Get subscribed to our newsletter
Get interesting updates to your email inbox.
Washington, November 2: The Russia hackers who upended the U.S. presidential election had ambitions well beyond Hillary Clinton’s campaign, targeting the emails of Ukrainian officers, Russian opposition figures, U.S. defense contractors and thousands of others of interest to the Kremlin, according to a previously unpublished digital hit list obtained by The Associated Press.
The list provides the most detailed forensic evidence yet of the close alignment between the hackers and the Russian government, exposing an operation that stretched back years and tried to break into the inboxes of 4,700 Gmail users across the globe – from the pope’s representative in Kiev to the punk band Pussy Riot in Moscow.
“It’s a wish list of who you’d want to target to further Russian interests,” said Keir Giles, director of the Conflict Studies Research Center in Cambridge, England, and one of five outside experts who reviewed the AP’s findings. He said the data was “a master list of individuals whom Russia would like to spy on, embarrass, discredit or silence.”
The AP findings draw on a database of 19,000 malicious links collected by cybersecurity firm Secureworks, dozens of rogue emails, and interviews with more than 100 hacking targets.
Secureworks stumbled upon the data after a hacking group known as Fancy Bear accidentally exposed part of its phishing operation to the internet. The list revealed a direct line between the hackers and the leaks that rocked the presidential contest in its final stages, most notably the private emails of Clinton campaign chairman John Podesta.
The issue of who hacked the Democrats is back in the national spotlight following the revelation Monday that a Donald Trump campaign official, George Papadopoulos, was briefed early last year that the Russians had “dirt” on Clinton, including “thousands of emails.”
Kremlin spokesman Dmitry Peskov called the notion that Russia interfered “unfounded.” But the list examined by AP provides powerful evidence that the Kremlin did just that.
“This is the Kremlin and the general staff,” said Andras Racz, a specialist in Russian security policy at Pazmany Peter Catholic University in Hungary, as he examined the data.
“I have no doubts.”
The new evidence
Secureworks’ list covers the period between March 2015 and May 2016. Most of the identified targets were in the United States, Ukraine, Russia, Georgia and Syria.
In the United States, which was Russia’s Cold War rival, Fancy Bear tried to pry open at least 573 inboxes belonging to those in the top echelons of the country’s diplomatic and security services: then-Secretary of State John Kerry, former Secretary of State Colin Powell, then-NATO Supreme Commander, U.S. Air Force Gen. Philip Breedlove, and one of his predecessors, U.S. Army Gen. Wesley Clark.
The list skewed toward workers for defense contractors such as Boeing, Raytheon and Lockheed Martin or senior intelligence figures, prominent Russia watchers and _ especially _ Democrats. More than 130 party workers, campaign staffers and supporters of the party were targeted, including Podesta and other members of Clinton’s inner circle.
The AP also found a handful of Republican targets.
Podesta, Powell, Breedlove and more than a dozen Democratic targets besides Podesta would soon find their private correspondence dumped to the web. The AP has determined that all had been targeted by Fancy Bear, most of them three to seven months before the leaks.
“They got two years of email,” Powell recently told AP. He said that while he couldn’t know for sure who was responsible, “I always suspected some Russian connection.”
In Ukraine, which is fighting a grinding war against Russia-backed separatists, Fancy Bear attempted to break into at least 545 accounts, including those of President Petro Poroshenko and his son Alexei, half a dozen current and former ministers such as Interior Minister Arsen Avakov and as many as two dozen current and former lawmakers.
The list includes Serhiy Leshchenko, an opposition parliamentarian who helped uncover the off-the-books payments allegedly made to Trump campaign chairman Paul Manafort – whose indictment was unsealed Monday in Washington.
In Russia, Fancy Bear focused on government opponents and dozens of journalists. Among the targets were oil tycoon-turned-Kremlin foe Mikhail Khodorkovsky, who spent a decade in prison and now lives in exile, and Pussy Riot’s Maria Alekhina. Along with them were 100 more civil society figures, including anti-corruption campaigner Alexei Navalny and his lieutenants.
“Everything on this list fits,” said Vasily Gatov, a Russian media analyst who was himself among the targets. He said Russian authorities would have been particularly interested in Navalny, one of the few opposition leaders with a national following.
Many of the targets have little in common except that they would have been crossing the Kremlin’s radar: an environmental activist in the remote Russian port city of Murmansk; a small political magazine in Armenia; the Vatican’s representative in Kiev; an adult education organization in Kazakhstan.
“It’s simply hard to see how any other country would be particularly interested in their activities,” said Michael Kofman, an expert on Russian military affairs at the Woodrow Wilson International Center in Washington. He was also on the list.
“If you’re not Russia,” he said, “hacking these people is a colossal waste of time.”
Working 9 to 6 Moscow time
Allegations that Fancy Bear works for Russia aren’t new. But raw data has been hard to come by.
Researchers have been documenting the group’s activities for more than a decade and many have accused it of being an extension of Russia’s intelligence services. The “Fancy Bear” nickname is a none-too-subtle reference to Russia’s national symbol.
In the wake of the 2016 election, U.S. intelligence agencies publicly endorsed the consensus view, saying what American spooks had long alleged privately: Fancy Bear is a creature of the Kremlin.
But the U.S. intelligence community provided little proof, and even media-friendly cybersecurity companies typically publish only summaries of their data.
That makes the Secureworks’ database a key piece of public evidence – all the more remarkable because it’s the result of a careless mistake.
Secureworks effectively stumbled across it when a researcher began working backward from a server tied to one of Fancy Bear’s signature pieces of malicious software.
He found a hyperactive Bitly account Fancy Bear was using to sneak thousands of malicious links past Google’s spam filter. Because Fancy Bear forgot to set the account to private, Secureworks spent the next few months hovering over the group’s shoulder, quietly copying down the details of the thousands of emails it was targeting.
The AP obtained the data recently, boiling it down to 4,700 individual email addresses, and then connecting roughly half to account holders. The AP validated the list by running it against a sample of phishing emails obtained from people targeted and comparing it to similar rosters gathered independently by other cybersecurity companies, such as Tokyo-based Trend Micro and the Slovakian firm ESET.
The Secureworks data allowed reporters to determine that more than 95 percent of the malicious links were generated during Moscow office hours – between 9 a.m. and 6 p.m. Monday to Friday.
The AP’s findings also track with a report that first brought Fancy Bear to the attention of American voters. In 2016, a cybersecurity company known as CrowdStrike said the Democratic National Committee had been compromised by Russian hackers, including Fancy Bear.
Secureworks’ roster shows Fancy Bear making aggressive attempts to hack into DNC technical staffers’ emails in early April 2016 – exactly when CrowdStrike says the hackers broke in.
And the raw data enabled the AP to speak directly to the people who were targeted, many of whom pointed the finger at the Kremlin.
“We have no doubts about who is behind these attacks,” said Artem Torchinskiy, a project coordinator with Navalny’s Anti-Corruption Fund who was targeted three times in 2015. “I am sure these are hackers controlled by Russian secret services.” (VOA)
The new medical colleges being opened in Uttar Pradesh will be named after saints and sages.
The state government has issued an order naming four district hospitals that are being converted into medical colleges.
These district hospitals are in Bijnor, Fatehpur, Chandauli, and Siddharth Nagar.
The Bijnor medical college has been named after Mahatma Vidur, a philosopher during the Mahabharata era and uncle of the Pandavas and Kauravas.
The Chandauli medical college has been named after Baba Keenaram, said to be the founder of the Aghori sect.
The Siddharth Nagar district hospital will be called Madhav Prasad Tripathi Medical College after the BJP politician from the region. Tripathi, popularly known as Madhav Babu, was also the first Uttar Pradesh BJP chief. He was elected MP from Domariyaganj in 1977, besides being two times Jan Sangh MLA and also a member of the UP legislative council.
The Fatehpur hospital has been named Amar Shaheed Jodha Singh Ataiya Thakur Dariyawn Singh Medical College, after the freedom fighter of 1857.
It is said that he was among the first to use Guerrilla warfare against the British, as taught by freedom fighter Tatya Tope.
Meanwhile, according to official sources, the medical college in Deoria will be named after Maharishi Devraha Baba and the medical college of Ghazipur in the name of Maharishi Vishwamitra.
The medical college of Mirzapur will be in the name of Maa Vindhyavasini, the medical college of Pratapgarh in the name of Dr. Sonelal Patel and the medical college of Etah will be named after Veerangana Avantibai Lodhi. (IANS/JB)
Keywords: Medical Colleges, Uttar Pradesh, Yogi Adityanath, India, Politics
Former Pakistan captain Inzamam-ul-Haq has picked India as the favourite to win the ongoing ICC Men's T20 World Cup in Oman and United Arab Emirates (UAE).
Inzamam feels that the Virat Kohli-led India have a greater chance of winning the trophy as the conditions in the Gulf nations are similar to the subcontinent, which makes India the most dangerous side in the event, according to Inzamam.
"In any tournament, it cannot be said for certain that a particular team will win' It's all about how much chance do they have of winning it. In my opinion, India have a greater chance than any other team of winning this tournament, especially in conditions like these. They have experienced T20 players as well," said Inzamam on his YouTube channel.
He said more than the Indian batters, the bowlers have a lot of experience of playing in the conditions. The Indian Premier League (IPL) was played recently in UAE and most of the Indian bowlers did well in that leg.
Inzy heaped praises on the Men in Blue for the confident manner in which they chased the target against Australia on a challenging track without needing Kohli's batting prowess.
"India played their warm-up fixture against Australia rather comfortably. On subcontinent pitches like these, India are the most dangerous T20 side in the world. Even today, if we see the 155 runs they chased down, they did not even need Virat Kohli to do so," he added.
Though he did not pick any favourite, Inzamam termed the India-Pakistan clash in the Super 12 on October 24 as the 'final before the final' and said the team winning it will go into the remaining matches high on morale,
"The match between India and Pakistan in the Super 12s is the final before the final. No match will be hyped as much as this one. Even in the 2017 Champions Trophy, India and Pakistan started and finished the tournament by facing each other, and both the matches felt like finals. The team winning that match will have their morale boosted and will also have 50 percent of pressure released from them," Inzamam added. (IANS/JB)
Keywords: India, Pakistan, Sports, ICC T20 World Cup, UAE.
Skin problems like itchiness, dryness and flakiness can occur anytime if you're not moisturising your body enough. It is commonly observed that while many people take their skincare routine seriously, a majority of them neglect to moisturise the body. It is important to keep in mind that timing matters a lot when it comes to applying moisturisers. Therefore, knowing the appropriate time to apply body lotion is essential.
Take a look at the ideal times to moisturise your body shared by Kimi Jain, Head of Retail, KIMRICA.
Moisturising the body in the morning sets your skin up to face countless irritants and environmental factors during the day. The skin is constantly exposed to harsh chemicals and pollutants when you're outside which is why using a protective and soothing moisturiser while going out is necessary. Kimirica's Five Elements Body Lotion comes with natural Aloe Vera extracts that act as a rich source of antioxidants and vitamins that helps protect your skin and provide a deep nourishing effect.
Moisturising the body in the morning sets your skin up to face countless irritants and environmental factors during the day. | Photo by The Creative Exchange on Unsplash
After showering, Shaving and Washing hands
After you take a shower, your skin has the maximum moisture and moisturisers work effectively on hydrated skin. That is why dermatologists always recommend applying moisturiser right after getting out of the shower. When applied early, moisturisers are able to trap some water that's still in the body and hydrate the body. Shaving not only helps you to get rid of unwanted body hair but also removes the surface skin cells. To soothe any skin irritation and protect the exposed skin from dryness, apply any hydrating moisturiser that gives your skin a natural glow. The increasing use of antibacterial soaps and hand wash takes a toll on your hand disrupting the natural skin barrier. To protect your hands from cracking and dryness, you can use the brand's Bouquet Hand Lotion that comes with a rich combination of sweet almond oil, Shea butter, grape seed extracts, Olive Oil and Jojoba Oil.
The increasing use of antibacterial soaps and hand wash takes a toll on your hand disrupting the natural skin barrier. | Photo by Nathan Dumlao on Unsplash
During and After Your Flights
Travelling makes your skin dryer, the reason being the low humidity and the recycled air inside. As body lotions are available in small sizes, it is advisable that you should carry your body lotion and apply it during your flight and once you land as this will help in combating the skin drying issue.
Research has shown that the skin effectively repairs itself from 10 p.m. to 11 p.m. That's why you should always make sure to moisturise your skin on or before this time. Also, it has been observed that the skin's trans-epidermal water loss increases during sleep which takes away plenty of moisture from the skin. So, all these reasons make it quite clear as to why you should always moisturise your body before going to sleep.
Research has shown that the skin effectively repairs itself from 10 p.m. to 11 p.m. | Photo by Aily Torres on Unsplash
Exfoliation is an important step in any skincare routine but applying body lotion post exfoliating is equally required. Exfoliating results in the removal of dead skin cells which makes space for a new layer of skin. Applying body lotion will help to soothe the top layer of skin and also strengthen the moisture barrier.
Applying body lotion will help to soothe the top layer of skin and also strengthen the moisture barrier. | Photo by Nati Melnychuk on Unsplash
Workout sessions are often sweaty and tiring but preparing your skin before stepping out is very important as exercising outside often leads to dryness. Applying light-weight body lotion before your session is recommended. (IANS/ MBI)
Keywords: natural, protect, moisturize, dryness, applying, lotion, skincare, hands, body