[Home] [Headlines] [Latest Articles] [Latest Comments] [Post] [Sign-in] [Mail] [Setup] [Help]
Status: Not Logged In; Sign In
Israel/Zionism See other Israel/Zionism Articles Title: Cybereason Announces New Plans to “Accelerate” Access to US Govt Networks Ahead of 2020 Election A cybersecurity firm tied to Israeli intelligences Unit 8200 that simulated a series of terrorist attacks occurring on the U.S. 2020 election has announced a new hire with deep ties to the U.S. intelligence and defense communities with the goal of gaining greater access to U.S. government networks. A cybersecurity company tied to Israeli intelligence and a series of unnerving simulations regarding cyber-terrorist attacks on the upcoming U.S. elections has recently announced a new hire who plans to aid the company in further penetrating the U.S. public sector. Last Wednesday, the company Cybereason announced that it had hired Andrew Borene as its Managing Director for its recently launched U.S. public sector business. Borene, who boasts longstanding ties to the U.S. intelligence community and the Pentagon, will accelerate Cybereasons partner and customer presence in the U.S. public sector, according to a Cybereason press release. My goal is to build a strong business for Cybereason within the U.S. public sector and I am planning to recruit a group of direct support executives, veterans and alumni of the elite [U.S.] military units and agencies that have defended our nation in the information age. Ill also work to establish a network of the best channel and delivery partners for federal, state and local governments, Borene said per the press release. Eric Appel, Cybereasons General Manager for North American Sales, stated that Were excited about Andrew joining Cybereason and the opportunity in the U.S. public sector for Cybereason to make a profound impact on helping the nations federal civilian, military, state and local government agencies
Borene will likely be successful in his ability to recruit a sales team of prominent alumni from the U.S. intelligence and defense communities to market Cybereasons products throughout the U.S. government. Prior to joining Cybereason, Borene was a senior advisor to the Intelligence Advanced Research Projects Activity (IARPA), the intelligence communitys DARPA equivalent that is housed within the Office of the Director of National Intelligence (ODNI). He served in that capacity on behalf of intelligence contractor Booz Allen Hamilton. Prior to that, Borene served as Associate Deputy General Counsel to the Pentagon and was previously a military intelligence officer for the U.S. Marine Corps. Borenes private sector experience is also significant, as he was a senior executive at IBM. Notably, the current Chief Information Officer for the CIA, Juliane Gallina, had served alongside Borene as a top IBM executive prior to taking her current position at the agency. In addition, Borene also boasts ties to Wall Street as a veteran of Wells Fargos investment banking division. In addition, Borene has deep ties to Washingtons foreign policy establishment as a life member of the Council on Foreign Relations (CFR) and to the national security-think tank nexus through his senior fellowship at the National Security Institute (NSI). NSIs board includes former NSA directors, Keith Alexander and Michael Hayden (also a former CIA director); former Deputy Defense Secretary and architect of the Iraq War, Paul Wolfowitz; former director of the Defense Intelligence Agency, David Shedd; and a variety of other former top intelligence and defense officials as well as Silicon Valley executives and venture capitalists. Notably, Borene is the latest addition to Cybereason with ties to the U.S. intelligence and defense communities as the companys advisors include Robert Bigman, former Chief Information Security Officer for the CIA as well as Peter Sherlock, the former Chief Operating Officer of MITRE corporation, a major intelligence and defense contractor connected to the Ptech-9/11 controversy. Cybereason: a front for Israeli Military Intelligence Cybereasons announcement of its hire of Andrew Borene coincided with its launch of its new U.S. public sector business, meaning that Cybereason now seeks to have its cybersecurity software running on even more of the U.S. governments most classified networks. Cybereason, for years, has already been running on several sensitive U.S. government networks through its partnerships with IT contractors for intelligence and defense, such as Lockheed Martin (also a Cybereason investor), WWT and Leidos. However, Borenes hire and this new publicly announced pivot towards the U.S. public sector clearly demonstrates the companys interest in further deepening its presence on U.S. government networks. Cybereasons pivot is concerning for several reasons. First, its co-founders are alumni of Israels Unit 8200, an elite unit of the Israeli Intelligence corps that is part of the IDFs Directorate of Military Intelligence and is involved mainly in signal intelligence, surveillance, cyberwarfare and code decryption. It is also well-known for its surveillance of Palestinian civilians and for using intercepted communications as blackmail in order to procure informants among Palestinians living under occupation in the West Bank. In addition, all three Cybereason co-founders, after leaving Unit 8200, went on to work for two private Israel-based tech/telecom companies with a notorious history of aggressive espionage against the U.S. government: Amdocs and Comverse Infosys (the latter is now known as Verint Systems Inc.). This raises the possibility that Cybereason software could potentially be used as a backdoor by unauthorized actors, given that the companys co-founders all previously worked for firms that have a history of placing backdoors into U.S. telecommunications and electronic infrastructure as well as aggressively spying on U.S. federal agencies. Also notable is the fact that the companys current CEO and co-founder Lior Div was much more than the average Unit 8200 officer during his time in the unit, as he served as a commander [in Unit 8200] and carried out some of the worlds largest cyber offensive campaigns against nations and cybercrime groups. For his achievements, he received the Medal of Honor, the highest honor bestowed upon Unit 8200 members, according to his biography. Troublingly, in an interview that Div gave to TechCrunch last year, Div stated that his work at Cybereason is the continuation of the six years of training and service he spent working with the Israeli armys 8200 Unit. This is particularly noteworthy given that Israels government has openly admitted that an on-going intelligence operation, first initiated in 2012 the year Cybereason was founded, involves Israeli military intelligence and intelligence operations that had previously done in house (i.e. as part of Unit 8200, Mossad, etc.) being spun off into private companies, specifically start-ups in the cyber realm. This operation is part of Israeli Prime Minister Benjamin Netanyahus deliberate policy to have former members of Israels military and intelligence units
merge into companies with local partners and foreign partners in order to make it all but impossible for major corporations and foreign governments to boycott Israel and to also to ensure that Israel becomes the worlds dominant cyber power. One notable report on this policy, published by Israeli outlet Calcalist Tech, interviewed dozens of Israeli military, intelligence and government officials and noted that since 2012, cyber-related and intelligence projects that were previously carried out in-house in the Israeli military and Israels main intelligence arms are transferred to companies that in some cases were built for this exact purpose. The article also states that beginning in 2012, Israels intelligence and military intelligence agencies began to outsource activities that were previously managed in-house, with a focus on software and cyber technologies. Simulating the Cancellation of the 2020 Election In light of Cybereasons background and the acceleration of their presence on U.S. government networks, the timing of their redoubled efforts to court the U.S. public sector add additional layers of concern given that it precedes the U.S. 2020 election by a matter of months. Since last year, Cybereason has conducted multiple simulations focused on the 2020 election, which were attended by federal officials from the FBI, DHS and the U.S. Secret Service and all of which ended in disaster. In those simulations, the 2020 election was ultimately canceled and martial law was then declared due to the chaos created by a group of hackers led by Cybereason employees. Notably, Cybereason stood to gain nothing financially from the simulations given that their software could not have prevented the attacks waged against the U.S. electoral infrastructure in the exercise and the company framed their hosting of the simulations as merely altruistic because of their professed desire to help protect U.S. election infrastructure. The attacks conducted in the simulations by Cybereason employees included creating power grid blackouts, the use of deep fakes to sow confusion, creating havoc with municipal sewage systems and crashing self-driving cars into voters waiting in line to cast their ballots, killing 32 and injuring over a hundred people. In the months since I first wrote about Cybereason and their 2020 doomsday simulations back in January, U.S. government officials and mass media alike have been warning that these same types of attacks that Cybereason simulated are likely to come to pass on this upcoming election day, scheduled for November 3rd of this year. More recently, in less than a week, headlines like Election Security Experts Expect Chaos Unless Action Taken, New Yorks Pandemic Voting Chaos Set to Go Nationwide in November, and Foreign adversaries seeking to compromise presidential campaigns, intel warns, among others, have been published in major U.S. media outlets. While these narratives have asserted that China, Russia and/or Iran will be to blame for such attacks, it is worth noting that a tight-knit web of Israeli state-owned and private companies tied to Israeli military intelligence now run the software controlling key parts of the power grid in New York, California and elsewhere in the U.S.; are the main global producers of deep fakes; and the main providers of security software for self-driving and semi-self-driving cars, the quantity of which on U.S. streets has grown dramatically as a result of the coronavirus crisis. With Cybereasons newly announced push to run its software on critical U.S. government networks at both the federal and state levels, the companys history of simulating terror attacks on critical U.S. infrastructure and their openly admitted and on-going ties to Israeli military intelligence deserve more scrutiny than ever as the U.S. election draws closer. Post Comment Private Reply Ignore Thread Top Page Up Full Thread Page Down Bottom/Latest
#1. To: All, Pinguinite (#0)
There is no entity to which you have greater cyber vulnerability than your own security provider.
|
||
[Home]
[Headlines]
[Latest Articles]
[Latest Comments]
[Post]
[Sign-in]
[Mail]
[Setup]
[Help]
|