FBI Director Threat Assessment to Senate Committee

210 Billion Attacks in Q2 2018

Report Highlights Include:

  • Analysis of 151 million global cybercrime attacks and 1.6 billion bot attacks
  • 72 percent growth in mobile transactions year-on-year
  • One third of all attacks now targeting mobile
Related reading: Terrorists likely to attack U.S. with drones, says FBI director

Related reading: FBI director says bureau is investigating 5,000 terrorism cases across the world

The Soros Working Group Spreadsheet

Soros working group spread sheet.

This is quite the research product and will demonstrate just how pervasive chaos and activism really is. Asra Nomani of the Wall Street Journal performed intensive investigations and her work was published by the WSJ with the title ‘George Soros’s March on Washington. Now the question becomes, does this information get some cultivation by the FBI, the IRS or the Justice Department to see what laws were broken or consequence should apply? No answer at this point.

Items SecState Pompeo Manages in Dealing with N Korea

All is not so copacetic with North Korea. The United States has many channels of intelligence regarding North Korea and dealing with Kim Jung Un with many of the moving parts requires diplomatic artistry.
Below are but two examples and the prediction of a second summit between the United States and North Korea being noted, the logistics is a chess game.
Pompeo Meets North Korean Leader Kim Jong Un | One-News
FireEye has released a report stating the tools and techniques used by the group, “We believe APT38’s financial motivation, unique toolset, and tactics, techniques, and procedures (TTPs) observed during their carefully executed operations are distinct enough to be tracked separately from other North Korean cyber activity. There are many overlapping characteristics with other operations, known as “Lazarus” and the actor we call TEMP.Hermit; however, we believe separating this group will provide defenders with a more focused understanding of the adversary and allow them to prioritize resources and enable defense.
In their official blog, the company further explained the distinction of the group from any other hackers out there. Foremost, the malware tools used overlap or are similar indicating the similar developer behind the scenes.
The general pattern used by APT38 was observed to be this way –
  • First, the information is gathered by targeting third-party vendors to understand the mechanics of their transactions.

Google Doc Notes Tech Media Censorship

The Good Censor – GOOGLE LEAK by on Scribd

   The other cyber war…censorship.

Primer:

Google should refuse to develop a censored search engine for China, Vice President Mike Pence said Thursday while criticizing the Communist regime.

“Google should immediately end development of the ‘Dragonfly’ app that will strengthen Communist Party censorship and compromise the privacy of Chinese customers,” Pence said at the Hudson Institute in Washington, D.C.