The Other Facts about Jamal Khashoggi

The media is hardly revealing the other facts regarding Khashoggi. My buddy over at GMBDW did the work I was about to do. Hat tip to them.

First it should be mentioned that Saudi Arabia declared the Muslim Brotherhood a terror organization in 2014. Another key item is Jamal Khashoggi has been in self-imposed exile, living in Virginia for at least a year or more. He is quite critical of the Saudi Kingdom for quite some time. Remember, the Saudi royalty has been slowly and methodically working to alter the religious doctrine in the country, of which Khashoggi is against.

FBI Director Threat Assessment to Senate Committee

210 Billion Attacks in Q2 2018

Report Highlights Include:

  • Analysis of 151 million global cybercrime attacks and 1.6 billion bot attacks
  • 72 percent growth in mobile transactions year-on-year
  • One third of all attacks now targeting mobile
Related reading: Terrorists likely to attack U.S. with drones, says FBI director

Related reading: FBI director says bureau is investigating 5,000 terrorism cases across the world

The Soros Working Group Spreadsheet

Soros working group spread sheet.

This is quite the research product and will demonstrate just how pervasive chaos and activism really is. Asra Nomani of the Wall Street Journal performed intensive investigations and her work was published by the WSJ with the title ‘George Soros’s March on Washington. Now the question becomes, does this information get some cultivation by the FBI, the IRS or the Justice Department to see what laws were broken or consequence should apply? No answer at this point.

Items SecState Pompeo Manages in Dealing with N Korea

All is not so copacetic with North Korea. The United States has many channels of intelligence regarding North Korea and dealing with Kim Jung Un with many of the moving parts requires diplomatic artistry.
Below are but two examples and the prediction of a second summit between the United States and North Korea being noted, the logistics is a chess game.
Pompeo Meets North Korean Leader Kim Jong Un | One-News
FireEye has released a report stating the tools and techniques used by the group, “We believe APT38’s financial motivation, unique toolset, and tactics, techniques, and procedures (TTPs) observed during their carefully executed operations are distinct enough to be tracked separately from other North Korean cyber activity. There are many overlapping characteristics with other operations, known as “Lazarus” and the actor we call TEMP.Hermit; however, we believe separating this group will provide defenders with a more focused understanding of the adversary and allow them to prioritize resources and enable defense.
In their official blog, the company further explained the distinction of the group from any other hackers out there. Foremost, the malware tools used overlap or are similar indicating the similar developer behind the scenes.
The general pattern used by APT38 was observed to be this way –
  • First, the information is gathered by targeting third-party vendors to understand the mechanics of their transactions.