Audio Post - US agencies hacked in monthslong global cyberspying campaign - 9:07 AM 12/14/2020

Audio Post – Early Edition: December 14, 2020

__________________________________________

Audio Post - 9:07 AM 12/14/2020 - US agencies hacked in monthslong global cyberspying campaign

US agencies hacked in monthslong global cyberspying campaign

1 Share

WASHINGTON (AP) — Hackers broke into the networks of the Treasury and Commerce departments as part of a monthslong global cyberespionage campaign revealed Sunday, just days after the prominent cybersecurity firm FireEye said it had been breached in an attack that industry experts said bore the hallmarks of Russian tradecraft.

In response to what may be a large-scale penetration of U.S. government agencies, the Department of Homeland Security’s cybersecurity arm issued an emergency directive calling on all federal civilian agencies to scour their networks for compromises.

The threat apparently came from the same cyberespionage campaign that has afflicted FireEye, foreign governments and major corporations, and the FBI was investigating.

“This can turn into one of the most impactful espionage campaigns on record,” said cybersecurity expert Dmitri Alperovitch.

News of the hacks, first reported by Reuters, came less than a week after FireEye disclosed that foreign government hackers had broken into its network and stolen the company’s own hacking tools. Many experts suspect Russia is responsible. FireEye’s customers include federal, state and local governments and top global corporations.

The apparent conduit for the Treasury and Commerce Department hacks — and the FireEye compromise — is a hugely popular piece of server software called SolarWinds. It is used by hundreds of thousands of organizations globally, including most Fortune 500 companies and multiple U.S. federal agencies that will now be scrambling to patch up their networks, said Alperovitch, the former chief technical officer of the cybersecurity firm CrowdStrike.

The DHS directive — only the fifth since they were created in 2015 — said U.S. agencies should immediately disconnect or power down any machines running the impacted SolarWinds software.

FireEye, without naming any specific targets, said in a blog post that its investigation into the hack of its own network had identified “a global campaign” targeting governments and the private sector that, beginning in the spring, had slipped malware into a SolarWinds software update. Neither the company nor U.S. government officials would not say whether it believed Russian state-backed hackers were responsible.

The malware gave the hackers remote access to victims’ networks, and Alperovitch said SolarWinds grants “God-mode” access to a network, making everything visible.

“We anticipate this will be a very large event when all the information comes to light,” said John Hultquist, director of threat analysis at FireEye. “The actor is operating stealthily, but we are certainly still finding targets that they manage to operate in.”

On its website, SolarWinds says its 300,000 customers worldwide including all five branches of the U.S. military, the Pentagon, the State Department, NASA, the National Security Agency, the Department of Justice and the White House. It says the 10 leading U.S. telecommunications companies and top five U.S. accounting firms are also among customers.

FireEye said it had confirmed infections in North America, Europe, Asia and the Middle East, including in the health care and oil and gas industry — and had been informing affected customers around the world in the past few days. It said that malware that rode the SolarWinds update did not seed self-propagating malware — like the 2016 NotPetya malware blamed on Russia that caused more than $10 billion in damage globally — and that any actual infiltration of an infected organization required “meticulous planning and manual interaction.”

That means it’s a good bet only a subset of infected organizations were being spied on by the hackers. Nation-states have their cyberespionage priorities, which include COVID-19 vaccine development.

Cybersecurity experts said last week that they considered Russian state hackers to be the main suspect in the FireEye hack.

On Sunday, Russia’s U.S. embassy described as “unfounded” in a post on its Facebook page the “attempts of the U.S. media to blame Russia for hacker attacks on U.S. governmental bodies.”

Earlier, National Security Council spokesperson John Ullyot said in a statement that the government was “taking all necessary steps to identify and remedy any possible issues related to this situation.” The Cybersecurity and Infrastructure Security Agency at DHS said it was working with other agencies to help “identify and mitigate any potential compromises.”

President Donald Trump last month fired the director of CISA, Chris Krebs, after Krebs vouched for the integrity of the presidential election and disputed Trump’s claims of widespread electoral fraud.

In a tweet Sunday, Krebs said “hacks of this type take exceptional tradecraft and time,” adding that he believed that its impact was only beginning to be understood.

Federal government agencies have long been attractive targets for foreign hackers.

Hackers linked to Russia were able to break into the State Department’s email system in 2014, infecting it so thoroughly that it had to be cut off from the internet while experts worked to eliminate the infestation.

The intrusions disclosed Sunday included the Commerce Department’s agency responsible for internet and telecommunications policy.

Treasury deferred comment to the National Security Council. A Commerce spokesperson confirmed a “breach in one of our bureaus” and said “we have asked CISA and the FBI to investigate.” The FBI said it was engaged in a response but declined to comment further.

Austin, Texas-based SolarWinds confirmed Sunday a “potential vulnerability” related to updates released between March and June for software products called Orion that help monitor networks for problems.

“We believe that this vulnerability is the result of a highly-sophisticated, targeted and manual supply chain attack by a nation state,” said SolarWinds CEO Kevin Thompson said in a statement. He said it was working with the FBI, FireEye and intelligence community.

FireEye announced on Tuesday that it had been hacked, saying foreign state hackers with “world-class capabilities” broke into its network and stole tools it uses to probe the defenses of its thousands of customers. The hackers “primarily sought information related to certain government customers,” FireEye CEO Kevin Mandia said in a statement, without naming them.

Former NSA hacker Jake Williams, the president of the cybersecurity firm Rendition Infosec, said FireEye surely told the FBI and other federal partners how it had been hacked and they determined that Treasury had been similarly compromised.

“I suspect that there’s a number of other (federal) agencies we’re going to hear from this week that have also been hit,” Williams added.

FireEye responded to the Sony and Equifax data breaches and helped Saudi Arabia thwart an oil industry cyberattack — and has played a key role in identifying Russia as the protagonist in numerous aggressions in the burgeoning netherworld of global digital conflict.

Mandia said there was no indication they got customer information from the company’s consulting or breach-response businesses or threat-intelligence data it collects.

___

Bajak reported from Boston and O’Brien from Providence, Rhode Island.

Copyright © 2020 . All rights reserved. This website is not intended for users located within the European Economic Area.

Read the whole story
· · · · ·

Suspected Russian hackers spied on U.S. Treasury emails – sources

1 Share

WASHINGTON (Reuters) -Hackers believed to be working for Russia have been monitoring internal email traffic at the U.S. Treasury and Commerce departments, according to people familiar with the matter, adding they feared the hacks uncovered so far may be the tip of the iceberg.

The hack is so serious it led to a National Security Council meeting at the White House on Saturday, said one of the people familiar with the matter.

U.S. officials have not said much publicly beyond the Commerce Department confirming there was a breach at one of its agencies and that they asked the Cybersecurity and Infrastructure Security Agency and the FBI to investigate.

National Security Council spokesman John Ullyot added that they “are taking all necessary steps to identify and remedy any possible issues related to this situation.”

The U.S. government has not publicly identified who might be behind the hacking, but three of the people familiar with the investigation said Russia is currently believed to be responsible for the attack. Two of the people said that the breaches are connected to a broad campaign that also involved the recently disclosed hack on FireEye, a major U.S. cybersecurity company with government and commercial contracts.

In a statement posted here to Facebook, the Russian foreign ministry described the allegations as another unfounded attempt by the U.S. media to blame Russia for cyberattacks against U.S. agencies.

The cyber spies are believed to have gotten in by surreptitiously tampering with updates released by IT company SolarWinds, which serves government customers across the executive branch, the military, and the intelligence services, according to two people familiar with the matter. The trick – often referred to as a “supply chain attack” – works by hiding malicious code in the body of legitimate software updates provided to targets by third parties.

In a statement released late Sunday, the Austin, Texas-based company said that updates to its monitoring software released between March and June of this year may have been subverted by what it described as a “highly-sophisticated, targeted and manual supply chain attack by a nation state.”

The company declined to offer any further detail, but the diversity of SolarWind’s customer base has sparked concern within the U.S. intelligence community that other government agencies may be at risk, according to four people briefed on the matter.

SolarWinds says on its website that its customers include most of America’s Fortune 500 companies, the top 10 U.S. telecommunications providers, all five branches of the U.S. military, the State Department, the National Security Agency, and the Office of President of the United States.

‘HUGE CYBER ESPIONAGE CAMPAIGN’

The breach presents a major challenge to the incoming administration of President-elect Joe Biden as officials investigate what information was stolen and try to ascertain what it will be used for. It is not uncommon for large scale cyber investigations to take months or years to complete.

“This is a much bigger story than one single agency,” said one of the people familiar with the matter. “This is a huge cyber espionage campaign targeting the U.S. government and its interests.”

Hackers broke into the NTIA’s office software, Microsoft’s Office 365. Staff emails at the agency were monitored by the hackers for months, sources said.

A Microsoft spokesperson did not respond to a request for comment. Neither did a spokesman for the Treasury Department.

The hackers are “highly sophisticated” and have been able to trick the Microsoft platform’s authentication controls, according to a person familiar with the incident, who spoke on condition of anonymity because they were not allowed to speak to the press.

“This is a nation state,” said a different person briefed on the matter.

The full scope of the breach is unclear. The investigation is still its early stages and involves a range of federal agencies, including the FBI, according to three of the people familiar with the matter.

A spokesperson for the Cybersecurity and Infrastructure Security Agency said they have been “working closely with our agency partners regarding recently discovered activity on government networks. CISA is providing technical assistance to affected entities as they work to identify and mitigate any potential compromises.”

The FBI and U.S. National Security Agency did not respond to a request for comment.

There is some indication that the email compromise at NTIA dates back to this summer, although it was only recently discovered, according to a senior U.S. official.

Reporting by Christopher Bing, Jack Stubbs, Joseph Menn, and Raphael Satter; Editing by Chris Sanders, Daniel Wallis and Diane Craft

Read the whole story
· · ·

Russian Hackers Suspected In Cyber Attack At Federal Agencies : NPR

1 Share

Updated at 6 a.m. ET

Russian hackers working for the Kremlin are believed to be behind an attack into U.S. government computer systems at the departments of Treasury and Commerce that likely lasted months, according to reports Sunday.

The Kremlin has denied the allegation.

The agencies’ Microsoft Office 365 platform was used to monitor staffers emails, potentially since the spring, Reuters and The New York Times reported Sunday.

A spokesman for the National Security Council, John Ullyot, appeared to broadly confirm the breach, but offered no specifics about which country may have been involved.

“We have been working closely with our agency partners regarding recently discovered activity on government networks,” Ullyot said in a statement Sunday. “The United States government is aware of these reports, and we are taking all necessary steps to identify and remedy any possible issues related to this situation.”

Microsoft said in a blog post late Sunday, “We believe this is nation-state activity at significant scale, aimed at both the government and private sector.”

Representatives from the two departments that were targeted did not immediately respond to NPR’s request for comment.

Speaking in Moscow on Friday, Kremlin spokesman Dmitry Peskov dismissed the allegations.

“Once again, I can reject these accusations and once again I want to remind you that it was President (Vladimir) Putin who proposed that the American side agree and conclude agreements (with Russia) on cyber security,” Peskov said, adding that Washington had ignored the offer.

“As for the rest, if there have been attacks for many months, and the Americans could not do anything about it, it is probably not worth immediately groundlessly blaming the Russians. We didn’t have anything to do with it,” he said.

The hackers are believed to have gotten into the government systems by tampering with software updates from the IT company SolarWinds. The company has government contracts, including with the military and intelligence services, according to Reuters. The attackers are believed to have used a “supply chain attack” method that embeds malicious code into legitimate software updates. The attack focused on the SolarWinds Orion products.

SolarWinds said in a statement that it was aware of its systems experiencing a “highly sophisticated, manual supply chain attack” on specific versions of its Orion platform software released between March and June of this year.

“We have been advised this attack was likely conducted by an outside nation state and intended to be a narrow, extremely targeted, and manually executed attack, as opposed to a broad, system-wide attack,” the company said.

SolarWinds advised users to update to a newer version as soon as possible.

Members of the National Security Council, the Department of Homeland Security, and the FBI are investigating the breach and whether other government systems could have been hacked as well.

Overnight, the Cybersecurity and Infrastructure Security Agency (CISA), which is overseen by the Department of Homeland Security, issued an emergency directive calling on all federal civilian agencies to review their networks for signs of the compromise and to disconnect from SolarWinds Orion products immediately.

“The compromise of SolarWinds’ Orion Network Management Products poses unacceptable risks to the security of federal networks,” said CISA Acting Director Brandon Wales in a statement. “Tonight’s directive is intended to mitigate potential compromises within federal civilian networks, and we urge all our partners—in the public and private sectors—to assess their exposure to this compromise and to secure their networks against any exploitation.”

The agency said in its directive that, “Affected entities should expect further communications from CISA and await guidance before rebuilding from trusted sources utilizing the latest version of the product available.”

News of the breach comes less than a week after an attack into FireEye, a major U.S. cybersecurity company, was made public. The hackers in that attack, also believed to be Russians, stole the company’s key tools used to test vulnerabilities in the computer networks of its customers, which include government agencies.

If government officials are able to confirm the Russian government as the source of the attack, it would be considered the biggest theft of U.S. government data since a breach in 2014 and 2015, the Times reports.

During those earlier breaches, Russian intelligence has been blamed for accessing unclassified email systems at the White House, State Department and the Joint Chiefs of Staff. Russian actors are also responsible for the 2016 hacking of emails from the Democratic National Committee and Hillary Clinton’s presidential campaign. Moscow also denied these earlier allegations.

NPR’s National Security Correspondent Greg Myre contributed to this report.

Read the whole story
· · · ·

US Agencies Hacked in Monthslong Global Cyberspying Campaign – NBC10 Philadelphia

1 Share

Hackers broke into the networks of the Treasury and Commerce departments as part of a monthslong global cyberespionage campaign revealed Sunday, just days after the prominent cybersecurity firm FireEye said it had been breached in an attack that industry experts said bore the hallmarks of Russian tradecraft.

In response to what may be a large-scale penetration of U.S. government agencies, the Department of Homeland Security’s cybersecurity arm issued an emergency directive calling on all federal civilian agencies to scour their networks for compromises.

The threat apparently came from the same cyberespionage campaign that has afflicted FireEye, foreign governments and major corporations, and the FBI was investigating.

U.S. & World

Stories that affect your life across the U.S. and around the world.

“This can turn into one of the most impactful espionage campaigns on record,” said cybersecurity expert Dmitri Alperovitch.

News of the hacks, first reported by Reuters, came less than a week after FireEye disclosed that foreign government hackers had broken into its network and stolen the company’s own hacking tools. Many experts suspect Russia is responsible. FireEye’s customers include federal, state and local governments and top global corporations.

The apparent conduit for the Treasury and Commerce Department hacks — and the FireEye compromise — is a hugely popular piece of server software called SolarWinds. It is used by hundreds of thousands of organizations globally, including most Fortune 500 companies and multiple U.S. federal agencies that will now be scrambling to patch up their networks, said Alperovitch, the former chief technical officer of the cybersecurity firm CrowdStrike.

TheDHS directive— only the fifth since they were created in 2015 — said U.S. agencies should immediately disconnect or power down any machines running the impacted SolarWinds software.

FireEye, without naming any specific targets,said in a blog postthat its investigation into the hack of its own network had identified “a global campaign” targeting governments and the private sector that, beginning in the spring, had slipped malware into a SolarWinds software update. Neither the company nor U.S. government officials would not say whether it believed Russian state-backed hackers were responsible.

The malware gave the hackers remote access to victims’ networks, and Alperovitch said SolarWinds grants “God-mode” access to a network, making everything visible.

“We anticipate this will be a very large event when all the information comes to light,” said John Hultquist, director of threat analysis at FireEye. “The actor is operating stealthily, but we are certainly still finding targets that they manage to operate in.”

On its website, SolarWinds says its 300,000 customers worldwide including all five branches of the U.S. military, the Pentagon, the State Department, NASA, the National Security Agency, the Department of Justice and the White House. It says the 10 leading U.S. telecommunications companies and top five U.S. accounting firms are also among customers.

FireEye said it had confirmed infections in North America, Europe, Asia and the Middle East, including in the health care and oil and gas industry — and had been informing affected customers around the world in the past few days. It said that malware that rode the SolarWinds update did not seed self-propagating malware — like the 2016 NotPetya malware blamed on Russia that caused more than $10 billion in damage globally — and that any actual infiltration of an infected organization required “meticulous planning and manual interaction.”

That means it’s a good bet only a subset of infected organizations were being spied on by the hackers. Nation-states have their cyberespionage priorities, which include COVID-19 vaccine development.

Cybersecurity experts said last week that they considered Russian state hackers to be the main suspect in the FireEye hack.

On Sunday, Russia’s U.S. embassy described as “unfounded” in apost on its Facebook pagethe “attempts of the U.S. media to blame Russia for hacker attacks on U.S. governmental bodies.”

Earlier, National Security Council spokesperson John Ullyot said in a statement that the government was “taking all necessary steps to identify and remedy any possible issues related to this situation.” The Cybersecurity and Infrastructure Security Agency at DHS said it was working with other agencies to help “identify and mitigate any potential compromises.”

President Donald Trump last month fired the director of CISA, Chris Krebs, after Krebs vouched for the integrity of the presidential election and disputed Trump’s claims of widespread electoral fraud.

In a tweet Sunday, Krebs said “hacks of this type take exceptional tradecraft and time,” adding that he believed that its impact was only beginning to be understood.

Federal government agencies have long been attractive targets for foreign hackers.

Hackers linked to Russia were able to break into the State Department’s email system in 2014, infecting it so thoroughly that it had to be cut off from the internet while experts worked to eliminate the infestation.

The intrusions disclosed Sunday included the Commerce Department’s agency responsible for internet and telecommunications policy.

Treasury deferred comment to the National Security Council. A Commerce spokesperson confirmed a “breach in one of our bureaus” and said “we have asked CISA and the FBI to investigate.” The FBI said it was engaged in a response but declined to comment further.

Austin, Texas-based SolarWinds confirmed Sunday a “potential vulnerability” related to updates released between March and June for software products called Orion that help monitor networks for problems.

“We believe that this vulnerability is the result of a highly-sophisticated, targeted and manual supply chain attack by a nation state,” said SolarWinds CEO Kevin Thompson said in a statement. He said it was working with the FBI, FireEye and intelligence community.

FireEye announced on Tuesday that it had been hacked, saying foreign state hackers with “world-class capabilities” broke into its network and stole tools it uses to probe the defenses of its thousands of customers. The hackers “primarily sought information related to certain government customers,” FireEye CEO Kevin Mandia said in a statement, without naming them.

Former NSA hacker Jake Williams, the president of the cybersecurity firm Rendition Infosec, said FireEye surely told the FBI and other federal partners how it had been hacked and they determined that Treasury had been similarly compromised.

“I suspect that there’s a number of other (federal) agencies we’re going to hear from this week that have also been hit,” Williams added.

FireEye responded to the Sony and Equifax data breaches and helped Saudi Arabia thwart an oil industry cyberattack — and has played a key role in identifying Russia as the protagonist in numerous aggressions in the burgeoning netherworld of global digital conflict.

Mandia said there was no indication they got customer information from the company’s consulting or breach-response businesses or threat-intelligence data it collects.

___

Bajak reported from Boston and O’Brien from Providence, Rhode Island.

Read the whole story
· · · · · · ·

Michael Flynn Says Trump Will Remain President in First Public Remarks Since Pardon

1 Share

Former National Security Advisor Michael Flynn on Saturday expressed confidence that President Donald Trump will serve a second consecutive term in his first public remarks since his presidential pardon.

Flynn joined a slew of high profile Trump supporters in Washington D.C. for a series of “Stop the Steal” rallies to protest the results of the election, one day after the U.S. Supreme Court rejected a lawsuit by Texas aimed at overturning President-elect Joe Biden‘s win in four battleground states. Billed by Trump and his allies as “the big one,” the failed suit was the latest in a string of defeats for the president’s campaign to reverse his defeat.

“The courts do not decide who the next president of the United States will be,” Flynn told a crowd of protesters carrying patriotic flags. “We the people decide.”

“I will say, there are paths that are still in play … there’s a lot of activity that’s still playing out.”

Skip

Ads by <a href=”http://scrollerads.com” rel=”nofollow”>scrollerads.com</a>

On November 27, Trump issued Flynn a presidential pardon, concluding a prosecution spanning years in the Russia probe that saw his former aide plead guilty twice to lying to the FBI about contacts with a Kremlin ambassador. Flynn had asked to reverse his pleas before the Justice Department attempted to discharge his case.

A few weeks later, on Tuesday, a federal judge upheld the case dismissal, but maintained that Trump’s pardon does not prove Flynn’s innocence in lying to the FBI.

Flynn told the pro-Trump crowd on Saturday that he was certain that the president will hold onto power. “I will tell you one more time—because I’ve been asked—on a scale of one to ten, who will be the next president of the United States, and I say Donald Trump. Ten. A ten,” he said.

Trump “knows that the people that he can trust are people that he’s never met. And that’s you,” Flynn said. “He trusts you because he knows you know what’s going on and you will not allow what’s going on to happen in our country.”

Conservative radio host Alex Jones and MyPillow CEO Mike Lindell were among other speakers at the rally.

Trump’s path to overturning the results of the election is now virtually non-existent, with the Electoral College set to officially confirm Biden’s victory on Monday. U.S. District Court Judge Brett Ludwig dealt another blow to his campaign as protesters marched today by dismissing his lawsuit seeking to overturn Wisconsin’s results.

MAGA supporters, once aligned with the GOP, have been turning against their party for failing to help Trump remain in office. Elsewhere at the D.C. protests today, a large group of demonstrators were chanting “destroy the GOP,” and booing Georgia Republican Senate incumbents Kelly Loeffler and David Perdue.

Newsweek reached out to the Trump campaign for comment.

End of the Audio Report

Tweets 

  1.  Michael Novakhov Retweeted

    JUST IN: U.S. cybersecurity agency issues emergency directive following government hacks http://hill.cm/D2SAd4h 

    View image on Twitter
    •  
  2.  Michael Novakhov Retweeted

    President Trump said he was reversing an administration directive to vaccinate top government officials against COVID-19, while public distribution of the shot is limited to front-line health workers and people in nursing homes and care facilities https://yhoo.it/3ngMyr6 

    View image on Twitter
    •  
  3.  Michael Novakhov Retweeted

    “I don’t think, when the President of the US and some of my Republican colleagues are trying to burn the house down around us, ... that we want to set a new fire,” says Rep. Schiff on excluding GOP members who supported plot to overturn the electionhttps://on.msnbc.com/3r574NI 

    •  
  4.  Michael Novakhov Retweeted

    Beijing’s influence in the Balkans has grown so exponentially that Serbia’s President Vučić now publicly calls China’s President Xi a ‘friend and brother’ @HarunKarcic Opinionhttps://www.haaretz.com/world-news/.premium-as-america-retreats-china-claims-a-corner-of-europe-1.9368630 

    •  
  5.  Michael Novakhov Retweeted

    The following Google services are down:

    - Gmail
    - YouTube
    - Calendar
    - Drive
    - Docs
    - Sheets
    - Slides
    - Sites
    - Groups
    - Hangouts
    - Chat
    - Meet
    - Vault
    - Currents
    - Forms
    - Cloud Search
    - Keep
    - Tasks
    - Voice

    Read the full story: https://trib.al/cQF8Xxg 

    •  
  6.  Michael Novakhov Retweeted

    YouTube, Google and Gmail all CRASH as thousands of users complain of issues https://trib.al/EzTU0ZK 

    View image on Twitter
    •  
  7.  Michael Novakhov Retweeted

    BREAKING: This might be why your Monday morning at work is off to such a rocky start.

    Google’s major services—including YouTube, Gmail and Google Documents—were all knocked offline in an incredibly rare outage.https://trib.al/RR3IEsi 

    •  
  8.  Michael Novakhov Retweeted

    : Gmail, YouTube down in global outage http://hill.cm/brXwzjG 

    View image on Twitter
    •  
  9.  Michael Novakhov Retweeted

    The Pentagon Is Ill-Organized to Improve Its Use of Electromagnetic Spectrum, GAO Says https://buff.ly/342U8xO 

    View image on Twitter
    •  
  10.  Michael Novakhov Retweeted

    Putting aside how tired this charade is, we're left w 2 options:
    1. He doesn't realise how complex an econ problem this is + that Sov-style dirigisme is unsustainable
    2. He doesn't care, so long as he plays his role - but this time he's throwing his whole govt under the bus

    •  
  11.  Michael Novakhov Retweeted

    A 'confidential' part of Putin's online meeting with his ministers ends up on Russian TV, with him berating them for food price rises, demanding concrete action within the week, etc. Usual attempt at 'good tsar/bad boyars' pantomime 1/2https://www.kp.ru/daily/21712099.5/4337580/ 

    •  
  12. Reuters reported that the incident was considered so serious that it led to a rare meeting of the US National Security Council at the White House, a day earlier, on Saturday.

    Microsoft, FireEye confirm SolarWinds supply chain attack | ZDNet https://www.zdnet.com/article/microsoft-fireeye-confirm-solarwinds-supply-chain-attack/ 

    •  
  13. US Agencies Hacked in Monthslong Global Cyberspying Campaign – NBC10 Philadelphia https://www.nbcphiladelphia.com/news/national-international/us-looking-into-possible-computer-hacks-of-federal-agencies/2632148/ 

    “This can turn into one of the most impactful espionage campaigns on record," said cybersecurity expert

    View image on Twitter
    •  
  14. 1. Russian Press from Michael_Novakhov (80 sites): http://Lenta.ru  : Новости: Опубликовано видео с места стрельбы у собора в Нью-Йорке | The Brooklyn Bridge https://bklyn-ny.net/2020/12/14/church_video/ 

    View image on Twitter
    •  
  15.  Michael Novakhov Retweeted

    Do we have any reason to believe that Trump works for the US?

    •  
  16.  Michael Novakhov Retweeted

    One person shot in Washington state during violent election protest http://hill.cm/Mcaocib 

    View image on Twitter
    •  
  17.  Michael Novakhov Retweeted

    Al Gore: "I would encourage those who are still supporting the lost cause of President Trump's reelection to put the country first."

    Embedded video
    •  
  18.  Michael Novakhov Retweeted

    Two shot outside corner bodega in Brooklyn https://trib.al/ueVUYVo 

    View image on Twitter
    •  
  19.  Michael Novakhov Retweeted

    On this day in 1939, Allied cruisers Exeter, Ajax and Achilles outfight the German pocket battleship Graf Spee at the mouth of Uruguay's River Plate. The defeated vessel seeks shelter in the neutral port of Montevideo. Days later Graf Spee's captain scuttles the ship.

    View image on Twitter
    •  

Comments

Popular posts from this blog

1:38 PM 10/6/2020 - Major hurricane brews in Gulf of Mexico, threatens Louisiana, Florida | Hopes of a ceasefire fading in Nagorno-Karabakh amid flare-up of violence

Ukraine threatens to break off diplomatic contact with Russia - Selected Articles Review - 8:30 AM 2/22/2022

1:43 PM 2/3/2021 - Эхо Москвы - Особое мнение : Глеб Павловский | Scientists explain why the new Covid-19 variants could be more infectious

CIA Director Gina Haspel: Trump's Behavior After Election Loss Was 'Insanity' | #TNT #News #Times #US #ODNI #CIA #DOJ #FBI #Psychology of #Politics, #Intelligence, & #SecurityServices The News And Times | The FBI News Review https://shar.es/aW6eFD

Intelligence Operations | Abwehr and Psychoanalysis - Tweets Review | US "Psychoanalysts", many of them German Jewish charlatans, SPIED ON THEIR PATIENTS to find out the roots of TOTALITARIANISM!

@SecondGentleman Are you behind the attempts to unseat Chris Wray of the FBI? Do you plot to rule America behind the scenes? What are your relations with the Intelligence Services, including the Mossad, KGB, BND, and the New Abwehr?#FBI #NEWS #KamalaHarris THE FBI NEWS REVIEW

Among Those Who Marched Into the Capitol on Jan. 6: An F.B.I. Informant - The New York Times

9:12 AM 9/21/2021 - #CI (Attention, #CounterIntelligence!!!) Clearly, this is the vicious, targeted political attack on #ChrisWray, & it is orchestrated by Kamala Harris #VPHarris to control FBI #FBI. She is the agent of "#ProgressiveLeft", & also of the #NewAbwehr-#KGB, I think.

US-American psychoanalytic community began to collaborate with the US-Intelligence Community (IC) ... psychohistorical studies on Adolf Hitler... history & consequences of this rather unexpected liaison. Psychoanalytic & the U.S. Intelligence Communities: 1940–1945