or better people.” A month later, in November, the FBI agent finally got through, only to be told by Tamene that the DNC network appeared clean. Hawkins countered by again providing the DNC address, saying it was “calling home” to Russia. Tamene took this warning more seriously. He and his team began exploring whether there were gaps in the DNC’s defenses—bad search parameters, problems with the firewall—that were preventing the IT department from detecting the intrusion. But again, his follow-up checks yielded no evidence of compromise. It would later turn out that the FBI’s internal deliberations were so slow that by the time Hawkins had permission to pass along one IP address, the Russians had switched to another.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «The Apprentice»

Представляем Вашему вниманию похожие книги на «The Apprentice» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «The Apprentice»

Обсуждение, отзывы о книге «The Apprentice» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x