6:03 AM 4/20/2021 - SharedNewsLinks℠ - A heavily fortified Minneapolis awaits verdict in Chauvin trial
- Get link
- X
- Other Apps
6:03 AM 4/20/2021 - SharedNewsLinks℠
Michael Novakhov - SharedNewsLinks℠ | In Brief |
-
Michael Novakhov - SharedNewsLinks | ||||
---|---|---|---|---|
5:35 AM 4/20/2021 - NYT > Opinion: America Needs a Jan. 6 Commission | U.S. Ambassador To Moscow Returning To Washington | ||||
The attack on our democracy must be investigated to prevent history from repeating itself. NYT > Opinion - U.S. Ambassador to Russia John Sullivan says he will be returning to the United States for consultations this week amid rising tensions between Washington and Moscow. Radio Free Europe / Radio Liberty - Michael Novakhov's favorite articles on Inoreader The News and Times from Michael_Novakhov (16 sites): Counterintelligence from Michael_Novakhov (51 sites): "fbi" - Google News: Man connected to FBI accused of paying woman to sexually assault son with disabilities - WSOC Charlotte posted on Apr 19 2021 22:01:21 UTC by Michael_Novakhov via The News and Times Review from Michael_Novakhov (16 sites) Man connected to FBI accused of paying woman to sexually assault son with disabilities WSOC Charlotte "fbi" - Google News Counterintelligence from Michael_Novakhov (51 sites) The News and Times from Michael_Novakhov (16 sites) MOSCOW (AP) - The Russian military said Monday that its airstrike killed about 200 militants in eastern Syria. Rear Adm. Alexander Karpov, the head of the Russian military's Reconciliation Center in Syria, said Russian warplanes hit two militant hideouts northeast of Palmyra. Karpov said in a statement carried by Russian ... Two Russian agents have been linked to a high-profile poisoning and a deadly explosion, but there's little Europe can do KCTV Kansas City Advertisement
In mid-January, U.S. intelligence analysts began quietly notifying local police departments about a host new violent, criminal threats surfacing in the wake of the Capitol riot. At only number six on their list, the analysts warned that voices emanating from one of the internets most malignant corners had begun calling for the murders of politicians and police. | ||||
Fusion Center Report: White Extremists Sought Murders of Cops, Politicians | ||||
In mid-January, U.S. intelligence analysts began quietly notifying local police departments about a host new violent, criminal threats surfacing in the wake of the Capitol riot. At only number six on their list, the analysts warned that voices emanating from one of the internets most malignant corners had begun calling for the murders of politicians and police. Demands for swift reprisals following the failed Jan. 6 coup resounded across a network of prominent Telegram channels manned by an amalgam of neo-Nazis, anti-government belligerents, and conspiracy-theory hawkersa veritable open pit of genocidal fanaticism, where names like Adolf Hitler and Anders Breivik are spoken in reverent tones. Amid the usual xenophobic bellyaching, something more deadly arose from the crowd and grasped the attention of Homeland Security agents: calls for the most fanatical of members to launch suicide attacks on Democratic politicians and their Republican counterparts deemed traitorous to the cause. Likewise, any cops getting in the way would viewed as suitable targets. The massacres, they were told, should be livestreamed. Those who fell in the attacks would be Saints. Advertisement On Jan. 15, nine days after the fatal assault on the Capitol, analysts at one of Floridas three intelligence fusion centers issued their first bulletin of the year highlighting violent extremist content. The Violent Extremist Snapshot served to notify police in Central Florida of online posts by far-right extremists abetting real-world violence and crime. High on their list were the calls for political assassinations coming from white supremacists, neo-fascists, and other racially-motivated extremists. G/O Media may get a commission The internal analysis, first reviewed by Gizmodo, reveals Homeland Security agents working closely with state and local agencies in the days following the Capitol siege. Intelligence gatherers at the agencys dozens of fusion centers across the country had also monitored calls for violent action ahead of the event, though Washington had all but ignored the signs. In the days after, analysts were closely monitoring news about the mass migration of extremists to alternative platforms, as well as a flurry of calls to hunt down politicians in their home states, to loot and burn their houses, and to sabotage and set fire to major retail businesses viewed aligned with Jewish interests. Obtained by record-seekers at the transparency group Property of the People, the reports originated from a Florida-based fusion center, one of the dozens of federally-funded counterterrorism offices that share intelligence with police agencies at the state and local levels. Information gleaned from social media is often shared with local departments, but only (in policy) when analysts on Domestic Violent Extremist (DVE) desks cross rhetoric viewed as inciteful to violence and criminal acts. Advertisement Typically, the reports are read solely by personnel with a valid need-to-know. And while not classified, they are intended FOR OFFICIAL USE ONLY. Bolded notices on top sheets instruct readers to withhold the reports intelligence from the public and the media. Attempts to obtain such documents through public records requests often end with journalists getting pages that are entirely blacked out. But Property of the People, a small cadre of information activists and legal experts, has learned to navigate the nations oft-infuriating patchwork of open records statutes, exposing government pursuits that rarely see daylight. Across a swath of Telegram channels known widely as Terrorgram, diehard fundamentalists, self-proclaimed chauvinists, and maniacal flag-waivers come together with the occasional religious zealot to marinate in their collective insecurities. By and large, most of this extremist enclave has moved beyond its support for Donald Trumpand indeed, many had long viewed him as a feckless political tool, incapable of igniting the race war theyve long promised. But the furor of the accelerationists was seemingly intensified by the Capitol coup and their frustration with its defeat. Advertisement Calls to martyr themselves swiftly followed. Advertisement In one post, subscribers of the channel were told that they were the new jihadi john and that like Jihadi John, they would need a rifle, a camera and fanaticism, analysts wrote in one report, referring to the nickname of a notorious Islamic State militantknown mostly for beheading hostages in propagandized snuff films. Unlike the ISIS terrorist, who was killed in a U.S. drone strike in Syria in 2015, Terrorgram users were promised that their actions would lead to victory and that they would have even greater impact courtesy of their ability to livestream. Those killed in action were promised a place on the Saints leaderboard, an apparent coupling of a video game reference and a vague nod to Christian martyrdom. Advertisement The Saints leaderboard is both metaphorical and real, says Megan Squire, a professor of computer science at Elon University who studies extremists online. Screenshots of social media posts provided by Squire showed a Pantheon of famous killers as far back as 2019, which included Timothy McVeigh, the Oklahoma City bomber; Breivik, a far-right spree killer who murdered 69 people in 2011; and Dylann Roof, the neo-Nazi convicted of the 2015 Charleston church shooting. The intel reports refer to subjects primarily as White Racially or Ethnically Motivated Extremists, or WRMVEs. Although this official designation is rarely if ever used publiclyand is likely a newer addition to the governments domestic terror thesaurusreferences to WRMVEs have been featured in multiple intelligence community reports this year alone. Its specificity is more acute than Domestic Violent Extremists (DVE), but would seemingly encompass more threats than White Supremacist Extremists (WSE), a term more commonly found in recent national security texts. Advertisement It was suggested that the Mayor be killed on livestream, the intelligence agents wrote of another surveilled discussion involving a user based in a Democratic Midwest town. If the Sheriff tries to get involved, it was suggested that he/she be killed as well. A Republican mayor would also suffice, they said, if they were deemed traitorous to the cause. Advertisement In some cases, users sought to disguise blatant threats by censoring key words under the term REDACTED. As in: [REDACTED] the sheriff if he tries shit, declare the U.S. Government illegitimate and call for All Patriots to the same. This is a common practice and was especially popular among Boogaloo adherents, said Squire, referring to members of the overwhelmingly white, loosely-affiliated anti-government movement, who often pair Hawaiian shirts with tactical gear and protest with guns. The purpose of Terrorgram channels is to be inspirational to those who might commit violence in the name of white supremacy, anti-Semitism and so forth, Squire said. The people behind these channels produce propaganda in the form of memes and written arguments, primarily to advance the view that there is no other solution except violence, that martyrdom in service of that violence is a worthy goal, and so on. Advertisement The reports do not delve into why Republican politicians might have been painted as traitors, but in the timeframe around their distribution, the term had been frequently lobbed at Republicans refusing to endorse conspiracies of electoral fraud. Those who publicly acknowledged President Joe Bidens electoral victory, such as Sen. Mitt Romney or Rep. Denver Riggleman, have been frequently derided as traitors by the former presidents zealous supporters. Roger Stone, a longtime friend of Donald Trump, told Insider last month, for example, that Vice President Mike Pence was viewed as a traitor by many attending last months Conservative Political Action Conference. Footage captured inside the Capitol during the breach showed the rioting Trump supporters repeatedly chanting, Hang Mike Pence. Advertisement The Department of Homeland Security did not respond to requests for a statement. For over a century, U.S. intelligence and law enforcement has targeted even mild leftist dissent as terrorism, while simultaneously ignoring and even assisting genuinely violent actors on the far-right, Ryan Shapiro, executive director of Property of the People, told Gizmodo. This has resulted in the brutal suppression of progressive movements and the rampant spread of murderous fascists menacing the nation today. Advertisement Telegram, an encrypted chat app that boasts over 500 million monthly active users, is considered by experts in online extremism to be a veritable safe haven for violent right-wing ideologies. According to the Atlantic Councils Digital Forensic Research Lab, the app has witnessed an influx in recent years of public channels explicitly aligned with far-right terror groups. In one recent case, a British teenagersaid to be part of a Telegram group that idolized Hitler and the terrorists behind the 2019 Christchurch massacrewas charged in January with circulating a notorious neo-Nazi handbook encouraging assassinations of Jews and people of color and offering detailed instructions on how to build improvised weapons and explosives. The stated goal of the manual is to topple democratic governments and incite an open race war. Advertisement Since 2015, white supremacists in the West have carried out at least 26 lethal attacks killing more than 141 people, according to a U.S. intelligence report made public last week. Of particular concern are white supremacists and anti-government extremists, such as militia groups and so-called sovereign citizens interested in plotting attacks against government, racial, religious, and political targets in the United States, writes START, the National Consortium for the Study of Terrorism and Responses to Terrorism. According to the Global Terrorism Index, attacks by right-wing terrorists increased by an astounding 320% between 2014 and 2019. Advertisement Biden administration officials have recently signaled their intent to commit greater resources to the fight against racially or ethnically motivated violent extremists. Intelligence officials seeing new levels of cooperation among hate groups crossing geographical borders told Congress last month that violent extremists promoting the superiority of the white race now have the most persistent and concerning transnational collections out of all categories of domestic threats. The focus on violent white supremacists would mark a significant policy shift, particularly from the Trump years, which saw diminishing support for programs countering a superior threat in favor of more politically advantageous oneschiefly aimed at immigrants and Muslims. In 2018, violent attacks by far-right terrorists, including white supremacists, more than doubled that of Islamic extremists in the West, according to START. That same year, Trump outlined his administrations counterintelligence strategy, never mentioning the word white (except in reference to the presidents home). Advertisement Islam, conversely, made 25 appearances. Subscribe to our newsletter! News from the future, delivered to your present. By subscribing you agree to our Terms of Use and Privacy Policy. Lastly, the United States has long faced a persistent security threat from domestic terrorists who are not motivated by a radical Islamist ideology but are instead motivated by other forms of violent extremism, the strategy paper eventually notes, in a final paragraph, listing racially motivated extremists in the same breath as animal rights activists. Advertisement Senior Reporter, Privacy & Security "... An upperclassman who had been researching terrorist groups online." - Washington Post | ||||
Bitcoin is facing an additional drop of 23% from current levels after breaching a key resistance level | ||||
Post Link posted at 18:16:54 UTC by <a href="mailto:mfox@businessinsider.com">mfox@businessinsider.com</a> (Matthew Fox) via Business Insider In this photo illustration, a visual representation of the digital Cryptocurrency, Bitcoin is displayed in front of the Bitcoin course's graph of Bitfinex cryptocurrency exchange website on November 20, 2018 in Paris, France.
Bitcoin's decline of 17% over the weekend could set it up for further downside if a key technical support level is decisively breached, according to a Monday note from technical analyst Katie Stockton of Fairlead Strategies. Stockton is closely monitoring bitcoin's 50-day moving average and 10-week moving average, which sits at $56,496 and $55,555 as of Monday afternoon, respectively. Those technical levels are above bitcoin's current price of $54,758. Consecutive daily closes below the moving averages would signal to Stockton that bitcoin could continue falling to its next support level around $42,000, which would represent a decline of 23% from current levels, and a decline of 35% from bitcoin's all-time-high of more than $64,000 reached last week. "The 50-day (~10-week) MA is being tested, and we believe consecutive closes below it would increase risk of a test of support near $42,000," Stockton said. Moving averages are a lagging trend-following indicator that technical analysts use to smooth out price movements and help identify the direction of the trend in place. Traders often view the the 50-day moving average, which is the average daily closing price of a security over its previous 50 trading sessions, as a short-term moving average that often represents areas of support or resistance. In a previous note, Stockton had highlighted bitcoin's recent breakout as generating a measured move price target of $69,000 for the cryptocurrency. Bitcoin's recent weakness does not invalidate that upside price target, according to the note. "The pullback does not negate the breakout, but it suggests tha its targeted level [$69,000] may take longer to achieve," Stockton explained, adding that despite the short-term pullback, bitcoin's long-term momentum "remains strong." Fairlead Strategies Read the original article on Business Insider | ||||
REVIEW - 2.25.18 The Hundred-Eyed Blind Monster By Michael Novakhov Topic: FBI Surveillance | ||||
REVIEW | Post Link 2.25.18 The Hundred-Eyed Blind Monster By Michael Novakhov Topic: FBI Surveillance The Hundred-Eyed Blind Monster By Michael Novakhov Topic: FBI Surveillance 2.25.18 | ||||
A heavily fortified Minneapolis awaits verdict in Chauvin trial - POLITICO | ||||
Selected Headlines | This Page Link | Page » Russia to withdraw from International Space Station starting from 2025, deputy PM confirms, as Moscow works on replacement - RT » 3 dead and 3 hurt in shooting at Kenosha, Wisconsin, bar; person of interest in custody - CBS News » A heavily fortified Minneapolis awaits verdict in Chauvin trial - POLITICO » Stars and Stripes: High-ranking Iranian general dies of heart disease at 65 » Just Security: Why Must Central American Asylum Seekers Risk Their Lives to Reach the US? There is an Alternative. » The National Interest: Fact: There Are 470,000,000 Guns In U.S. (And Will Keep Rising) | ||||
The International Space Station: A Laboratory in Space NASA | ||||
Brig. Gen. Mohammad Hosseinzadeh Hejazi, who died at 65, served as deputy commander of the Quds, or Jerusalem, force of Iran's paramilitary Revolutionary Guard. | ||||
9:57 AM 4/19/2021 - Russia to withdraw from International Space Station starting from 2025 ... | ||||
Michael Novakhov's favorite articles on Inoreader The News And Times: GA-A-GA! GA-A-GA: "Putin has to be very carefully ... thenewsandtimes.blogspot.com/2021/04/ga-ga- The News And Times: Netanyahu family threatens to sue former PM Ehud O... thenewsandtimes.blogspot.com/2021/04/netany Selected Headlines | This Page Link | Page » The Hog Baron » Five stories you need to know for April 19, 2021 » Facebook calls for data portability laws as it expands the types of info users can transfer to other services - CNBC » Will work ever be the same again? » USA Radio News 041921 Hour 08 » Texas shooting: search for fugitive after three people killed in Austin » Image of queen grieving alone prompts calls for Britain to revise covid funeral restrictions » European Union foreign ministers talk amid uproar over Ukraine, Navalny - KHOU.com » NPR News: 04-19-2021 8AM ET » Novichok inquest may become public inquiry, says coroner - Guernsey Press » U.S. Sanctions Squeeze Russias Bonds Despite Economic Strength - The Wall Street Journal » The News And Times: GA-A-GA! GA-A-GA: "Putin has to be very carefully ... thenewsandtimes.blogspot.com/2021/04/ga-ga- » The News And Times: Netanyahu family threatens to sue former PM Ehud O... thenewsandtimes.blogspot.com/2021/04/netany » Netanyahu family threatens to sue former PM Ehud Olmert shar.es/aoRbOd » Gun violence: US rocked by two separate shooting incidents - Hindustan Times shar.es/aoRbxw » Michael Novakhov retweeted: Seven-year-old girl is killed and her father is seriously injured in shooting as they sat in their car at McDonald's drive-thru trib.al/GRb8yyu | ||||
8:31 AM 4/19/2021 | ||||
Selected Headlines | This Page Link | Page » The Hog Baron » Five stories you need to know for April 19, 2021 » Facebook calls for data portability laws as it expands the types of info users can transfer to other services - CNBC | ||||
GA-A-GA! GA-A-GA: "Putin has to be very carefully (much more than now) and very professionally INVESTIGATED, and (if it is feasible) to be tried in The Hague." - M.N. | World: Putin responds to Bidens comments that hes a killer: I wish him good health | ||||
Michael Novakhov's favorite articles on Inoreader Gun violence: US rocked by two separate shooting incidents - Hindustan Times shar.es/aoRbxw Michael Novakhov retweeted: Seven-year-old girl is killed and her father is seriously injured in shooting as they sat in their car at McDonald's drive-thru trib.al/GRb8yyu The News And Times: The United States has seen at least 150 mass shoot... thenewsandtimes.blogspot.com/2021/04/the-un The United States has seen at least 150 mass shootings in 2021, about 50 - last month | Mass Shootings - Tweets Review shar.es/aoR3Zc Michael Novakhov retweeted: 7-year-old girl killed, her father injured, in McDonald's drive-thru shooting trib.al/TrQ9d8s Michael Novakhov retweeted: Former President George W. Bush is calling for bipartisan action on immigration and a restoration of "the people's confidence in an immigration system that serves both our values and our interests" cnn.it/3dvYEtG | ||||
Netanyahu family threatens to sue former PM Ehud Olmert | ||||
After former Prime Minister Ehud Olmert derides Netanyahu family as being 'mentally ill', the Netanyahus threaten million-shekel lawsuit. 2020's election keeps coming up in 2021's high court race - Pittsburgh Post-Gazette 2020's election keeps coming up in 2021's high court race Pittsburgh Post-Gazette | ||||
The United States has seen at least 150 mass shootings in 2021, about 50 - last month | Mass Shootings - Tweets Review | ||||
Michael Novakhov's favorite articles on Inoreader | Post Link The United States has seen at least 150 mass shootings in 2021, about 50 - last month - Google Search shar.es/aoR35t cnn.com/2021/04/18/us/ The News And Times: US civil unrest 2021 is incited by the hostile for... thenewsandtimes.blogspot.com/2021/04/us-civ INVESTIGATE THE INVESTIGATORS! INVESTIGATE THE TREACHEROUS, INEPT, BACKSTABBING GANG OF LIERS, PSYCHOPATHS, AND CRIMINALS calling themselves the "FBI"! FBI=KGB! mass shootings - Google Search shar.es/aoRmt5 Watch live: Officials to share update on active shooter situation in northwest Austin click2houston.com/news/local/202 Michael Novakhov retweeted: 3 people were declared dead at the scene of a shooting in Austin, Texas, authorities say. nbcnews.to/2Q6Gjea 3 killed, 2 injured in Kenosha County tavern shooting, sheriff's office says journaltimes.com/news/local/cri via @journaltimes The News And Times: US civil unrest 2021 is incited by the hostile for... thenewsandtimes.blogspot.com/2021/04/us-civ Michael Novakhov retweeted: Man, 18, arrested after pulling out an AK-47 and ammo on the platform of Times Square subway station trib.al/PLP8wPR What we know about Brandon Scott Hole, suspect in Indianapolis shooting at FedEx Center indystar.com/story/news/cri via @indystar Russia 'direct threat to Europe's security': Germany v.aa.com.tr/2212287 Brooklyn driver lobs Molotov cocktail at cops after blowing through red light nydailynews.com/new-york/nyc-c | ||||
US mass shootings: At least 50 since the Atlanta spa shootings - CNN | ||||
| ||||
KINO - (Movie Starts!) - SHA - (Shut up, everyone!) | ||||
KINO - (Movie Starts!) - SHA - (Shut up, everyone!)
| ||||
Oath Keepers leader coordinated with Proud Boys and others before Capitol riot, prosecutors say | ||||
A man accused of being a leader of a paramilitary group called the Oath Keepers was in contact with similar groups, including the Proud Boys, as early as mid-December to plan for potentially violent action in Washington on Jan. 6, according to a newly filed court document. It was the first suggestion by the government that members of extremist groups were in touch with one another before arriving in Washington. The allegation came in a Department of Justice memo opposing the pretrial release of Kelly Meggs of Florida. Prosecutors said he is one of 10 members of the Oath Keepers who played a leading role in the Capitol assault. Investigators have repeatedly said that members of both groups were among those who first breached the police lines around the Capitol and who first smashed their way into the building. In the latest submission, prosecutors said Meggs "plotted with his co-conspirators to stop the certification of the Electoral College vote, prepared to use violence if necessary, and stormed the Capitol." On Dec. 19, the court filing said, Meggs posted a message on Facebook saying, "This week I organized an alliance between Oath Keepers, Florida 3%ers, and Proud Boys. We have decided to work together and shut this s--- down." Three days later, he posted "Contact with PB and they always have a big group. Force multiplier," the government said. Between Dec. 12 and Jan. 4, prosecutors said, Meggs organized and participated in approximately 10 online discussions on the videoconference platform GoToMeeting that were affiliated with the Oath Keepers. He led and planned the group's activities and paid for two hotel rooms in Washington, the court filing said. The document does not allege that the groups formulated a plan to attack the Capitol before arriving in Washington. Asked during a "60 Minutes" interview last week if there was a premeditated plan to breach the Capitol, the man who supervised the investigation, Michael Sherwin, said, "That's what we're trying to determine right now." Its gonna be wild!!!! Its gonna be wild!!!!" Meggs wrote in a Facebook message, saying then-President Donald Trump "wants us to make it WILD thats what hes saying. He called us all to the Capitol and wants us to make it wild !!! Gentleman we are heading to DC pack your s--- !! In another Facebook message Dec. 25, Meggs said he and other Oath Keepers would probably be guarding someone during the day, the court document said. The name is blacked out, but some Oath Keepers were providing security for Roger Stone, who had been an adviser to Trump. He also listed provisions that people would need in Washington, including mace, gas masks, batons and armor. In that message, Meggs appeared to contemplate some kind of street protest action, saying the Oath Keepers would march with the Proud Boys, "then fall back to the back of the crowd and turn off," prepared to engage with any members of antifa. In another Facebook message, Meggs predicted that Trump would not resign. "Trumps staying in, he's gonna use the emergency broadcast system on cell phones to broadcast to the American people. Then he will claim the insurrection act." But by the afternoon of Jan. 6, prosecutors said, Meggs and other Oath Keepers rushed into the Capitol in a military style formation. | ||||
3 killed, 2 injured in Kenosha County tavern shooting, sheriff's office says | Crime and Courts | ||||
Privacy Preference CenterWhen you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information | ||||
Audio Post With Russias aid, ransomware reaps havoc, cash | How Much Did Russian Spy Agencies Rely On Bitcoin? New Hints In Leaked Recordings | Russias FSB Linked to $450M Bitcoin Disappearance BBC | US civil unrest 2021 is incited by the hostile foreign intelligence services In My Opinion M.N. | 20202021 United States racial unrest - Links - The News And Times Network | ||||
Listen to this article FILE A Russian man identified as Alexander Vinnik, center, is escorted by police officers from the courthouse at the northern Greek city of Thessaloniki, in this Friday, Sept. 29, 2017, file photo. Vinnick, convicted of laundering $160 million in criminal proceeds through a cryptocurrency exchange, is currently imprisoned in France and might yield additional information about the intersection of organized cybercrime and the Russian state. (AP Photo/Giannis Papanikos, File) BOSTON A global epidemic of digital extortion known as ransomware is crippling governments, hospitals, school districts and businesses by scrambling their data files until they pay up. Law enforcement agencies have been largely powerless to stop it. One big reason: Ransomware rackets are dominated by Russian-speaking cybercriminals who are shielded and sometimes employed by Russian intelligence agencies, according to security researchers, U.S. law enforcement officials, and now the Biden administration. | ||||
With Russia's aid, ransomware reaps havoc, cash | ||||
FILE - A Russian man identified as Alexander Vinnik, center, is escorted by police officers from the courthouse at the northern Greek city of Thessaloniki, in this Friday, Sept. 29, 2017, file photo. Vinnick, convicted of laundering $160 million in criminal proceeds through a cryptocurrency exchange, is currently imprisoned in France and might yield additional information about the intersection of organized cybercrime and the Russian state. (AP Photo/Giannis Papanikos, File) BOSTON -- A global epidemic of digital extortion known as ransomware is crippling governments, hospitals, school districts and businesses by scrambling their data files until they pay up. Law enforcement agencies have been largely powerless to stop it. One big reason: Ransomware rackets are dominated by Russian-speaking cybercriminals who are shielded -- and sometimes employed -- by Russian intelligence agencies, according to security researchers, U.S. law enforcement officials, and now the Biden administration. On Thursday, as the U.S. slapped sanctions on Russia for malign activities including state-backed hacking, the Treasury Department said Russian intelligence agencies have enabled ransomware attacks by cultivating and co-opting criminal hackers and giving them safe harbor. With ransomware damages now well into the tens of billions of dollars, former British intelligence cyber chief Marcus Willett recently deemed the scourge "arguably more strategically damaging than state cyber-spying." The value of Kremlin protection isn't lost on the cybercriminals themselves. Earlier this year, a Russian-language dark-web forum lit up with criticism of a ransomware purveyor known only as "Bugatti," whose gang had been caught in a rare U.S.-Europol sting. The assembled posters accused him of inviting the crackdown with technical sloppiness and by recruiting non-Russian affiliates who might be snitches or undercover agents. Worst of all, in the view of one long-active forum member, Bugatti had allowed Western authorities to seize ransomware servers that could have been sheltered in Russia instead. "Mother Russia will help," that individual wrote. "Love your country and nothing will happen to you." The conversation was captured by the security firm Advanced Intelligence, which provided it to The Associated Press. "Like almost any major industry in Russia, [cybercriminals] work kind of with the tacit consent and sometimes explicit consent of the security services," said Michael van Landingham, a former CIA analyst who runs the consultancy Active Measures LLC. Russian authorities have a simple rule, said Karen Kazaryan, CEO of the software industry-supported Internet Research Institute in Moscow: "Just don't ever work against your country and businesses in this country. If you steal something from Americans, that's fine." Unlike North Korea, there is no indication Russia's government benefits directly from ransomware crime, although Russian President Vladimir Putin may consider the resulting havoc a strategic bonus. In the United States alone last year, ransomware struck more than 100 federal, state and municipal agencies, upward of 500 hospitals and other health care centers, some 1,680 schools, colleges and universities and hundreds of businesses, according to t he cybersecurity firm Emsisoft. Damage in the public sector alone is measured in rerouted ambulances, postponed cancer treatments, interrupted municipal bill collection, canceled classes and rising insurance costs -- all during the worst public health crisis in more than a century. The idea behind these attacks is simple: Criminals infiltrate malicious data-scrambling software into computer networks, use it to "kidnap" an organization's data files, then demand huge payments, now as high as $50 million, to restore them. The latest twist: if victims fail to pay up, the criminals may publish their unscrambled data on the open internet. In recent months, U.S. law enforcement agencies have worked with partners including Ukraine and Bulgaria to break up these networks. But with the criminal masterminds out of reach, such operations are generally little more than whack-a-mole. Collusion between criminals and the government is nothing new in Russia, said Adam Hickey, a U.S. deputy assistant attorney general, who noted that cybercrime can provide good cover for espionage. Back in the 1990s, Russian intelligence agencies frequently recruited hackers for that purpose, said Kazaryan. Now, he said, ransomware criminals are just as likely to be moonlighting state-employed hackers. The Kremlin sometimes enlists arrested criminal hackers by offering them a choice between prison and working for the state, said Dmitri Alperovitch, former chief technical officer of the cybersecurity firm Crowdstrike. Sometimes the hackers use the same computer systems for state-sanctioned hacking and off-the-clock cybercrime for personal enrichment, he said. They may even mix state with personal business. That's what happened in a 2014 hack of Yahoo that compromised more than 500 million user accounts, allegedly including those of Russian journalists and U.S. and Russian government officials. A U.S. investigation led to the 2017 indictment of four men, including two officers of Russia's FSB security service -- a successor to the KGB. One of them, Dmitry Dokuchaev, worked in the same FSB office that cooperates with the FBI on computer crime. Another defendant, Alexsey Belan, allegedly used the hack for personal gain. A Russian Embassy spokesman declined to address questions about his government's alleged ties to ransomware criminals and state employees' alleged involvement in cybercrime. "We do not comment on any indictments or rumors," said Anton Azizov, the deputy press attache in Washington. Proving links between the Russian state and ransomware gangs is not easy. The criminals hide behind pseudonyms and periodically change the names of their malware strains to confuse Western law enforcement. But at least one ransomware purveyor has been linked to the Kremlin. Maksim Yakubets, 33, is best known as co-leader of a cybergang that cockily calls itself Evil Corp. The Ukraine-born Yakubets lives a flashy lifestyle, He drives a customized Lamborghini supercar with a personalized number plate that translates to "Thief," according to Britain's National Crime Agency. Yakubets started working for the FSB in 2017, working on projects including "acquiring confidential documents through cyber-enabled means and conducting cyber-enabled operations on its behalf," according to a December 2019 U.S. indictment. At the same time, the U.S. Treasury Department slapped sanctions on Yakubets and offered a $5 million reward for information leading to his capture. It said he was known to have been "in the process of obtaining a license to work with Russian classified information from the FSB." The indictment charged Evil Corp. with developing and distributing ransomware used to steal at least $100 million in more than 40 countries over the previous decade, including payrolls pilfered from towns in the American heartland. By the time Yakubets was indicted, Evil Corp. had become a major ransomware player, security researchers say. By May last year, the gang was distributing a ransomware strain that was used to attack eight Fortune 500 companies, including the GPS device maker Garmin, whose network was offline for days after an attack, according to Advanced Intelligence. Yakubets remains at large. Another Russian currently imprisoned in France, however, might offer more insight into the dealings of cybercriminals and the Russian state. Alexander Vinnik was convicted of laundering $160 million in criminal proceeds through a cryptocurrency exchange called BTC-e. A 2017 U.S. indictment charged that "some of the largest known purveyors of ransomware" actually used it to launder $4 billion. But Vinnik can't be extradited until he completes his five-year French prison sentence in 2024. Still, a 2018 study by the nonpartisan think tank Third Way found the odds of successfully prosecuting authors of cyberattacks against U.S. targets -- ransomware and online bank theft are the costliest -- are no better than 3 in 1,000. Experts say that those odds have gotten longer. The recent sanctions send a strong message, but aren't likely to deter Putin unless the financial sting hits closer to home, many analysts believe. That might require the kind of widespread multinational coordination that followed the 9/11 terror attacks. For instance, allied countries could identify banking institutions known to launder ransomware proceeds and cut them off from the global financial community. "If you're able to follow the money and disrupt the money and take the economic incentive out, that'll go a long way in stopping ransomware attacks," said John Riggi, cybersecurity advisor for the American Hospital Association and a former FBI official. Information for this article was contributed by Angela Charlton of The Associated Press. This poster provided by the U.S. Department of Justice shows Maxsim Yukabets. Yakubets, 33, is best known as co-leader of a cybergang that calls itself Evil Corp. (U.S. Department of Justice via AP) | ||||
How Much Did Russian Spy Agencies Rely On Bitcoin? New Hints In Leaked Recordings | ||||
When it was seized by U.S. law enforcement in 2017, BTC-e was described as "one of the world's largest and most widely used digital-currency exchanges." It was also one of the most notorious. Billions of bitcoin and other digital currencies had been swapped since BTC-e's creation six years prior. But that was before one of its alleged founders, Aleksandr Vinnik, was arrested on a Greek beach in 2017 on a U.S. arrest warrant. The following year, Special Counsel Robert Mueller revealed precise evidence in alleging how Russia's military intelligence agency used bitcoin transactions to mask meddling in the 2016 U.S. presidential elections. Earlier this month, new glimpses into the shadowy world of cryptocurrencies emerged in a BBC Russian Service report that provided more indications of how exactly Russian spy agencies were intertwined with bitcoin exchanges like BTC-e. "At a minimum, BTC-e was always heavily used by cybercriminals to launder funds, so it would have been a natural place for Russian intelligence to procure hard-to-trace funds as well," says Kim Nilsson, a Tokyo-based programmer engineer who gained renown for helping solve a massive bitcoin theft linked to BTC-e. "Russia's particular interest in Vinnik's extradition might suggest some important higher-ups may have had their fingers in the BTC-e pie, if not Russian intelligence itself," Nilsson tells RFE/RL. BTC-e, which was basically a giant online marketplace for buyers and sellers of bitcoins and other cryptocurrencies, had intrigued researchers, analysts, and law enforcement even before the United States seized it two years ago. Since its inception in 2011, founded and operated by Vinnik and a partner named Aleksandr Bilyuchenko, BTC-e's business model was heavily reliant on the criminal underworld and people and entities interested in anonymity or hard-to-trace transactions, according to U.S. and other officials. Its website said BTC-e was located in Bulgaria, but based in both Cyprus and the Seychelles. One researcher who tracks blockchain transactions -- essentially the underlying technology that makes cryptocurrencies function -- estimated that as of 2016 as much as 70 percent of all cryptocurrency criminal cases globally involved BTC-e. That included what turned out to be the theft of around $400 million from a bigger, older cryptocurrency exchange based in Tokyo known as Mt. Gox. Uncovered in 2014 mainly by Nilsson and colleagues, the theft was the biggest involving cryptocurrencies to date, and helped pushed Mt. Gox into bankruptcy. Investigators later found that between 2011 and 2014, BTC-e processed transactions involving funds stolen from Mt. Gox. Three years after the Mt. Gox collapse, on July 24, 2017, Vinnik was arrested on a beach in Greece, where he was vacationing with his family. When he was taken into custody by U.S. agents, Vinnik, who was charged with 21 counts of money laundering and other related charges, was logged onto his BTC-e account on his cell phone. According to the U.S. Justice Department, Vinnik, now 39, was allegedly the mastermind behind an international money-laundering scheme that had processed over $4 billion in cryptocurrency transactions, including bitcoins stolen from Mt. Gox. After his arrest and the unsealing of the U.S. extradition order, Russia filed a court order in Greece seeking to have Vinnik returned to Russia, purportedly to face charges in a case of small-scale fraud. France later filed its own extradition order. Two years after his arrest, on July 25, 2019, U.S. prosecutors filed another complaint against Vinnik and BTC-e, moving to seize about $100 million from frozen BTC-e accounts for alleged violations of U.S. banking laws. As of this writing, he is still in Greek prison awaiting a final ruling by Greek authorities on where he will be sent. 'The Perceived Anonymity Of Cryptocurrencies' On July 13, 2018, almost a year after Vinnik's arrest, the first of two U.S. indictments was unsealed, charging 12 officers from the Russian military intelligence service popularly known as the GRU with conspiracy to interfere in the U.S. political system in 2016 and other efforts. The first was brought by Special Counsel Mueller; the second, released in October, by U.S. prosecutors in Pennsylvania. Among other things, the indictments contained precise identifying information about the GRU units allegedly involved, including a group of hackers known unofficially as Fancy Bear. "To facilitate the purchase of infrastructure used in their hacking activity, the defendants conspired to launder the equivalent of more than $95,000 through a web of transactions structured to capitalize on the perceived anonymity of cryptocurrencies such as bitcoin," prosecutors wrote. The indictment also provided detailed information about the bitcoin transactions that were allegedly used by the agents. Tom Robinson, a scientist at London-based research company Elliptic Enterprises, examined the specific transactions, and in a report published 11 days after the first indictment, concluded there was a strong link between the GRU operatives and BTC-e. He stopped short of drawing a direct connection, however. Robinson did not immediately respond to a message left for him with Elliptic's spokesperson. Heir To BTC-e Within days after BTC-e was seized, a new Russian-based cryptocurrency exchange appeared, spearheaded, it later emerged, by one of Vinnik's partners at BTC-e, Bilyuchenko. Another man who was a frequent trader of cryptocurrency on BTC-e, Dmitry Vasilyev, was also involved. Like BTC-e, the exchange, called Wex, saw hundreds of millions of dollars in transactions of digital currencies. Months after its founding, in early 2018, the exchange collapsed amid the disappearance, according to the BBC Russian Service, of some $400 million in cryptocurrency. Russian users of Wex who were unable to access their holdings filed police complaints with Russian law enforcement. Prior to Wex's collapse, Bilyuchenko and Vasilyev had sought out investors and patrons who could help stabilize the exchange and provide some protection from Russian security agencies, a common business practice known as a "roof." Among those contacted by Bilyuchenko and Vasilyev, according to the BBC, were Konstantin Malofeyev, a wealthy Russian businessman known for his ties to the Kremlin and his advocacy of conservative and nationalist causes. The United States imposed financial sanctions on Malofeyev in 2014 for his support of Russia-backed separatists fighting in eastern Ukraine. Bilyuchenko later testified to police investigators that at around the time negotiations with Malofeyev were ongoing, he had been contacted by officials from Russia's main domestic spy agency, the Federal Security Service (FSB). In April 2018, Bilyuchenko testified that a man named Anton demanded that he turn over encrypted Wex assets, and the man said that the cryptocurrency would "go to the accounts of the FSB of Russia." Bilyuchenko later said he was held in jail until he agreed to transfer $450 million in cryptocurrency. The BBC also published a recording of a phone conversation purportedly between Bilyuchenko and Malofeyev in the summer of 2018. In the recording, a man identified as Malofeyev accuses Bilyuchenko of not transferring some of those funds. "There is a great suspicion among all participants in the process that you have more [money] than you put on the exchange. The fact that you were tied to BTC-e is obvious, but on BTC-e it was much more than it turned out on Wex," the man can be heard saying. "You are kept afloat because I say that you are mine and I am responsible for you." Neither Vasliyev's nor Bilyuchenko's whereabouts could be immediately determined. According to the BBC, in late 2018 Vasilyev sold his interests in Wex to a man who is prominent among Russia-backed militias fighting in eastern Ukraine. Vasilyev was arrested in Italy in July 2019, though he was released the same month. An e-mail sent to the press service of Malofeyev's main investment company, Marshall Capital, was not immediately returned. Not Just Simply Money Laundering? Researchers and analysts have for years concluded that Russian's leading spy agencies, the FSB and GRU, were taking advantage of the cover provided by cryptocurrency and their exchanges to fund operations. For now, there's scant incriminating evidence -- at least publicly -- that would directly expose how the money flows, something that would be of burning interest to U.S. intelligence agencies who have already concluded that the 2016 election interference campaign was authorized by President Vladimir Putin himself. But there are also indications U.S. authorities have much greater intelligence on the cryptocurrency transactions beyond those hinted at in the 2018 indictments, according to Tim Cotten, a researcher based in Washington, D.C. "No doubt the U.S. government, as the owners of the seized BTC-e, have much more data than could ever be hoped to be gleaned by a simple blockchain analysis about what funds were used where, when, and by who," he wrote in a blog post in April 2019. Cotton did not respond to e-mails seeking further comment. Nilsson notes, "We've all seen plenty of indications from the U.S. intelligence community that Russian intelligence is well-versed in the use of cryptocurrency in their operations, so it should come as no surprise if they're also involved in the shadier side of the market." The court filings in Vinnik's case hint that one of the reasons the legal fight for his extradition has been so hard-fought may be because his potential value as an intelligence asset -- able to provide details of BTC-e's inner workings, and the agencies that used it. Louis Goddard, a data investigator with the London-based corruption watchdog Global Witness and author of a recent report exposing a London financial company's ties with BTC-e, says he has not yet seen evidence of a link between the BTC-e's alleged operators and the Russian state. However, "the lengths that both sides in Aleksandr Vinnik's extradition battle have gone to -- including the filing of separate criminal and civil suits in the United States and the reported lobbying of the Greek government by Vladimir Putin himself -- raise questions about whether this case goes beyond money laundering," Goddard tells RFE/RL. | ||||
Russias FSB Linked to $450M Bitcoin Disappearance BBC - The Moscow Times | ||||
Russias intelligence agency the Federal Security Service (FSB) could be behind the disappearance of $450 million worth of cryptocurrency from an online exchange platform, the BBC has reported. The BBC investigation into how Wex, an online exchange for Bitcoin and other cryptocurrencies, went out of business in 2018 has revealed fresh links between the platforms demise and Russias security services. One of the sites co-founders told BBC News Russian he was forced to hand over information about customers digital wallets to individuals from the FSB in 2018. That information would enable them to seize the cryptocurrency which customers had saved on the platform worth a total of around $450 million at the time. | ||||
US civil unrest 2021 is incited by the hostile foreign intelligence services - In My Opinion - M.N. | ||||
INVESTIGATE THE INVESTIGATORS! INVESTIGATE THE TREACHEROUS, INEPT, BACKSTABBING GANG OF LIERS, PSYCHOPATHS, AND CRIMINALS calling themselves the "FBI"! FBI=KGB! INVESTIGATE the FBI nincompoops and G-PARAZITES! REFORM the rotten FBI NOW, and Radically!!! America, you deserve a much better domestic security service than this bunch of nincompoops and G-PARAZITES! INVESTIGATE THE INVESTIGATORS!DISMANTLE THE TREACHEROUS, INEPT, BACKSTABBING GANG OF LIERS, PSYCHOPATHS, AND CRIMINALS calling themselves the "FBI"! INVESTIGATE THE INVESTIGATORS! FBI=KGB! America, you deserve a much better domestic security service than this bunch of nincompoops and G-PARAZITES! REFORM!!! The News And Times: INVESTIGATE THE INVESTIGATORS! The epidemic of mass shootings started again, engineered by the KGB, the Russian (and other? the Israeli?) spies, agents, Fifth Columnists, etc., which are the Russian-Jewish MOB. | At least nine dead and up to 60 injured' ... US civil unrest 2021 is incited by the hostile foreign intelligence services 20202021 United States racial unrestINTELLIGENCE AGENCY LEADERS TESTIFY ON GLOBAL THREATS BEFORE HOUSE INTEL COMMITTEE - INTELLIGENCE AGENCY LEADERS TESTIFIED ON THE CURRENT GLOBAL THREATS AT A HOUSE INTELLIGENCE COMMITTEE HEARING. DIRECTOR OF NATIONAL INTELLIGENCE AVRIL READ MORE 2:32 - 2:35 -
What was discussed in that close session? Share this with the American Public without revealing the operational details and sources, in the non-classified way. The American People have the right to know! Exclusive: Large bitcoin payments to right-wing activists - Jan 14, 2021 U.S. law enforcement is investigating whether the donations were linked to the Jan. 6 assault on the U.S. Capitol. While the motivation is difficult ... NPR News: 04-18-2021 1AM ET Latest FOX News hourly newscast. audio/mpeg 041821news01.mp3 NPR News: 04-18-2021 2AM ET Latest FOX News hourly newscast. audio/mp3 a.mp3 NPR News: 04-18-2021 3AM ET Latest FOX News hourly newscast. | ||||
Russia 'direct threat to Europe's security': Germany | ||||
BERLIN German Defense Minister Annegret Kramp-Karrenbauer on Saturday lambasted Russia for being a direct and specific threat to European security. Speaking at the conservative Konrad-Adenauer Foundation in the south German town of Koenigsbronn, Kramp-Karrenbauer said: "Russia's arms build-up and its warfare in the middle of Europe has created real threats." She added: Anyone who points this out is not anti-Russian. Anyone who points this out is addressing an important political fact and taking active precautionary measures for our country and for Europe. The defense minister accused Moscow, among other things, of stationing missiles "that can reach Germany without much warning." "This happened in violation of the current arms control treaties and in secret," she said. In 2018, Russia confirmed the stationing of Iskander missiles with a range of 500 kilometers (310 miles) in the Kaliningrad exclave located between Poland, Lithuania, and the Baltic Sea after a long game of hide-and-seek. At that time, this was seen as Moscows reaction to the deployment of NATO troops in the Baltic states. Kramp-Karrenbauer again assessed the current Russian troop relocation to the border with Ukraine as a deliberate provocation. "Unfortunately, the Russian approach is not suitable for creating trust, but rather should obviously provoke reactions," the minister said. She praised Ukraine's level-headed in response to Russia's military actions. "Because we -- together with Ukraine -- don't want to get involved in this Russian game," she said. Earlier this week, Germany had raised concerns over Russias military build-up along its border with Ukraine, amid growing fears over a possible escalation in hostilities in the region. Meanwhile, Kramp-Karrenbauer accused Russia of increasingly defining itself as an illiberal, anti-democratic antithesis to the West. Other policy areas would be subordinated to this attitude, according to the defense minister. "The spectrum of state instruments of action, of which Russia undoubtedly makes active use, extends from sophisticated cyberattacks, arms exports, covert and open political influence, assassinations, direct and indirect military engagement," said Kramp-Karrenbauer. Germany has been the scene of massive Russian cyberattacks and dissident killings in recent years. Anadolu Agency website contains only a portion of the news stories offered to subscribers in the AA News Broadcasting System (HAS), and in summarized form. Please contact us for subscription options. | ||||
The News And Times | ||||
Audio Post - The News And Times Review - 5:08 PM 4/17/2021 Michael Novakhov - SharedNewsLinks | In Brief | - | ||||
1:00 PM 4/17/2021 - "fbi cleaned up computers" - hard to believe. Including from their own spying malware which is (or was) omnipresent? With the purpose of hiding the traces of their own cyber crimes and unlawful mass surveillance? | ||||
fbi cleaned up computers (GS), Including from their own spying malware which is (or was) omnipresent? With the purpose of hiding the traces of their own cyber crimes and unlawful mass surveillance? That what I think happened with my laptop. And I think, they are very well aware of it. The FBI has been hacking into the computers of US companies running insecure versions of Microsoft software in order to fix them, the US Department of Justice has announced. The operation, approved by a federal court, involved the FBI hacking into hundreds of vulnerable computers to remove malware placed there by an earlier malicious hacking campaign, which Microsoft blamed on a Chinese hacking group known as Hafnium. Hafniums operation placed backdoors into tens of thousands of servers running Microsofts Exchange software, which allows businesses to manage emails, contacts and calendars for their employees. It took advantage of a weakness in the servers, now fixed, to plant the malware, which allowed the hackers to return at a later date. The FBIs campaign uses the same weakness in the hundreds of servers that have still not been patched to hack the hackers breaking into the vulnerable computers and removing the backdoors entirely. Todays court-authorised removal of the malicious web shells demonstrates the Departments commitment to disrupt hacking activity using all of our legal tools, not just prosecutions, the US Department of Justices assistant attorney general, John C Demers, said. Combined with the private sectors and other government agencies efforts to date, including the release of detection tools and patches, we are together showing the strength that public-private partnership brings to our countrys cybersecurity. Although the FBIs campaign removed the malware placed by one hacker group, it did not actively fix the underlying vulnerability, meaning that affected computers may simply be reinfected in the future if their owners do not take action to protect them. The FBI says it is attempting to notify all the owners of the affected computers, either by sending them an email from an official FBI email account, or emailing their internet service providers. Benevolent hacking, also called a white hat hack, is rare, particularly from state actors, but not unheard-of. In 2016, a widespread weakness in internet-of-things devices led to the creation of a botnet called Mirai, which allowed criminals to seize millions of devices and direct them at websites and services, overwhelming them with traffic and crashing them. But in 2017, a computer virus called Hajime was discovered to be infecting devices through the same weakness, and closing the door behind it. A message from the viruss author said they were just a white hat, securing some systems. | ||||
FBI hacks vulnerable US computers to fix malicious malware | Hacking | ||||
The FBI has been hacking into the computers of US companies running insecure versions of Microsoft software in order to fix them, the US Department of Justice has announced. The operation, approved by a federal court, involved the FBI hacking into hundreds of vulnerable computers to remove malware placed there by an earlier malicious hacking campaign, which Microsoft blamed on a Chinese hacking group known as Hafnium. Hafniums operation placed backdoors into tens of thousands of servers running Microsofts Exchange software, which allows businesses to manage emails, contacts and calendars for their employees. It took advantage of a weakness in the servers, now fixed, to plant the malware, which allowed the hackers to return at a later date. The FBIs campaign uses the same weakness in the hundreds of servers that have still not been patched to hack the hackers breaking into the vulnerable computers and removing the backdoors entirely. Todays court-authorised removal of the malicious web shells demonstrates the Departments commitment to disrupt hacking activity using all of our legal tools, not just prosecutions, the US Department of Justices assistant attorney general, John C Demers, said. Combined with the private sectors and other government agencies efforts to date, including the release of detection tools and patches, we are together showing the strength that public-private partnership brings to our countrys cybersecurity. Although the FBIs campaign removed the malware placed by one hacker group, it did not actively fix the underlying vulnerability, meaning that affected computers may simply be reinfected in the future if their owners do not take action to protect them. The FBI says it is attempting to notify all the owners of the affected computers, either by sending them an email from an official FBI email account, or emailing their internet service providers. Benevolent hacking, also called a white hat hack, is rare, particularly from state actors, but not unheard-of. In 2016, a widespread weakness in internet-of-things devices led to the creation of a botnet called Mirai, which allowed criminals to seize millions of devices and direct them at websites and services, overwhelming them with traffic and crashing them. But in 2017, a computer virus called Hajime was discovered to be infecting devices through the same weakness, and closing the door behind it. A message from the viruss author said they were just a white hat, securing some systems. | ||||
Dogs can sniff out positive coronavirus samples with 96% accuracy - study - The Jerusalem Post | ||||
Michael Novakhov's favorite articles on Inoreader
Albany County Executive Dan McCoy holds a county coronavirus news briefing on Thursday, April 8, 2021, at the county offices in Albany, N.Y. 41.8% ... Google Alert - coronavirus new york
Prince Philip's funeral was held on Saturday, April 17, with only 30 mourners allowed due to COVID-19 protocols. CBS News' Charlie D'Agata joined "CBS This Morning" from the grounds of Windsor Castle, while Tina Brown discussed Philip's legacy and funeral. |
____________________________________________________________________________
Michael Novakhov - SharedNewsLinks℠ | In Brief |
- Get link
- X
- Other Apps
Comments
Post a Comment