RUSSIA/РОССИЯ THREAD—ASSANGE CHRGD W/ SPYING—DJT IMPEACHED TWICE-US TREASURY SANCTS KILIMNIK AS RUSSIAN AGNT

Blackfyre

Veteran
Supporter
Joined
Oct 30, 2017
Messages
17,201
Reputation
3,074
Daps
67,420
Reppin
Earthrealm
wow...

realDonaldTrump
“Congressman Schiff omitted and distorted key facts” @FoxNews So, what else is new. He is a total phony!
Feb 24, 2018 at 7:56 PM

brianstelter
Holy moly. The @FoxNews anchor said "Congressman Schiff, he ARGUES the REPUBLICAN memo omitted and distorted key facts." Trump just deleted 5 words from the quote to allege the opposite meaning. twitter.com/realDonaldTrum…
Feb 24, 2018 at 8:05 PM

brianstelter
SCHIFF is the one who's alleging the Republicans -- quote -- "omitted and distorted key facts." That's the exact quote from @RepAdamSchiff's Twitter feed.
Feb 24, 2018 at 8:09 PM

brianstelter
Trump MISquoted two different @FoxNews reports tonight. Either he truly misunderstood what he heard on TV, which is worrisome, or he purposefully misquoted it, which is also worrisome.
Feb 24, 2018 at 8:13 PM
 

Blackfyre

Veteran
Supporter
Joined
Oct 30, 2017
Messages
17,201
Reputation
3,074
Daps
67,420
Reppin
Earthrealm

ThePlumLineGS
Striking detail in Schiff rebuttal. Steele's sources reported that a "senior Kremlin official" allegedly told Page that "Kremlin possessed compromising info on Clinton" and noted "possibility of it being released" to Trump campaign. FBI saw this as "consistent" w/other info. pic.twitter.com/atehDlaCYP
Feb 24, 2018 at 5:38 PM
 

☑︎#VoteDemocrat

The Original
WOAT
Supporter
Joined
Dec 9, 2012
Messages
307,485
Reputation
-34,327
Daps
618,067
Reppin
The Deep State
:ALERTRED::ALERTRED::ALERTRED:




Russian spies hacked the Olympics and tried to make it look like North Korea did it, U.S. officials say
2018-02-09T143204Z_445666310_RC1BFE1AD900_RTRMADP_3_OLYMPICS-2018-OPENING.jpg


Russian military spies hacked several hundred computers used by authorities at the 2018 Winter Olympic Games in South Korea, according to U.S. intelligence.


They did so while trying to make it appear as though the intrusion was conducted by North Korea, what is known as a “false-flag” operation, said two U.S. officials who spoke on the condition of anonymity to discuss a sensitive matter.

Officials in PyeongChang acknowledged that the Games were hit by a cyberattack during the Feb. 9 Opening Ceremonies but had refused to confirm whether Russia was responsible. That evening there were disruptions to the Internet, broadcast systems and the Olympics website. Many attendees were unable to print their tickets for the ceremony, resulting in empty seats.

Analysts surmise the disruption was retaliation against the International Olympic Committee for banning the Russian team from the Winter Games due to doping violations. No officials from Russia’s Olympic federation were allowed to attend, and while some athletes were permitted to compete under the designation “Olympic Athletes from Russia,” they were unable to display the Russian flag on their uniforms and, if they won medals, their country’s anthem was not played.


As of early February, the Russian military agency GRU had access to as many as 300 Olympic-related computers, according to an intelligence report this month.

The Office of the Director of National Intelligence declined to comment.

[World Anti-Doping Agency confirms Russian hack of Rio Olympic drug database]

The intelligence, which has not been publicly affirmed, is consistent with reports from private-sector analysts who have said they saw signs Russia had targeted the 2018 Olympics. It also would continue a pattern of such attempts, including during the 2016 Summer Games in Rio de Janeiro.

Some U.S. officials are concerned the Russians may try to disrupt the Closing Ceremonies on Sunday. “We’re watching it pretty closely,” said one. “It’s essentially a Korean problem,” the official added. “We will help the Koreans as requested.”

Apart from accessing the computers, GRU cyber-operators also hacked routers in South Korea last month and deployed new malware on the day the Olympics began, according to Western intelligence agencies. Such access could enable intelligence collection or network attacks, officials said.

It is not clear whether the disruptions during the Opening Ceremonies were the result of that access, but the development is concerning regardless, information security experts said.

“Anyone who controls a router would be able to redirect traffic for one or more selected targets or cause total disruption in the network by stopping the routing entirely,” said Jake Williams, a former National Security Agency cyber-operator and co-founder of Rendition Infosec, a cybersecurity firm.

“Development of router malware is extremely costly, and Russia would likely use it only in locations where it contributes to accomplishing a high-value goal,” said Williams.

The GRU hackers are thought to work for the agency’s Main Center for Special Technology, or GTsST, according to intelligence agencies. That unit has been highly active in information warfare against the West and was behind the NotPetya cyberattack that crippled computers in Ukraine last year.


[The CIA concludes the Russian military was behind NotPetya cyberattack in Ukraine]

Two years ago, the GRU penetrated a database containing drug test results and confidential medical data, and posted information about noteworthy U.S. athletes including tennis stars Serena and Venus Williams, four-time gymnastics gold medalist Simone Biles and women’s basketball standout Elena Delle Donne.

That action was widely seen as payback after nearly every member of Russia’s track and field team was banned from the 2016 Olympics. Numerous investigations uncovered a widespread, government-run doping scheme that dated back years.

Russia has a long history of undertaking such “active measures” against the Olympic Games, noted Thomas Rid, a professor of strategic studies at Johns Hopkins University. During the 1984 Olympics in Los Angeles, Soviet intelligence released fake Ku Klux Klan leaflets threatening violence against African athletes as part of an effort to embarrass the United States, he said. That year, the Soviets led a 14-nation boycott of the Games in retaliation for a U.S. boycott of the 1980 Summer Games in Moscow, which was prompted by the Soviets’ 1979 invasion of Afghanistan.

[NotPetya ‘ransomware’ was a ruse to hide hackers’ identity]

Checkpoint newsletter

Military, defense and security at home and abroad.

The 1984 effort failed, Rid said, because the U.S. government “very quickly” revealed the Soviet attempt. As a result, no African athletes withdrew from the Games.

While “old-school” tactics relied on leaflets among other things, the Internet has provided new tools to spread disinformation, he said.

In this case, the GRU sought to make it appear as though the intrusions were the work of North Korean hackers by using North Korean IP addresses and other tactics, said the officials. Such deception is common for the GRU.







@DonKnock @dza @88m3 @wire28 @smitty22 @fact @Hood Critic @ExodusNirvana @Blessed Is the Man @dtownreppin214 @JKFrazier @tmonster @BigMoneyGrip @Soymuscle Mike @.r. @Dorian Breh @Dameon Farrow @TheNig @VR Tripper @re'up @Blackfyre_Berserker @Cali_livin
 
Last edited:

FaTaL

Veteran
Joined
May 2, 2012
Messages
102,184
Reputation
4,944
Daps
204,058
Reppin
NULL
:ALERTRED::ALERTRED::ALERTRED:




Russian spies hacked the Olympics and tried to make it look like North Korea did it, U.S. officials say
2018-02-09T143204Z_445666310_RC1BFE1AD900_RTRMADP_3_OLYMPICS-2018-OPENING.jpg

Russian military spies hacked several hundred computers used by authorities at the 2018 Winter Olympic Games in South Korea, according to U.S. intelligence.

They did so while trying to make it appear as though the intrusion was conducted by North Korea, what is known as a “false-flag” operation, said two U.S. officials who spoke on the condition of anonymity to discuss a sensitive matter.

Officials in PyeongChang acknowledged that the Games were hit by a cyberattack during the Feb. 9 Opening Ceremonies but had refused to confirm whether Russia was responsible. That evening there were disruptions to the Internet, broadcast systems and the Olympics website. Many attendees were unable to print their tickets for the ceremony, resulting in empty seats.

Analysts surmise the disruption was retaliation against the International Olympic Committee for banning the Russian team from the Winter Games due to doping violations. No officials from Russia’s Olympic federation were allowed to attend, and while some athletes were permitted to compete under the designation “Olympic Athletes from Russia,” they were unable to display the Russian flag on their uniforms and, if they won medals, their country’s anthem was not played.

As of early February, the Russian military agency GRU had access to as many as 300 Olympic-related computers, according to an intelligence report this month.

The Office of the Director of National Intelligence declined to comment.

[World Anti-Doping Agency confirms Russian hack of Rio Olympic drug database]

The intelligence, which has not been publicly affirmed, is consistent with reports from private-sector analysts who have said they saw signs Russia had targeted the 2018 Olympics. It also would continue a pattern of such attempts, including during the 2016 Summer Games in Rio de Janeiro.

Some U.S. officials are concerned the Russians may try to disrupt the Closing Ceremonies on Sunday. “We’re watching it pretty closely,” said one. “It’s essentially a Korean problem,” the official added. “We will help the Koreans as requested.”

Apart from accessing the computers, GRU cyber-operators also hacked routers in South Korea last month and deployed new malware on the day the Olympics began, according to Western intelligence agencies. Such access could enable intelligence collection or network attacks, officials said.

It is not clear whether the disruptions during the Opening Ceremonies were the result of that access, but the development is concerning regardless, information security experts said.

“Anyone who controls a router would be able to redirect traffic for one or more selected targets or cause total disruption in the network by stopping the routing entirely,” said Jake Williams, a former National Security Agency cyber-operator and co-founder of Rendition Infosec, a cybersecurity firm.

“Development of router malware is extremely costly, and Russia would likely use it only in locations where it contributes to accomplishing a high-value goal,” said Williams.

The GRU hackers are thought to work for the agency’s Main Center for Special Technology, or GTsST, according to intelligence agencies. That unit has been highly active in information warfare against the West and was behind the NotPetya cyberattack that crippled computers in Ukraine last year.

[The CIA concludes the Russian military was behind NotPetya cyberattack in Ukraine]

Two years ago, the GRU penetrated a database containing drug test results and confidential medical data, and posted information about noteworthy U.S. athletes including tennis stars Serena and Venus Williams, four-time gymnastics gold medalist Simone Biles and women’s basketball standout Elena Delle Donne.

That action was widely seen as payback after nearly every member of Russia’s track and field team was banned from the 2016 Olympics. Numerous investigations uncovered a widespread, government-run doping scheme that dated back years.

Russia has a long history of undertaking such “active measures” against the Olympic Games, noted Thomas Rid, a professor of strategic studies at Johns Hopkins University. During the 1984 Olympics in Los Angeles, Soviet intelligence released fake Ku Klux Klan leaflets threatening violence against African athletes as part of an effort to embarrass the United States, he said. That year, the Soviets led a 14-nation boycott of the Games in retaliation for a U.S. boycott of the 1980 Summer Games in Moscow, which was prompted by the Soviets’ 1979 invasion of Afghanistan.

[NotPetya ‘ransomware’ was a ruse to hide hackers’ identity]

Checkpoint newsletter

Military, defense and security at home and abroad.

The 1984 effort failed, Rid said, because the U.S. government “very quickly” revealed the Soviet attempt. As a result, no African athletes withdrew from the Games.

While “old-school” tactics relied on leaflets among other things, the Internet has provided new tools to spread disinformation, he said.

In this case, the GRU sought to make it appear as though the intrusions were the work of North Korean hackers by using North Korean IP addresses and other tactics, said the officials. Such deception is common for the GRU.







@DonKnock @dza @88m3 @wire28 @smitty22 @fact @Hood Critic @ExodusNirvana @Blessed Is the Man @dtownreppin214 @JKFrazier @tmonster @BigMoneyGrip @Soymuscle Mike @.r. @Dorian Breh @Dameon Farrow @TheNig @VR Tripper @re'up @Blackfyre_Berserker @Cali_livin

Is nk even capable of accomplishing something like this?
 

Jx2

Veteran
Joined
May 28, 2012
Messages
13,672
Reputation
3,921
Daps
66,908
Reppin
NULL
:ALERTRED::ALERTRED::ALERTRED:




Russian spies hacked the Olympics and tried to make it look like North Korea did it, U.S. officials say
2018-02-09T143204Z_445666310_RC1BFE1AD900_RTRMADP_3_OLYMPICS-2018-OPENING.jpg

Russian military spies hacked several hundred computers used by authorities at the 2018 Winter Olympic Games in South Korea, according to U.S. intelligence.

They did so while trying to make it appear as though the intrusion was conducted by North Korea, what is known as a “false-flag” operation, said two U.S. officials who spoke on the condition of anonymity to discuss a sensitive matter.

Officials in PyeongChang acknowledged that the Games were hit by a cyberattack during the Feb. 9 Opening Ceremonies but had refused to confirm whether Russia was responsible. That evening there were disruptions to the Internet, broadcast systems and the Olympics website. Many attendees were unable to print their tickets for the ceremony, resulting in empty seats.

Analysts surmise the disruption was retaliation against the International Olympic Committee for banning the Russian team from the Winter Games due to doping violations. No officials from Russia’s Olympic federation were allowed to attend, and while some athletes were permitted to compete under the designation “Olympic Athletes from Russia,” they were unable to display the Russian flag on their uniforms and, if they won medals, their country’s anthem was not played.

As of early February, the Russian military agency GRU had access to as many as 300 Olympic-related computers, according to an intelligence report this month.

The Office of the Director of National Intelligence declined to comment.

[World Anti-Doping Agency confirms Russian hack of Rio Olympic drug database]

The intelligence, which has not been publicly affirmed, is consistent with reports from private-sector analysts who have said they saw signs Russia had targeted the 2018 Olympics. It also would continue a pattern of such attempts, including during the 2016 Summer Games in Rio de Janeiro.

Some U.S. officials are concerned the Russians may try to disrupt the Closing Ceremonies on Sunday. “We’re watching it pretty closely,” said one. “It’s essentially a Korean problem,” the official added. “We will help the Koreans as requested.”

Apart from accessing the computers, GRU cyber-operators also hacked routers in South Korea last month and deployed new malware on the day the Olympics began, according to Western intelligence agencies. Such access could enable intelligence collection or network attacks, officials said.

It is not clear whether the disruptions during the Opening Ceremonies were the result of that access, but the development is concerning regardless, information security experts said.

“Anyone who controls a router would be able to redirect traffic for one or more selected targets or cause total disruption in the network by stopping the routing entirely,” said Jake Williams, a former National Security Agency cyber-operator and co-founder of Rendition Infosec, a cybersecurity firm.

“Development of router malware is extremely costly, and Russia would likely use it only in locations where it contributes to accomplishing a high-value goal,” said Williams.

The GRU hackers are thought to work for the agency’s Main Center for Special Technology, or GTsST, according to intelligence agencies. That unit has been highly active in information warfare against the West and was behind the NotPetya cyberattack that crippled computers in Ukraine last year.

[The CIA concludes the Russian military was behind NotPetya cyberattack in Ukraine]

Two years ago, the GRU penetrated a database containing drug test results and confidential medical data, and posted information about noteworthy U.S. athletes including tennis stars Serena and Venus Williams, four-time gymnastics gold medalist Simone Biles and women’s basketball standout Elena Delle Donne.

That action was widely seen as payback after nearly every member of Russia’s track and field team was banned from the 2016 Olympics. Numerous investigations uncovered a widespread, government-run doping scheme that dated back years.

Russia has a long history of undertaking such “active measures” against the Olympic Games, noted Thomas Rid, a professor of strategic studies at Johns Hopkins University. During the 1984 Olympics in Los Angeles, Soviet intelligence released fake Ku Klux Klan leaflets threatening violence against African athletes as part of an effort to embarrass the United States, he said. That year, the Soviets led a 14-nation boycott of the Games in retaliation for a U.S. boycott of the 1980 Summer Games in Moscow, which was prompted by the Soviets’ 1979 invasion of Afghanistan.

[NotPetya ‘ransomware’ was a ruse to hide hackers’ identity]

Checkpoint newsletter

Military, defense and security at home and abroad.

The 1984 effort failed, Rid said, because the U.S. government “very quickly” revealed the Soviet attempt. As a result, no African athletes withdrew from the Games.

While “old-school” tactics relied on leaflets among other things, the Internet has provided new tools to spread disinformation, he said.

In this case, the GRU sought to make it appear as though the intrusions were the work of North Korean hackers by using North Korean IP addresses and other tactics, said the officials. Such deception is common for the GRU.







@DonKnock @dza @88m3 @wire28 @smitty22 @fact @Hood Critic @ExodusNirvana @Blessed Is the Man @dtownreppin214 @JKFrazier @tmonster @BigMoneyGrip @Soymuscle Mike @.r. @Dorian Breh @Dameon Farrow @TheNig @VR Tripper @re'up @Blackfyre_Berserker @Cali_livin

Be a country full of dirty nasty scumbags brehs :mjlol:
 
Top