A Plan to Decentralize Bitcoin Mining Again Is Gaining

2018 in Review: A Plateau of Shit

Welcome to my fifth annual Year in Review, in which I chronicle the previous in reddit, circlejerks, and circlebroke. And like the other years, this one was a doozy. So, without further ado, let me present to you...
2018 In Review: A Plateau of Shit
January
The #MeToo movement is still in full swing. The MO for 2018 remains the same, agreeing with anyone who speaks out against the movement and downplaying the actions of people they like.
A redditor takes m’lady out on a date, can’t let go of something minor, and ends up humiliating her in front of the staff. Mods decided that while something bad happened, he didn’t fuck up.
February
Remember Ugandan Knuckles? It was a flavor-of-the-week maymay that was pretty blatantly racist. Redditors decided to shit up /uganda, a place where people once had actual discussions about the country where they lived or visited, with their shitty memes.
Black Panther becomes the first major superhero movie with an all-black cast. Redditors open the racist floodgates, then proceed to get pissy about being accused of being racists.
Did you hear? Daddy Musk launched a car into space. This is such a big deal that reddit has to insult anyone critical of the occasion and also compare his struggle to bitcoin for some reason.
Another mass shooting, another song and dance about how of course guns aren’t the problem, idiot. Only this time, an extra helping of vitriol is directed at teenagers!
March
We did it circlebroke! Racist fake-news mill /uncensorcednews is permabanned!
Survivors of the Parkland shooting organized a nationwide anti-gun march which is like rage-filled catnip for anti-activist and pro-gun redditors.
April
Another Nazi getting punched in the face, another visit from the Volunteer Nazi Safety Brigade.
As a bonus, the events of previous months produced what it probably the cringiest writing prompt ever devised.
May
Rapper Childish Gambino made an music video for the song “This Is America.” It’s not subtle. White redditors dropped by to “well actually” about how it is a critique of black culture.
If only the powers that be listened to redditors, they could have prevented another school shooting, something that redditors know everything about.
In what is becoming a semi-annual occurrence, another swath of gamers pitched a shitfit about women and minorities appearing in their bideo bames. This time, gamers are so fed up after seeing a woman in the trailer for Battlefield V that they wish the Nazis had won WWII
June
CB mods declare Summerbroke. Is that even any different from regular CB?
Happy LGBTQ Pride Month! The World Health Organization removed being transgender as a mental illness. Reddit can’t be having any of that! (WHO also classified “gaming addiction” as a disorder, so there’s a bonus “gamers rise up” jerk in there too).
When virtually every nation on earth condemned the Trump administration’s policy of family separation, reddit chimed in with the usual cold-heartedness and whataboutism.
Some dipshit literally clamped his balls to a car battery and electrocuted himself in order to win a dumb online argument. Reddit has a new hero.
July
The EU was going to ban memes, or something. Reddit did nothing, and then patted themselves on the back once their may-mays were safe.
The founder of KiA scuttled the sub, disgusted at the cesspit of racism and sexism it had become. It took admins less than half an hour to get it up and running.
August
For much of 2017 and 2018, a certain portion of reddit became enamored with Jordan Peterson, a Canadian college professor who said stuff like “There are only two genders” and “All these pronouns aren’t necessary,” but with more words. Perhaps the biggest laff at the expense of Peterson fandom came from redditors who eat nothing but meat because of Peterson.
Certified conspiracy nut Alex Jones got his dangerously stupid and reactionary podcast pull from all the major carriers. Naturally, redditeurs got super mad about it.
The hacker behind 2014’s “The Fappening” scandal was sentenced to prison for his deeds. Queue up “Uptown Funk,” because for a moment it was 2014 again because redditors were back to victim blaming and downplaying the illegal actions.
Reddit’s favorite stand-up comedian, Louis C.K. performed his first stand-up since his #MeToo fall from grace. Time for some revisionist history!
Gamers are still worked up about Battlefield V. One of them calls the Nazis the quote-unquote “bad guys” of WWII
September
Reddit still hates Black Panther
The G in Gamer stands for genocide because a gaming conference held part of an event specifically for women and non-binary people.
More GamerGenocide: A white video game character might have dark skin in the coming TV adaptation. Literal racism.
More tech-bro drama: Linux developers revamp their Code of Conduct. The techbros of /linux can’t possibly be expected to be inclusive and not harass people!
We did it, reddit! An alt-right sub and a hate sub get banned. Later in the month, more shitty subs get quarantined. But what about SRS?
October
Americans of all backgrounds and politics had strong feelings about the Senate confirmation hearing of Supreme Court Justice Brett Kavanaugh. On reddit, the feeling was one of a hard-won victory in the face the ever-present threat of false accusations.
A disciple of Daddy Peterson brought his girlfriend to one of the professor’s lectures and she dumped him. WARNING: Hilarious, but possibly fake.
Gamers are trash, more at 11: While the Trump Administration was busy finding new ways to strip trans* people of their civil rights, a game distribution platform used the resistance hashtag in a cruel, ironic way. Naturally, gamers showed more cruelty and cluelessness in response to the ensuing controversy.
November
Midterm elections happened! When a record number of black women are elected, redditors step in to tell you why that’s a bad thing
Gamers are trash, chapter VIII: Nothing much happened in November because everybody was busy playing Red Dead Redemption 2. When a gAmEr posted a video of him attacking a suffragette and feeding the body to hogs, he got banned from youtube. The RDR sub valiantly came to his defense.
Happy Thanksgiving! If you’re a vegan, you can expect redditors dropping into the vegan sub to lecture you about pushing your “nonsense” on “regular folks”...and then get gilded for it.
Freeze Peach in action: In a victory for edgelord Nazi kids everywhere, some edgelord Nazi kinds giving the Nazi salute in a group photo won’t face any repercussions. Reddit rejoices.
December
Reddit still hates Black Panther.
It’s a tale as old as time: Beloved youtuber-gamer descends into the alt-right rabbit hole, says inexcusable stuff on his podcast, disappears for ten months, makes a crappy video, is welcomed back by the youtuber-gamer-watcher community
Speaking of beloved youtube-gamers, PewDiePie and his fans continue to be garbage.
Analysis
I’ve got some bad news, and some good news.
The bad news: 2018 sucked. Being on reddit in 2018 sucked.
The good news: Being on reddit in 2018 sucked about as much as being on reddit in 2017 sucked.
Things didn’t get noticeably worse this year, plus there wasn’t any large scale drama like Ellen Pao stuff or FPH stuff back in 2015 (my, what a long time ago that was). In 2016 and 2017, reddit became a haven for the alt-right and a nerve center for targeted harassment campaigns. In 2018, more of the same shit was happening, but at more or less the same level we were accustomed to. The Nazis and trolls were still in every nook and cranny, but it seems like they ran out of gamers to indoctrinate or new nooks and crannies to invade. Plus, a few notable cesspools got banned or quarantined. The levels of shit just kinda plateaued. Presently, we stand on a giant plateau of shit. There's shit in every direction, as far as the eye can see. Things could have been better, of course. But things probably could have gone even worse. At least we aren't starting up a mountain of shit.
We survived it.
We got used to it.
You know, like a frog gets used to boiling water.
May we all have a safe, happy, healthy, and sane 2019.
Further Reading:
2017 in Review: Reddit’s Reckoning with the Alt-Right
Reddit In Review 2016: As Nasty As They Wanna Be
2015 in Review: Reddit’s Collision With Civil Society
2014 in Review: Reddit, Circlejerks, and Circlebroke
submitted by A_BURLAP_THONG to circlebroke [link] [comments]

Life in 2050 – Bitcoin dominates a climate neutral world, but we paid a price...

Today is 12 March 2050. Today is my birthday. I’m now 67 years old. My alarm clock goes off at 06:30. With a groan I wake up, and reluctantly kick away the warm, heavy bed sheets. I put my feet in the cold slippers below the bed, and shuffle to the kitchen, yawning. I pour myself a cup of hot surrogate chicory coffee. The cool morning makes me shiver, it looks like winters are getting colder each year. We heat up the house as little as possible. We're too greedy to enjoy comfort.

The bitter taste of the chicory makes me grimace, as it does every morning. Sitting at the table, I enjoy the first rays of sunshine that fall on my weather-beaten face. Our house comes alive with noises: on the upper floors I hear laughter and kids running around. My two sons descend from the stairs. The oldest checks the status of our solar panels on one of our computers. My youngest son looks at another screen, to check the status of our farmbots.

Musing about how things used to be, I look at my sons. When I see them, my heart fills up with pride, but also with compassion. They’ll never know the comfortable life that I led up to my 36 years. Yes, the world is climate neutral now, but we paid a price for it.

The big change started in 2019, with two unfortunate events that happened together: the Brexit, and the impeachment of Donald Trump. But the first seeds of the destruction of our society had been sown a lot earlier, in 2009.

Brexit happened on 29 March 2019, and gave cause for great political tensions within the UK. The classical parties where torn apart or became irrelevant. After a series of chaotic elections and re-elections, the extreme right-wing party Norsefire came to power. The country went into a dark and deep recession, but this gave Norsefire only more power and control over the citizen’s daily life.

In October 2019 came the other scandal: Donald Trump, the president of the United States, had already been executing for 3 years secret orders from his Russian counterpart, Vladimir Putin. Apparently Putin had been blackmailing him with a “golden shower” movie, in which Trump played a not very presidential role. The impeachment procedure was concluded in less than 24 hours after the start of the scandal. The next day came the well-known effect: a Wall Street crash of epic proportions.

The fall of the Dow Jones also made the stock markets in Europe, London and Japan tremble and shake. In London the bank Barclays went bankrupt. Millions of UK citizens suddenly couldn’t reach the pounds on their savings accounts anymore. However complicated the explanation given by economists was, the simple fact remained: the money was gone. Of course, bloody riots ensued. Politicians were slaughtered in horrible ways. A bitter-comical news item I remember from those times, is the story of David Cameron asking political asylum in Cuba, where he was on vacation. (The demand was denied and he was deported to the UK).

In the midst of these turbulent times, a monster reared its head from the darkest depths of the internet. Bitcoin.

In their fearful search for certainty, the British converted their remaining Pounds in Bitcoin. Soon their entire society ran on a black circuit of Bitcoin. The British Pound wasn’t worth a penny anymore. The value of Bitcoin however, rose to unseen heights. And that did not pass unnoticed in the rest of the world.

To save the paralyzed economies of Europe and the United States, the policy makers only saw one cure: inject massive amounts of money in the economy. However, this only drove the value of the Dollar and Euro downwards, and the good savers finally followed the panic investors, into the ever-growing mighty tentacles of Bitcoin. The network had by then been declared illegal, but this had no effect.

Life in a society with a deflating currency is strange, if you look at it with eyes of 2019. First of all, you will try to avoid spending money as much as possible. Why buy a coffee today, if you can buy two tomorrow? This reasoning caused a global shrinkage of the economy. Investments where postponed. Vital items, such as fruit, vegetables, bread, medicines, rose in price. Superfluous items remain unsold. Factories producing those closed. Hundreds of millions of people lost their job. And for the first time in centuries, the amount of CO2 in the atmosphere diminished.

A second effect of this unregulated currency is that nobody payed taxes anymore. The government became poor.

This made our society evolve to an ultra-liberal society. The right of strongest, richest or luckiest ruled. National and international laws where of no significance anymore. Citizens organized themselves via the internet, and local groups took over the tasks of the failing government. Carrying arms is now taken for granted. Justice is no longer done in a court of law, but in online forums, where the majority votes for the verdict and the punishment.

Together with the failure of the government, came the failure of the energy grid. People switched over to local production, and storage of energy. First with diesel generators, but soon with solar panels and batteries. Even though the price of oil was extremely low because of the global recession, still people preferred to buy solar panels. They pay back their value, whereas the value of a gallon of diesel – once it’s burned – is gone forever.

The discussion on nuclear power, which had been very actual only years before, became a joke. How could a failing government ever find the necessary funds to build new nuclear plants?

In the meantime I have, as most people, retrained myself to farmer. It’s not a heavy job, robots do most of the work. But it’s also no luxurious. We mainly eat bread, vegetables and fruit. We only eat meat once a year. The slaughtering of the sheep is always a festive occasion.

I have accepted this existence now, and can also see the pretty side of it. There are no more superpowers, waging war. They simply do not have the money to buy bombs. The gap between rich and poor is closing, albeit very slowly. A poor man must simply save harder and spend less than a rich man. Since the money is gaining in value, this strategy works, although it will take many generations.

My son’s generation was too young to see the decline of our society as something abnormal. They are optimistic and strong, and look for creative solutions to the problems of these times. Health care is extremely expensive. Insurances no longer exist. If you’re seriously ill, you’ve got bad luck.

It’s especially the millennials, people who are born around the year 2000, that are unhappy in today's society. They remember a youth full of opportunities and dreams, that have all vanished now. Weekend trips to Barcelona or New York are a distant dream today.

I often discuss with my wife if things could have been different. She thinks: yes, if the Brexit and Trump-scandals hadn’t happened. I see things differently. The seeds of the decline had been sown long before. The fall of our society was inevitable.

I wake up from my reveries, and join my sons. We’re going to check our farmbots. Each armed with a rifle, we get on our bikes. I put in the headphones of an mp3-player, a small luxury I permit myself. A song from a long time ago, the Rolling Stones.
“You can't always get what you want, but if you try sometimes, you might find… You get what you need.”
submitted by ThisUsernaymIsTaken to Bitcoin [link] [comments]

2018 in Review: A Plateau of Shit [x-post from /r/circlebroke]

Welcome to my fifth annual Year in Review, in which I chronicle the previous in reddit, circlejerks, and circlebroke. And like the other years, this one was a doozy. So, without further ado, let me present to you...
2018 In Review: A Plateau of Shit
January
The #MeToo movement is still in full swing. The MO for 2018 remains the same, agreeing with anyone who speaks out against the movement and downplaying the actions of people they like.
A redditor takes m’lady out on a date, can’t let go of something minor, and ends up humiliating her in front of the staff. Mods decided that while something bad happened, he didn’t fuck up.
February
Remember Ugandan Knuckles? It was a flavor-of-the-week maymay that was pretty blatantly racist. Redditors decided to shit up /uganda, a place where people once had actual discussions about the country where they lived or visited, with their shitty memes.
Black Panther becomes the first major superhero movie with an all-black cast. Redditors open the racist floodgates, then proceed to get pissy about being accused of being racists.
Did you hear? Daddy Musk launched a car into space. This is such a big deal that reddit has to insult anyone critical of the occasion and also compare his struggle to bitcoin for some reason.
Another mass shooting, another song and dance about how of course guns aren’t the problem, idiot. Only this time, an extra helping of vitriol is directed at teenagers!
March
We did it circlebroke! Racist fake-news mill /uncensorcednews is permabanned!
Survivors of the Parkland shooting organized a nationwide anti-gun march which is like rage-filled catnip for anti-activist and pro-gun redditors.
April
Another Nazi getting punched in the face, another visit from the Volunteer Nazi Safety Brigade.
As a bonus, the events of previous months produced what it probably the cringiest writing prompt ever devised.
May
Rapper Childish Gambino made an music video for the song “This Is America.” It’s not subtle. White redditors dropped by to “well actually” about how it is a critique of black culture.
If only the powers that be listened to redditors, they could have prevented another school shooting, something that redditors know everything about.
In what is becoming a semi-annual occurrence, another swath of gamers pitched a shitfit about women and minorities appearing in their bideo bames. This time, gamers are so fed up after seeing a woman in the trailer for Battlefield V that they wish the Nazis had won WWII
June
CB mods declare Summerbroke. Is that even any different from regular CB?
Happy LGBTQ Pride Month! The World Health Organization removed being transgender as a mental illness. Reddit can’t be having any of that! (WHO also classified “gaming addiction” as a disorder, so there’s a bonus “gamers rise up” jerk in there too).
When virtually every nation on earth condemned the Trump administration’s policy of family separation, reddit chimed in with the usual cold-heartedness and whataboutism.
Some dipshit literally clamped his balls to a car battery and electrocuted himself in order to win a dumb online argument. Reddit has a new hero.
July
The EU was going to ban memes, or something. Reddit did nothing, and then patted themselves on the back once their may-mays were safe.
The founder of KiA scuttled the sub, disgusted at the cesspit of racism and sexism it had become. It took admins less than half an hour to get it up and running.
August
For much of 2017 and 2018, a certain portion of reddit became enamored with Jordan Peterson, a Canadian college professor who said stuff like “There are only two genders” and “All these pronouns aren’t necessary,” but with more words. Perhaps the biggest laff at the expense of Peterson fandom came from redditors who eat nothing but meat because of Peterson.
Certified conspiracy nut Alex Jones got his dangerously stupid and reactionary podcast pull from all the major carriers. Naturally, redditeurs got super mad about it.
The hacker behind 2014’s “The Fappening” scandal was sentenced to prison for his deeds. Queue up “Uptown Funk,” because for a moment it was 2014 again because redditors were back to victim blaming and downplaying the illegal actions.
Reddit’s favorite stand-up comedian, Louis C.K. performed his first stand-up since his #MeToo fall from grace. Time for some revisionist history!
Gamers are still worked up about Battlefield V. One of them calls the Nazis the quote-unquote “bad guys” of WWII
September
Reddit still hates Black Panther
The G in Gamer stands for genocide because a gaming conference held part of an event specifically for women and non-binary people.
More GamerGenocide: A white video game character might have dark skin in the coming TV adaptation. Literal racism.
More tech-bro drama: Linux developers revamp their Code of Conduct. The techbros of /linux can’t possibly be expected to be inclusive and not harass people!
We did it, reddit! An alt-right sub and a hate sub get banned. Later in the month, more shitty subs get quarantined. But what about SRS?
October
Americans of all backgrounds and politics had strong feelings about the Senate confirmation hearing of Supreme Court Justice Brett Kavanaugh. On reddit, the feeling was one of a hard-won victory in the face the ever-present threat of false accusations.
A disciple of Daddy Peterson brought his girlfriend to one of the professor’s lectures and she dumped him. WARNING: Hilarious, but possibly fake.
Gamers are trash, more at 11: While the Trump Administration was busy finding new ways to strip trans* people of their civil rights, a game distribution platform used the resistance hashtag in a cruel, ironic way. Naturally, gamers showed more cruelty and cluelessness in response to the ensuing controversy.
November
Midterm elections happened! When a record number of black women are elected, redditors step in to tell you why that’s a bad thing
Gamers are trash, chapter VIII: Nothing much happened in November because everybody was busy playing Red Dead Redemption 2. When a gAmEr posted a video of him attacking a suffragette and feeding the body to hogs, he got banned from youtube. The RDR sub valiantly came to his defense.
Happy Thanksgiving! If you’re a vegan, you can expect redditors dropping into the vegan sub to lecture you about pushing your “nonsense” on “regular folks”...and then get gilded for it.
Freeze Peach in action: In a victory for edgelord Nazi kids everywhere, some edgelord Nazi kinds giving the Nazi salute in a group photo won’t face any repercussions. Reddit rejoices.
December
Reddit still hates Black Panther.
It’s a tale as old as time: Beloved youtuber-gamer descends into the alt-right rabbit hole, says inexcusable stuff on his podcast, disappears for ten months, makes a crappy video, is welcomed back by the youtuber-gamer-watcher community
Speaking of beloved youtube-gamers, PewDiePie and his fans continue to be garbage.
Analysis
I’ve got some bad news, and some good news.
The bad news: 2018 sucked. Being on reddit in 2018 sucked.
The good news: Being on reddit in 2018 sucked about as much as being on reddit in 2017 sucked.
Things didn’t get noticeably worse this year, plus there wasn’t any large scale drama like Ellen Pao stuff or FPH stuff back in 2015 (my, what a long time ago that was). In 2016 and 2017, reddit became a haven for the alt-right and a nerve center for targeted harassment campaigns. In 2018, more of the same shit was happening, but at more or less the same level we were accustomed to. The Nazis and trolls were still in every nook and cranny, but it seems like they ran out of gamers to indoctrinate or new nooks and crannies to invade. Plus, a few notable cesspools got banned or quarantined. The levels of shit just kinda plateaued. Presently, we stand on a giant plateau of shit. There's shit in every direction, as far as the eye can see. Things could have been better, of course. But things probably could have gone even worse. At least we aren't starting up a mountain of shit.
We survived it.
We got used to it.
You know, like a frog gets used to boiling water.
May we all have a safe, happy, healthy, and sane 2019.
Further Reading:
2017 in Review: Reddit’s Reckoning with the Alt-Right
Reddit In Review 2016: As Nasty As They Wanna Be
2015 in Review: Reddit’s Collision With Civil Society
2014 in Review: Reddit, Circlejerks, and Circlebroke
submitted by A_BURLAP_THONG to circlebroke2 [link] [comments]

How To Use The Blockchain To Protect The Trillion-Dollar Intelligent Import And Export Logistics Business

How To Use The Blockchain To Protect The Trillion-Dollar Intelligent Import And Export Logistics Business
Original Korean article https://www.jinse.com/bitcoin/284405.html published 4th December 2018. The article has been translated via Google translate. Prof. Songjie's credentials are listed at the bottom of this post.

How To Use The Blockchain To Protect The Trillion-Dollar Intelligent Import And Export Logistics Business

On November 22nd, the 2018 Global Smart Container Industry Alliance Annual Meeting and Smart Container Standards Publicity Training Conference was held in Shenzhen. Waltonchain CTO Wei Songjie delivered a speech at the scene. Professor Wei expounded the origin and development of blockchain and proposed the solution of blockchain technology applied in intelligent import and export logistics for the first time. He said that compared with the traditional way of shipping, the application blockchain can improve the time efficiency of more than 50% in the intelligent logistics industry and reduce the management cost by more than 30%.

https://preview.redd.it/fftck08ux0421.jpg?width=600&format=pjpg&auto=webp&s=827c930fc221610a98127588e3fa81d36aa3b72b
The following is the full text of the speech:
Good afternoon everyone, I am Wei Songjie. Today, the theme I gave to everyone is "blockchain: data container, pass-through transport line, trust notary". Because today's conference theme is a smart container, I also borrowed a topic called a "data container." In fact, in our information security industry, we call this a data package or a package called data. They are actually quite similar in nature, and data is also goods. For us, data is something of value.
In today's speech, I mainly talk about three parts: blockchain + digital certificate capability, blockchain + port cargo application scenarios, blockchain + intelligent import and export logistics solutions. Some of these contents are exchanged with some experts in the logistics industry. Some of the things may not be too mature and accurate. I am as a layman in this swearing, and I would like to ask you.
The blockchain has been a hot word in recent years. In my opinion, the biggest use of the blockchain is not "speculation", "sell one", "sip", these are their superficial articles. The biggest feature of this technology is its digital passability.
Dr. Zhou’s speech just said that what is the core in the container-based goods circulation industry? He said that documents are the core. For the circulation of goods, we need a list to prove. In the field of our blockchain, we call this core a pass.
Let me talk to you quickly, what is the blockchain?
In fact, this year happens to be the tenth anniversary of the blockchain. As for its origin, at the earliest, it came out as the underlying technology of Bitcoin, and its data structure is a chain structure. So what is it used for? It is used to book bitcoin. For example, who transferred to whom, how to turn, and so on. It is a distributed ledger, a public ledger, distributed meaning that there is no central bank, not a single individual has the final say. It has a wide range of applications, but most of the current applications still revolve around its financial transaction attributes.
In our field of computer science, we have used the term blockchain for less than a decade, but we have used this technology for decades. What do we use it for? In fact, we used to call it a distributed database a long time ago. That is to say, the database that everyone uses now has (several) servers. That distributed data means that instead of having a centralized server to store data, it means that the data is distributed in many different places, so we call it a distributed database.
Of course you have a database, you always have software, but also have a system. So in fact we have studied more accurate nouns. For example, let me study the distributed system for more than ten years. At the same time, we also use the blockchain-related things to achieve the measurement and circulation of this value. This has actually been used since, for example, QQ has Q coins, many games have points or coins, so this is not new. Of course, we study from the perspective of how the entire process, including the value of commodity services, is measured and quantified.
In the end, what is the main feature of the blockchain and what is it used for? Be an endorsement of trust. Therefore, we often hear people say that I can't change the data on the blockchain. You can't lie to me. It can't be fake forged, can't be lost, and so on. In fact, its core is, if you believe it or not, you believe it, if you don’t believe it.
In fact, long ago we were able to do trust-based or data-based trust and verification. But what did we call it at that time? We call cryptography. So I often talk to my students during the exchange, the blockchain thing, now it can not be said to be a gimmick. Again, we rely on it to do research, write papers, and then do projects. In fact, it is more like an application innovation—that is, combining existing technologies in a new way and using them in newer ways. Broad application scenarios.
Which combination of technologies? The core of distributed systems, peer-to-peer networks, and cryptography is these. Therefore, those people say that the blockchain is very important, or very useful, and its elements are summed up in fact. Then what effect does it use to achieve these effects? I think it is the effect of interconnection, interoperability, mutual trust, mutual benefit and mutual integration.

https://preview.redd.it/q56zn8kvy0421.jpg?width=600&format=pjpg&auto=webp&s=f00723c563bea43e476ad252e090a447d6f825c6
The Internet is easy to understand. In fact, our current information systems, including our devices, are rarely fragmented or run independently. Most of them are networked, including your mobile phone and computer. If you can't access the Internet, the mobile phone is not yet available. It’s a brick, right. No use. Now everyone can't do without the network. In fact, the blockchain is the same. Its underlying core is that it can be networked and does not depend on a specific or specific network. It does not depend on a specific server and does not depend on a specific SP (network service provider). I was able to connect to the Internet. This time we called P2P (peer-to-peer network), this is no stranger. Because a long time ago, I remember that I went to the movies and songs. The eDonkey used in that year was P2P. What it wants to achieve is interconnection, which means that you are not an individual, you are not separated, P2P technology is how to connect with others.
The second is interoperability. The reason for interoperability is because everyone wants to communicate. For example, everyone here is Chinese. If I speak a foreign language here, everyone knows English, and Japanese may understand it. But for example, Burmese and Vietnamese, you may not understand. At this time, what I said is still human, you are all human, but everyone does not understand, why is this? Because it does not have a valid specification. There is no rule that this field can only speak Chinese, or that this field can only say what you and I can understand, and this is the reason for interoperability. The blockchain, which defines a set of interworking rules or norms. Just like the (national container) standard we set here today, why should this standard be? Because if the standards are different, for example, the container you are ten meters high, my two or three meters high, then you said how to pull this truck? How can I store this warehouse? How do I load the goods? Right. This is the standard use.
The third is mutual trust. I just said, what is data? What is useful is the data. What kind of data is useful? Real is useful. Then how is it true? You have to be able to verify, or you have to be able to prove it. Therefore, the blockchain uses cryptography to achieve mutual trust. Think about it, the information system we use now, or the computer and related equipment, what is the most valuable, that is, data. In fact, if I lose a mobile phone now, I don't feel bad at all. Thousands of dollars can buy one back. But what is the pain? It's the address book, chat history, and photos inside, maybe there are sensitive photos. This kind of data is the most valuable.
The fourth is reciprocity. Blockchain It is the circulation or value sharing that can achieve this value. Of course, there is a lot of value in this system. In fact, it is a number. Just like we have mobile payments now, we rarely use money. Credit cards are not very useful, so money is a symbol for us, and the symbol is a number. It's the same, but this number is valuable, or the back of the number is money, and the blockchain can achieve this effect. Of course, if there are benefits, some people will suffer and some will take advantage of it. This is reciprocity. Our best effect is to achieve the Pareto improvement in economics. If I take advantage of it, you will not suffer. This is a win-win situation or a win-win situation. The blockchain can do this.
The fifth is called mutual integration. In other words, since everyone is living together in an ecological environment to live together, coexist, agree, and work together, then everyone must have a way to achieve consensus. For example, today, who should we listen to? Of course, we should listen to the organizer and listen to the host, because I recognize you as the host, right. But if there is a spoiler, he will not recognize it. He has not reached this consensus, and this matter is troublesome. So, inside the blockchain it has a series of algorithms and methods to achieve consensus. For us, the simplest consensus or the easiest to understand is that everyone votes. Who do you think is the moderator, who has the most votes, and who is the moderator, but the simplest (fairness) is often the hardest to achieve. But in fact, these (consensus) are the core elements of the blockchain, and what effect can be achieved with these elements, and what is the use of these effects, this is its definition. Now our country is working on the relevant standards for the blockchain, but before this appearance, whether it is the corporate or academic world, or our Internet enthusiasts or blockchain enthusiasts, they do not have a standard definition. Some people call it a distributed system, someone calls it a chain, and someone calls it a mesh structure. I have a little bit inserted here, although it is called a blockchain, but in fact, in terms of chain structure, the chain is one-dimensional, but it is a form, and the chain really has two-dimensional or even multi-dimensional structure, two Dimension is a mesh structure, multidimensional. We call it a complex mesh system. So the definition of it is really just a statement or two words.
Since I am not coming to invest, this is not a preaching. You can't just say its benefits, let's be honest, let's talk about some interesting things in this technology.
The first one is that many people say that the blockchain is very good and decentralized, but is it decentralized? This is really debatable. Absolute centralization or absolute centralization is definitely not good. After all, I am not the "center", right. If anyone is the "center", who will definitely say it. Therefore, everyone must be hoping to be able to be equal, to be able to disperse, to be able to participate in and to make decisions without their own centralization. But the blockchain, it is not really decentralized, he is not without a center, he just turned a center into a lot.
Who has the final say? Everyone has the final say. How do you say it? A lot of ways. For example, the easiest way to vote, one person, one vote, is now very popular is the calculation power, who counts fast, who has the final say. There is another way, that is, whose shares are large. One person, one vote is the same situation for everyone's shares. Based on POS (consensus mechanism), it is actually to look at the rights and interests, to see who owns the shares, and the big one he said is more than me. In addition to this, there are many other ways. So we say that the blockchain is actually multi-centered, and there is a problem with true decentralization. For example, one problem we often face now is its efficiency problem. Well, take Bitcoin as an example. Everyone often says that I can get money by buying coins. But you have to know that you are actually launching a transaction on the Bitcoin network or system, or I will transfer you a sum of money, you have to wait a long time to receive it - this is not a few minutes, a few seconds, but maybe a few Ten minutes, a few hours, or even a few days. Therefore, decentralization will have efficiency problems.
Many of the so-called public chain or blockchain systems we have seen now have this efficiency problem. In other words, he may have a process, the algorithm is correct, the technical line is right, there will be too many people, especially in China, because the most important thing in China is the user, the most important thing is the user. Scale, efficiency will have problems. So our current research direction, including our application scenarios, is mostly multi-centered. Therefore, we call this multi-centered, not a center, that is not good, it is the original system, not the real center.
The second one is called the virtual and real of trust. In fact, the data is placed on the blockchain, can you really believe it? Put the blockchain, is it true? Of course it is not the case. I put a bunch of garbage into the safe, it is still rubbish, it is not worth it. Therefore, it depends on the entire ecology of the data or the entire life cycle, especially the stage of data perception or acquisition.
We now use the blockchain, including our company, some of our projects. In fact, we use a combination of software and hardware to solve how to ensure that the data you get is first-hand data, no noise, no errors, no interference. There is no such forgery, and then put it on the blockchain immediately, so that I can guarantee that the next life cycle of this data is real and verifiable. So this is why many people think blockchain data is true. However, if you put it true, it is true. If you are on vacation, it is fake. It guarantees that this data has not been altered and can be verified, but does not guarantee its original authenticity.
The third is the truth and falsehood of our consensus. The fact is that the consensus reached by the blockchain algorithm is the correct consensus? The correct consensus is that the American president is Trump. Is he really getting a 50% (vote) +1 vote? No, everyone knows that Hillary’s votes are higher and they get the same amount of votes. It was only because of the rules of their electoral college that Trump was elected. What does this show? Explain that our consensus mechanism can actually determine whether our final consensus is a general consensus, a relative consensus, or a professional consensus, and it depends on the scenario. So, you should first think about using the blockchain, and then design a consensus mechanism. After all, there is no universal technology that is universally applicable.
The last one is called the right and wrong of the data. What does it mean? Here is to say that the data is placed on the blockchain, we can say that it can not be tampered, can not be forged, can not be changed, it will not be lost, but can this really achieve this effect? In this (blockchain) industry, we often hear news that a word is called a fork. In fact, this is to say that the original chain grows in a single item, and it grows more and more in a while. When it grows long, it splits. Why is it forked? Because there is no consensus. Because some people think that it should grow like this, some people think that they should grow into that, and then there are people on both sides to support, so they fork. So this shows that the right and wrong of the data depends on who? Depending on the user, it depends on the consensus results of the user. So these are relative, in fact nothing is absolute. Including our cryptography, are you absolutely safe, definitely not. As long as I can live long enough, then I will try hard, and one day I will be able to try it out, right. The only absolute thing in us (information technology) is that it is the quantum code, which is absolutely safe. But this is a bit of a problem.
So now, in less than a decade, the blockchain has evolved in three different phases.
We have phases 1.0, 2.0, and 3.0, but it doesn't make sense to say that the specific technology is too boring. What we have to say is that 1.0 solves the problem that is too simple, that is, to record the account or to use it as a book; 2.0 can only fulfill the contract, can we say what we say, we write the program people like to write Some conditions are judged and looped. Actually, these conditions can be written in 2.0. What is the use of this condition? We will see it later. The direction that is currently developing is 3.0, 3.0 is to do things, that is to say, you This technology can not land, this is the third point. So, we are now between 2.0 and 3.0, almost the same period from 2.4 to 2.5.
Next, we make an analogy, an analogy between blockchain and data containers.
In fact, our blockchain really has blocks. Our data is really piece by piece. Each piece is called data encapsulation. This is a bit like we put a lot of goods in this container, and then lock the container, this is called a box of goods. For us, we are called a piece of data, and then we will lock this data. The lock on us is not an electronic lock. We call it a digital lock. In fact, it is a string of numbers used for verification to be used for signature. . This is one of our forms. This is not one-dimensional, but linear and two-dimensional. Containers, there are so many boxes, or so many pieces, they are also ordered, organized, we call Organize. Just like your box is to be numbered, then your box is to be neatly tidy, you can check it when you need it, and you can find it when you need it. So this is an analogy, for a bit more fun, a little fun.
The blockchain actually has many institutions now, and many countries are also used in the logistics industry, including import and export. For example, many countries in the United States, South Korea, and the Netherlands are doing it. Headed by IBM, they have a super-books alliance, and they also offer a range of solutions that can be used by everyone. Because their technology wants to be more versatile, there are actually a lot of data inconsistencies here.
So what does it do in the field of (container)? Or, what good is it? It has to solve the problem. One is inefficiency. Dr. Zhou also said that there are too many links, and then the people involved or the roles are too many and inefficient. The other is risky because this thing is not shipped. It is risky to pay, lose or lose money, pay taxes, and clear customs.
Then if we want to use it, for example, I want to use the blockchain to try it in this field, how can we try it? I think I can make three articles around my title, the first one is for data; the second is for value; the third is for trust.
In our blockchain, first, we can do the data bearer and ensure the integrity of the data. Second, we can quantify the data, especially the quantity and value of many such goods. Our measurability; the third is that we can trust, for example, authenticity, you remember so much, remember so many words, and then so many single-sub-services, using blockchain-related techniques to ensure that it can be accepted But it is really unrealistic because people will not accept it. In fact, Dr. Zhou said that the core of this industry, we are called documents. We can e-mail the documents. This technology is very ready-made, just saying how to use it. We are also doing application innovation, so we can use this framework of distributed architecture to achieve this electronic issuance of such notes or documents. But why is it not purely distributed or purely decentralized? Because of efficiency issues. Centralization efficiency is good, so he still has a data center placed there, and then the index of the data, the summary of the data, the keywords of the data, the hash of the data on the chain, so that people can be very fast, very Efficiently find the relevant data above, and then go to the original data center to get the original data.

https://preview.redd.it/zaoeu3fyy0421.jpg?width=600&format=pjpg&auto=webp&s=37e1886e14a730d6793bc8b4dfdb31d7a9e5c73b
At the same time, we can use the blockchain to implement this digitized sequence of processes. So you will look at the picture just now. The original picture has a lot of small arrows. It is actually talking about a sequence, just the picture. It's actually talking about the order, you can take the next step to do the next step, we call it timing. In fact, the blockchain can record and string these steps, and then tell you, now the entire business or the whole of our logistics is going to where it is, where is it stuck, and then how to go in the next step? Conditional judgment. How do the blockchain judge the conditions? Blockchain 2.0, support contract, right. So what is the contract? It is the program. I can write the program, what to do next, the blockchain can do this. In other words, in fact, many times we are concerned about timing, order. Where is the difference here? For example, this is what happened in a few months, and when the matter happened, this is absolute time. But many times, we are concerned about the relative time, who is who develops before and who is after whom, this logic or this real transaction makes sense. Just like you have to work first and then get paid, this is generally normal, but it is abnormal after working first. So this order is very important.
In addition, we can implement the submission and inspection of documents based on blockchain. Because you have data to always give people a home, you can find it when you need it, the blockchain can be done very quickly. In our words, the quick meaning is that its time is not exponential growth, not linear growth, we are talking about the size of the data (to grow). And when it comes to constant time, it means that no matter how much data you have, I can find the required data between the constants, and then check and verify that it is very efficient to submit and check the data. He has an ID and then has an electronic signature, and also checks the information. This blockchain is readily available.
The last one is that we can use the blockchain to implement this kind of supervision and management service for multiple roles, which means that you may be the owner. You may be a buyer, a seller, you may be a transit broker, you may be a carrier, you may be a customs officer, you may be in any role. So how can you have so many roles in the system? Because these roles are called users in our entire system, then the users actually have different ID addresses, ready-made. Just like the currency now, what is your wallet address? How do we ensure that different users have different permissions? We actually use certificates, we call Certificate, e-Cert. The more popular ones are passwords. Of course, now we often use multi-word authentication, which means that in addition to the password, you have to have a verification code or what character you have to identify, in fact, we use a certificate here. Certificates can be used to implement the setting and probability of this privilege for different roles.
Then all these things are put together, in fact we can transform the original process into a blockchain-based process. But this picture I just said, borrowed from a document. This may be just a general or a typical existing process, in fact, all of us or all of the roles can be in different blocks or different stages, with different blocks of blockchain. Is the data package to deal with, to achieve the whole process, to achieve the whole around the goods or around the entity, you are a box or a bag, we have to surround the virtual and electronic around the entity Data management and query verification This is a whole, we call it a typical system solution.
But this system is actually in use now, but it is not used for container management or for doing this import and export. What are we actually doing with this system? We are doing traceability of some of these items, such as typical clothing or food, where is it produced, and then through which links, then who is the wholesaler, who is the retailer, where is it, and then Have you ever retired or sold it to someone, and then did you go back to repair or have a return? In fact, our system is doing this. But this is no different because for us, these are all data. In fact, the data itself does not know what it means. The data itself is a character and a binary. So now we are running some of the green systems below, but it is a layman for this product.
So today, I am also grateful to all the invitations, and I will take the courage to take our set of things and put them in a new scene. This is called application innovation. The purpose of our 3.0 is to use it in more scenarios, and to use the effects, use the performance, and then use such an impressive, or acceptable, result.

https://preview.redd.it/5alntal0z0421.jpg?width=600&format=pjpg&auto=webp&s=58a685723da47dcb63019df15f987e086654d9a1
In the end, we return to our title, because my title says, the blockchain data container usually has a trusted notary, and each of these is actually meaningful. For example, the data container, which is actually implemented or for a specific scenario, such as the production and sales scene of the clothing we just mentioned, is actually the electronic standardization and intelligence of the data. This involves a lot of existing and popular technologies. For example, if there is more data, how do you analyze it? Here we will use data analysis, data mining and even data modeling methods. Data modeling that you may hear often is machine learning or deep learning, so this is part of intelligence. Standardization you are all experts. The pass-through transport line actually implements this automatic persistence and metering, but these three words have been discussed in general. Finally, trusting the notary, it realizes that around the authenticity, anti-counterfeiting and traceability of the data, it is not only reliable but also usable to build such a thing, not only usable, but also usable, not only usable, but also It is a system that is easy to use.
Finally, I am very grateful to everyone for spending more than 20 minutes. I am listening to my own industry or my own circle as a layman in this industry. I think we have to make the entire smart container to establish its industrial chain, ecological chain, value chain, etc. I think this is completely inseparable or impossible to leave information technology. Because a while ago our country strongly advocated that we call internet+, Internet+, in fact, it is now more accurate and accurate. It should be called information technology+. Otherwise, the internet+ you said may be artificial intelligence+, and then the future is Big data +, but they are all called information technology in our business, that is, Information Technology. Therefore, we are very eager to have the opportunity to use our knowledge in the field of information technology, and the meager ability to make a combination with everyone in the industry, including the specific and typical application scenarios, to truly realize our industry. A transformational upgrade of our industry. Then we realize the industrialization of our entire country called the industry 2.0 or the country we call the information age. Ok, thank you all.


Profile of Prof. Wei Songjie:
Doctor of Engineering (graduated from the University of Delaware), Associate Professor of Nanjing University of Science and Technology, Core Member and Master Supervisor of Network Space Security Engineering Research Institute, Block Chain Technology expert in the field of computer network protocol and application, network and information security. Has published more than 20 papers and applied for 7 invention patents. Previously worked at Google, Qualcomm, Bloomberg and many other high-tech companies in the United States, served as R&D engineer and technical expert; has a wealth of experience in computer system design, product development and project management.
submitted by Yayowam to CryptoCurrency [link] [comments]

Thoughts on my culminating analysis of Russia's involvement in the U.S elections?

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The proof is that the hackers used Bitly to mask the malicious URL and trick people into thinking the URL was legitimate. They made two mistakes, however.
First, they accidentally left two of their Bitly accounts public, rather than setting them to private. This allowed security researchers to view some general account information, like what URLs were shortened and what they were changed to.
Second, they used Gmail's official numeric ID for each person inside of their maliciously crafted URLs. This allowed cybersecurity researchers to find out exactly who had been targeted.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by MangekyouSharinganKa to AskTrumpSupporters [link] [comments]

Culminating Analysis of DNC/DCCC/Soros/Colin-Powell/NATO-General-Breedlove/NSA-Equation-Group/Podesta Leaks and Hacks

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
At six o'clock on the morning of May 6, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office. Alperovitch told me that a few people worried that Hillary Clinton, the presumptive Democratic nominee, was clearing house. "Those poor people thought they were getting fired," he says.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents, something that has gone unreported in the media.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days ago, right before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by DownWithAssad to geopolitics [link] [comments]

Culminating Analysis of DNC/DCCC/Soros/Colin-Powell/NATO-General-Breedlove/NSA-Equation-Group/Podesta Leaks and Hacks

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
At six o'clock on the morning of May 6, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office. Alperovitch told me that a few people worried that Hillary Clinton, the presumptive Democratic nominee, was clearing house. "Those poor people thought they were getting fired," he says.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents, something that has gone unreported in the media.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days ago, right before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by DownWithAssad to Intelligence [link] [comments]

Rodney Carrington - Vote For Trump Mugg Mann - Rodney Carrington Best Song for TRUMP! Real Women Vote Trump I Support Trump 2020 Hilarious Song

Trump, after all, won by less than 1 percent — less than 80,000 combined votes — in the three states that mattered: Michigan, Pennsylvania and Wisconsin. 80,000 people, or get 80,000 During a press conference with business executives, the Wuhan coronavirus task force and reporters Friday afternoon from the White House Rose Garden, President Trump said it is likely he will U.S. President Donald Trump. Senator Mitt Romney warned that he would face blowback from U.S. President Donald Trump after he decided to vote to convict the leader of his party on abuse of power In historic vote, North Carolina city backs reparations High-profile Twitter accounts hacked in Bitcoin scam; In the song, Grushecky talks about Trump’s stance on immigrants, singing A number of rappers have taken aim at President Trump and Meek Mill is the latest to do so by unleashing his fury on a new track.. Meek delivered the new record on Friday (June 5). The track

[index] [12611] [7184] [21793] [14505] [5482] [3255] [23581] [29269] [29843] [19375]

Rodney Carrington - Vote For Trump

A rap song for Donald Trump's 2020 Campaign. Inside the wicked saga of Jeffrey Epstein: the arrest of Ghislaine Maxwell 60 Minutes Australia - Duration: 27:22. 60 Minutes Australia 5,041,029 views Hundreds gather outside in the blistering Tulsa weather in anticipation of what could be the largest Trump rally yet. Here's what one family had to say about the election in November #trump2020 # ... Come Back Chad - Spy Ninjas (Official Music Video) Vy Qwaint, Daniel, Regina, Melvin & CWC on Guitar - Duration: 3:26. Melvin PZ9 The Best Fighter 7,423,744 views New Mugg captures the patriotism and pride of America while endorsing the re-election of President Donald J. Trump. Mugg Mann self-titled album available on all streaming sites https://music.apple.com ... 50+ videos Play all Mix - Rodney Carrington's "Vote for Trump" with Lyrics YouTube I Think My Dog's a Democrat Bryan Lewis Official Video - Duration: 3:49. Bryan Lewis 10,895,513 views

Flag Counter