SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Formerly About Advanced Micro Devices -- Ignore unavailable to you. Want to Upgrade?


To: longnshort who wrote (1061580)3/22/2018 10:53:03 AM
From: Brumar891 Recommendation

Recommended By
SeachRE

  Read Replies (1) | Respond to of 1576270
 
Nearly 70 percent say Trump is a bad role model for children: poll

BY JOSH DELK - 03/21/18 02:18 PM EDT


[ What is wrong with the people who don't know that this Vile President is a horrible role model? Surely, they know better and are just pretending out of loyalty to the cult leader. I actually hope that's all it is. ]


Nearly 70 percent of voters say that President Trump is a bad role model for children, according to a survey released Wednesday.

Respondents to the Quinnipiac University poll said by 67 percent to 29 percent that Trump is not a good role model for kids, a position held consistently across age groups ranging from 18 to 65 and up.

Over half of voters, 55 percent, say the president does not have a sense of decency, while 42 percent said he does.

Fifty-nine percent of respondents said Trump does not share their values, and 53 percent said he doesn't care about the average American.

Only 30 percent are proud to have Trump as commander in chief; 50 percent are embarrassed.

Democrats and some Republicans have criticized Trump in the past over his decorum and harsh, sometimes vulgar, language.

Sen. Bob Corker (R-Tenn.), who is retiring after 2018, once said the 45th president is " absolutely not" a good role model for children and would be remembered most for "the debasement of our nation."

GOP Sen. Jeff Flake (Ariz.), who is also stepping down after this year, condemned Trump's "mean and cruel tweets" in an October interview.

"The statements that are made about people and seeming to ascribe the worst motives to people as well, that's something we tell our kids not to do,” Flake said.

The Quinnipiac University poll was conducted March 16-20 among 1,291 voters and has a margin of error of 3.3 percentage points.

thehill.com

[ Yeah, and there's the whole adultery with porn stars thing. While still a newlywed. Maybe Trumpsters hope their sons grow up to do that. And they want their daughters to bang any rich guy who grabs 'em by the .... well, you know.

Remember, Johnny, a real man grabs women's body parts at every opportunity... that shows what a stud you are. If any bitch complains, call her an ugly liar and threaten to sue her for everything she's worth. Bullying women is what tough men do. ]




To: longnshort who wrote (1061580)3/22/2018 10:59:13 AM
From: Brumar89  Respond to of 1576270
 
Russian tech firm exposed US cyber ops against ISIS, AQ

Julia Davis
?@JuliaDavisNews
Follow Follow @JuliaDavisNews
More
Recent Kaspersky research report burned an active, U.S.-led counterterrorism cyber-espionage operation against ISIS, Al-Qaeda.
Senior U.S. intel official: “It’s clear by the way they wrote about this that they knew what it was being used for.”

[ Yevgeny (Eugene) Kaspersky educated at a KGB university, worked for KGB, met wife at a KGB resort. Billionaire friend of Putin. Traitor Trump wanted to team up with Russia on cyber-security .... President Treason is a danger to the security of the United States. ].

Kaspersky's 'Slingshot' report burned an ISIS-focused intelligence operation
The U.S. government and Russian cybersecurity giant Kaspersky Lab are currently in the throes of a nasty legal fight that comes on top of a long-running feud over how the company has conducted itself with regard to U.S. intelligence-gathering operations.

A recent Kaspersky discovery may keep the feud alive for years to come.

CyberScoop has learned that Kaspersky research recently exposed an active, U.S.-led counterterrorism cyber-espionage operation. According to current and former U.S. intelligence officials, the operation was used to target ISIS and al-Qaeda members.

On March 9, Kaspersky publicly announced a malware campaign dubbed “ Slingshot.” According to the company’s researchers, the campaign compromised thousands of devices through breached routers in various African and Middle Eastern countries, including Afghanistan, Iraq, Kenya, Sudan, Somalia, Turkey and Yemen.

Kaspersky did not attribute Slingshot to any single country or government in its public report, describing it only as an advanced persistent threat (APT). But current and former U.S. intelligence officials tell CyberScoop that Slingshot represents a U.S. military program run out of Joint Special Operations Command (JSOC), a component of Special Operations Command (SOCOM).

The complex campaign, which researchers say was active for at least six years, allowed for the spread of highly intrusive malware that could siphon large amounts of data from infected devices.

Slingshot helped the military and intelligence community collect information about terrorists by infecting computers they commonly used, sources told CyberScoop. Often times, these targeted computers would be located within internet cafés in developing countries. ISIS and al-Qaeda targets would use internet cafés to send and receive messages, the sources said.

These officials, all of whom spoke on condition of anonymity to discuss a classified program, fear the exposure may cause the U.S. to lose access to a valuable, long-running surveillance program and put soldiers’ lives at risk.

The disclosure comes at a difficult time for Kaspersky. The company is currently fighting the U.S. government in court after the government claimed that the Moscow-based company’s software poses a national security risk due to the company’s Russian government ties. Kaspersky has consistently denied any wrongdoing.

CyberScoop’s reporting of JSOC’s role in Slingshot provides the first known case of a SOCOM-led cyber-espionage operation. The command is better known for leading physical missions that place elite soldiers on the ground in hostile territories. Over the last decade, SOCOM has been instrumental in the Global War on Terror, having conducted many sensitive missions, including the one that killed former al-Qaeda leader Osama bin Laden.

Slingshot, CyberScoop has learned, is a complement to JSOC’s physical missions.

A former intelligence official told CyberScoop that Kaspersky’s findings had likely already caused the U.S. to abandon and “burn” some of the digital infrastructure that JSOC was using to manage the surveillance program.

“SOP [standard operating procedure] is to kill it all with fire once you get caught,” said the former intelligence official. “It happens sometimes and we’re accustomed to dealing with it. But it still sucks … I can tell you this didn’t help anyone.”

SOCOM has hackers?While not an intelligence agency by nature, SOCOM has dabbled in cyber-operations — known inside the unit as “ special reconnaissance” — for some time, according to multiple academics who have examined the use of offensive cyber tools within special operations units. Most of these operations would usually combine elements of human (HUMINT) and signals intelligence (SIGINT) in order to catch terrorists.

As the Global War on Terror grew, most combatant commands took visible steps and received considerable funding to build out their own espionage capabilities. One of the military organizations which benefited most from this explosive growth in resources was SOCOM, a unit that many describe as the “tip of the spear” when it comes to military operations.

“Many units within SOCOM possess independent cyber capabilities,” a senior U.S. intelligence official told CyberScoop.

Throughout the past decade, SOCOM has used cyber operations in a very ad hoc manner. If cyberwarfare was used in an operation, SOCOM has either been given support from U.S. Cyber Command or reliant on smaller squadrons within various units.

For instance, a group of hackers organized under the name “Computer Network Operations Squadron” (CNOS), were known to operate within JSOC command circa 2007. Though headquartered in Northern Virginia, CNOS helped coordinate missions where on-the-ground agents in the Middle East — and sometimes undercover operatives — would infiltrate internet cafés and local telecommunications firms. The squadron was first written about in “Relentless Strike: The Secret History of Joint Special Operations Command,” a book by journalist Sean Naylor.

Naylor wrote that CNOS staff could be stationed around the world, including at Fort Meade in Maryland and CIA’s Langley, Virginia, headquarters. CNOS had close connections to CIA, blurring the already fuzzy line between U.S. intel and military organizations.

In one case mentioned by Naylor’s book, CNOS infected a terrorist’s computer with “keystroke recognition [software], at other times it would covertly activate a webcam if the computer had one, allowing the task force to positively identify a target.”

The Slingshot program found by Kaspersky had similar capabilities.

SOCOM’s exclusive structure provides an easy way to leverage long-standing intelligence programs, since it is permitted to quickly organize and deploy forces globally wherever defined rules of engagement exist. Teams like CNOS, as described by Naylor, are usually able to work closely with intelligence agencies in foreign, undefined war-zones after receiving approval from the appropriate regional combatant commands and Pentagon.

JSOC and CIA have a history of working together and when combined, meet a similar profile to how Slingshot would be utilized.

“The military kept CNOS in JSOC ‘because we want it to operate in areas that are not necessarily … where we’re currently at war’ … we want it to operate around the globe [pursuing] national objectives,” a passage in Naylor’s book, citing an unnamed military intelligence officer, reads. “[CNOS] was how the pesky networks were broken in Iraq.”

Slingshot’s ties to spiesOne Kaspersky researcher involved with the Slingshot report said the malware campaign illustrated one of the most skilled and sophisticated hacking operations ever to be publicly documented. Its creators took numerous steps to hide their identity and purpose, making Slingshot extremely difficult to study, explained Kurt Baumgartner, a principal security researcher with Kaspersky.

Baumgartner, a U.S. citizen, did not author the Slingshot report. Instead, a team of four researchers based overseas, largely in Russia, are credited with writing it.

“It is one of the most technically sophisticated groups we’ve ever seen,” said Baumgartner. “Most of the code is entirely unique, meaning that no one has ever seen it before … the only overlap we’ve seen, and I think there are people already discussing it, is there’s some limited similarities maybe to Equation Grayfish and White Lambert.”

“Grayfish” is a software implant associated with the “Equation Group,” an entity that is widely attributed to the National Security Agency. The “Lamberts,” another group identified and first catalogued by Kaspersky, has been separately linked to the CIA.

Hacking tools tied to past Equation Group and Lambert-inspired operations were written in English, just like Slingshot. Akin to Grayfish and Lamberts, Slingshot used a distinct software driver abuse technique to install malicious code onto targeted systems. They are the only three documented APTs to use this exact same driver abuse method.

Broadly speaking, Kaspersky’s ability to identify even the most advanced malware variants is well-documented; especially within the highly competitive cybersecurity community. Most of these cases are handled by Kaspersky’s heralded Global Research & Analysis Team (GReAT) team. The Russian company is known for employing some of the best reverse malware engineers and analysts in the entire industry.

It also has a vast business presence in the Middle East. Slingshot was discovered through the company’s work in that region.

A source close to Kaspersky Lab told CyberScoop that while some researchers may have thought Slingshot was the work of a “Five Eyes” nation — a term used to describe an intelligence alliance between Australia, Canada, New Zealand, the United Kingdom and the U.S. — they couldn’t have known for sure. This source told CyberScoop that the Kaspersky researchers lacked context because there’s “only so much that can be gleaned from technical evidence.”

Questions sent to the Russian company regarding if they knew about Slingshot’s U.S. military origin went unanswered.

Even so, a cursory review provides some tips that Slingshot be linked to U.S. spies.

The malware is comprised of individual modules, each carrying a different title, like “Gollum,” “Cahnadr” or “NeedleWatch,” according to Kaspersky. A leaked NSA memo released in 2015 describes Gollum as a “partner implant” used by another agency aside from NSA. The memo, circulated between Five Eyes nations, talks about the need to create an accessible data pipeline that pulls information from infected computers where an active implant is hidden.

In addition to “Gollum,” the way Slingshot exploits routers made by Latvian company Mikrotik could perhaps be traced back to another spy agency: the CIA. Classified documents published by WikiLeaks as part of the so-called “Vault 7” dump show that the CIA has been interested in compromising Mikrotik equipment since at least 2015. Mikrotik products are popular in the Middle East and Southeast Asia.

Spokespeople for the Office of the Director of National Intelligence, NSA and Special Operations Command (SOCOM) all declined to comment.

Adding fuel to the fireCyberScoop spoke with several U.S. cybersecurity researchers who said they weren’t surprised or angered by the fact that Kaspersky had potentially publicized a U.S. cyber-espionage operation.

These experts, who asked for anonymity because they feared blowback for speaking publicly, said that it’s only natural for Kaspersky to attempt to stop cyberattacks aimed at its clients. Others who spoke to CyberScoop, however, including current U.S. officials, said they were angry because publicly disclosing Slingshot may put lives in danger.

Complicating the matter is the lawsuit Kaspersky has filed against the U.S. government. The 2018 National Defense Authorization Act banned the use of Kaspersky products across the federal government. Kaspersky charges that ban is unconstitutional.

The ban comes after numerous reports that the company’s anti-virus engine was leveraged by Russian spies to remotely pilfer secret U.S. documents on systems where the software was installed. In response, Kaspersky launched a transparency effort in October 2017, which it says proves its products are not malicious.

At the moment, it’s not clear if the Russian company expected that its focus on Slingshot would eventually expose a sensitive U.S. counterterrorism initiative.

A senior U.S. intelligence official claimed that it would be hard to believe that Kaspersky was totally unaware of what it was handling.

“It’s clear by the way they wrote about this that they knew what it was being used for,” said the senior official. “GReAT is extremely adept at understanding the information needs of different actors out there on the internet. They take into considering the geopolitical circumstances, they’ve shown that time and time again. It would be a stretch for me to believe they didn’t know what they’re dealing with here.”

cyberscoop.com



To: longnshort who wrote (1061580)3/22/2018 11:49:51 AM
From: Brumar89  Respond to of 1576270
 
Saudi Crown Prince Boasts Of Having Key Trump Administration Member In His Pocket

Posted at 9:00 pm on March 21, 2018 by Susan Wright

Wow. Ok. It’s not that this should be surprising to anybody.

We’ve talked before about White House senior adviser and Trump son-in-law Jared Kushner’s apparent appetite for consuming copious amounts of highly classified intelligence, even far outside that in his purview.

That was before his security clearance was bumped from “Top Secret” to simply “Secret.”

Kushner had a particular interest in intelligence involving the Middle East. At first blush, it may not seem so unusual, considering President Trump has announced that his son-in-law would be the person to bring peace to the Middle East.

The Intercept, however, has published a report of the uncomfortable entanglement of Kushner with Saudi royalty.

In June, Saudi prince Mohammed bin Salman ousted his cousin, then-Crown Prince Mohammed bin Nayef, and took his place as next in line to the throne, upending the established line of succession. In the months that followed, the President’s Daily Brief contained information on Saudi Arabia’s evolving political situation, including a handful of names of royal family members opposed to the crown prince’s power grab, according to the former White House official and two U.S. government officials with knowledge of the report. Like many others interviewed for this story, they declined to be identified because they were not authorized to speak about sensitive matters to the press.

In late October, Jared Kushner made an unannounced trip to Riyadh, catching some intelligence officials off guard. “The two princes are said to have stayed up until nearly 4 a.m. several nights, swapping stories and planning strategy,” the Washington Post’s David Ignatius reported at the time.

[ The two princes ... that would be Prince Mohammed and Prince Jared. ]

That alone should be concerning enough, but it gets better [worse?].

What exactly Kushner and the Saudi royal talked about in Riyadh may be known only to them, but after the meeting, Crown Prince Mohammed told confidants that Kushner had discussed the names of Saudis disloyal to the crown prince, according to three sources who have been in contact with members of the Saudi and Emirati royal families since the crackdown. Kushner, through his attorney’s spokesperson, denies having done so.

Really? What could be the purpose of whipping up conflict in the region by giving the names of those “disloyal” to the prince?

[ That would be an opportunity for a "prince" with no security clearance to monetize US intelligence. ]


Kushner lawyer Abbe Lowell scoffed at the report, calling it “false and ridiculous.”

Whatever the case, a week after Kushner returned from his little field trip, on November 4, the crown prince (MBS to his friends) did a bit of housecleaning, launching what he called an “anti-corruption crackdown.” Dozens of members of the royal family were arrested by the Saudi government, imprisoning them in the Ritz-Carlton Riyadh.

At least one was reported to have been tortured.

The odd (yeah, right) thing is that these were individuals listed in the President’s Daily Brief.

It is likely that Crown Prince Mohammed would have known who his critics were without Kushner mentioning them, a U.S. government official who declined to be identified pointed out. The crown prince may also have had his own reasons for saying that Kushner shared information with him, even if that wasn’t true. Just the appearance that Kushner did so would send a powerful message to the crown prince’s allies and enemies that his actions were backed by the U.S. government.

One of the people MBS told about the discussion with Kushner was UAE Crown Prince Mohammed bin Zayed, according to a source who talks frequently to confidants of the Saudi and Emirati rulers. MBS bragged to the Emirati crown prince and others that Kushner was “in his pocket,” the source told The Intercept.

That would be the same UAE Crown Prince who was present in the Seychelles meeting with Trump supporter, Erik Prince, as well as several Russian officials, and an Arab spy.

President Trump can give authority to Kushner to disclose what’s in those briefings, but to do so and meddle in the tense situation going on in another nation is a bit much. If Trump did not give Kushner authority to give over such information, he’s on the wrong side of the law, regarding the sharing of classified information.

In the months that followed, the arrestees were coerced into signing over billions in personal assets to the Saudi government. In December, the London-based Arabic-language newspaper Al-Quds Al-Arabi reported that Maj. Gen. Ali al-Qahtani had been tortured to death in the Ritz. Qahtani’s body showed signs of mistreatment, including a neck that was “twisted unnaturally as though it had been broken,” bruises, and “burn marks that appeared to be from electric shocks,” the New York Times reported earlier this month.

Nasty stuff.

Kushner is under increased scrutiny because of recently intercepted communications of officials from China, Mexico, Israel, and the United Arab Emirates, discussing how they could manipulate Kushner, due to the money problems with his family business.

Some officials have refused to deal with anyone else but Kushner, and that has raised some red flags.

The Washington Post reported this week that former Secretary of State Rex Tillerson and National Security Adviser H.R. McMaster “expressed early concern that Kushner was freelancing U.S. foreign policy.” According to the Post, Tillerson once asked staffers in frustration: “Who is the secretary of state here?”

Oops. And now Tillerson is gone. [ And McMaster on the way out. ]

Indeed, Kushner has grown so close to the Saudi and Emirati crown princes that he has communicated with them directly using WhatsApp, a reasonably secure messaging app owned by Facebook and popular in the Middle East, according to a senior Western official and a source close to the Saudi royal family.

Kushner’s unconventional communications with regional leaders excluded diplomats during the summer of 2017, when Saudi Arabia and the UAE initiated an economic blockade aimed at weakening their Gulf neighbor Qatar. Tillerson’s attempts to mediate the crisis were quickly undercut by Trump and Kushner, who supported the blockade. Three State Department officials told The Intercept that Tillerson was largely in the dark about Kushner’s communications with MBS during that period.

And a month after Qatar’s minister of finance allegedly shut down a request for funding from Kushner’s family business, Kushner and Trump backed Saudi Arabia and the UAE over Qatar in the simmering Gulf crisis.

In April 2017, Kushner’s father, Charles Kushner made a direct play to the Qatari government for funds, but he was turned down.

In May, Trump and Kushner visited Riyadh, and shortly after the blockade of Qatar happened.


“We could not understand why the Trump administration was so firmly taking the Saudis’ side in this dispute between the Saudis, the Emiratis, and Qatar, because the United States has very important interests in Qatar,” Sen. Chris Murphy, D-Conn., told George Stephanopoulos, host of ABC’s “This Week,” after The Intercept reported on Kushner Companies’ efforts to obtain financing from Qatar. Murphy was referring to Al Udeid Air Base in Qatar, home of U.S. Central Command, where thousands of U.S. troops are stationed.

“If the reason this administration put U.S. troops at risk in Qatar was to protect the Kushners’ financial interests, then that’s all the evidence you need to make some big changes in the White House,” Murphy said.

I’m about 90 percent certain that Trump has no idea about U.S. interests in Qatar.

Jared Kushner may know, but sharing that information with his father-in-law probably isn’t high on his to-do list.

redstate.com

[ Trumpsters will respond to this by saying Clinton sold political influence too. Which underscores my claim, Don the Con ran for President to make money from selling American foreign policy (to Russia, to whomever will make them richer. After all, it's okay cause Hillary did it too though on a smaller scale. ]



To: longnshort who wrote (1061580)3/22/2018 12:00:00 PM
From: Brumar89  Read Replies (1) | Respond to of 1576270
 
President Chihuahua Paws pretends he'd fight Biden:



Look at those tiny little fists.

If you think I mock this pussy, imagine what Putin says in private.



To: longnshort who wrote (1061580)3/22/2018 12:09:57 PM
From: Brumar89  Read Replies (1) | Respond to of 1576270
 
President Pussy preens as a fake tough guy, but when Putin's jets buzzed US ships Putin's Pussy was silent:






To: longnshort who wrote (1061580)3/22/2018 12:20:54 PM
From: Brumar89  Respond to of 1576270
 
State TV host says: "Trump got scared of Peskov & called."

Russian state TV is predictably joyous over Trump's congratulatory call to Putin. One day earlier, Kremlin spokesman Peskov used a proverb "Utro vechera mudrenee," which can be loosely translated as "Better sleep on it." State TV host says: "Trump got scared of Peskov & called."





Your flag, Your President







To: longnshort who wrote (1061580)3/22/2018 12:23:45 PM
From: Brumar89  Read Replies (1) | Respond to of 1576270
 
“Trump will serve his Motherland yet.”

Julia Davis? @JuliaDavisNews

#Russia’s state TV: Participants are discussing “geriatric U.S. elections,” panelist says that in spite of his age, “Trump will serve his Motherland yet.” Host Vladimir Soloviev agrees: “And more than once! We just need to clarify which one.”



Your flag, Your President