An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

Sidley Austin an Agent Firm for the Russian ‘Garchs’?

Sidley Austin Reps Clinton Confidante in Benghazi Probe

Former DAG James Cole appears with Sidney Blumenthal for depo in House investigation.

Sidney Blumenthal, a longtime Clinton family friend, on Tuesday sat for a closed-door deposition in the House over his communications with former Secretary of State Hillary Clinton around the time of the 2012 attack on the U.S. diplomatic compound in Benghazi, Libya. James Cole, a former deputy attorney general under Eric Holder Jr. who is now a partner in Sidley Austin’s Washington office, represents Blumenthal.

*** Then this in a snippet:

The complaint, filed in October, names Sidley Austin and partner Edward McNicholas, alleging that they assisted one Joseph Garcia in securing millions in investments from a woman named Carrie Birkel. Birkel is looking to recover $1.5 million from the lawyers. Birkel claims that she had millions to invest after she got her $10 million divorce settlement — a divorce precipitated by Garcia providing her, unsolicited, with compromising photos of her husband, before introducing her to McNicholas, who vetted divorce lawyers for her on a $25,000 retainer.

As the complaint states:

Birkel’s claims arise out of a truly bizarre set of circumstances that would seem more appropriate for an episode of “Law and Order” than in reality.

Indeed.

Garcia, who is serving a 37-month sentence for similar activity, is a curious character by all accounts:

Garcia and his wife used multiple aliases to go along with numerous Social Security numbers. While peddling phony investments, Garcia would only reference his time as a Navy SEAL; the details were confidential. And he instructed his family to always have “go bags” packed should they need to flee one of the many lavish homes they rented across the country. More here.

***

For the confirmation hearing for Loretta Lynch, Statement of David B. Barlow ,Partner, Sidley Austin LLP made an endorsing and glowing recommendation for her.

Okay, so Sidley Austin is a very big and weird law firm with clear power in Washington DC, so what?

Well, let’s bring in the Russian lobby operation shall we? Sidley is the law firm of record to influence Congress and the White House against sanctions and political cover. The lobby agreement was generated by VTB Bank with Sidley Austin.

You can read the full document/agreement here.

In part from VOA:

The International Consortium of Investigative Journalists (ICIJ) reported in April that suspicious payments made by “Putin’s cronies may have, in some cases, been intended as payoffs, possibly in exchange for Russian government aid or contracts.”

The secret documents suggested that much of the money originally came from a bank in Cyprus, the ICIJ said, “that, at the time, was majority-owned by the Russian state-controlled VTB Bank.”

The documents also showed dozens of transactions, over more than a decade, involving people or companies linked to Putin, who has been in power at the Kremlin since 2000. Among those identified in the document were Putin’s longtime friend, cellist Sergei Roldugin, and the wife of Putin’s spokesman, Dmitry Peskov.

Putin has admitted there were transactions between him and Roldugin, but said there was no evidence of illegal activity.

Roldugin has dismissed any suggestion that he was either a custodian or a conduit for Putin’s money or assets.

*** Back in 2014:

VTB Bank and Bank of China today signed an Agreement on Cooperation in the presence of Russian President Vladimir Putin and Chinese President Xi Jinping.

The agreement was signed by First Deputy President and Chairman of VTB Bank Management Board Vasily Titov and Bank of China President Chen Siqing.

Under the agreement, the banks plan to develop their partnership in a number of areas, including cooperation on ruble and renminbi settlements, investment banking, inter-bank lending, trade finance and capital-markets transactions.

Vasily Titov said :”The signing of the agreement underscores VTB Group’s ongoing drive to grow its business in Asia, and will help facilitate the development of bilateral trade and economic relations between Russia and China, which have always been reliable partners.”

***

The Russian state-controlled bank VTB confirmed that its websites had been targeted by a cyber attack. The VTB is the second largest bank in the country. In December of 2016, Security Affairs reported:

Last week the Russian intelligence service FSB revealed that an unnamed foreign power is planning to undermine Russian Banks with cyber attacks and PSYOPS via social media.

According to the Russian intelligence, a group of servers in the Netherlands and leased to the Ukrainian web hosting firm BlazingFast were ready to launch an assault next Monday.

“Russia’s domestic intelligence agency, the Federal Security Service (FSB), said that the servers to be used in the alleged cyber attack were located in the Netherlands and registered to a Ukrainian web hosting company called BlazingFast.” reported the Reuters.

“The attack, which was to target major national and provincial banks in several Russian cities, was meant to start on Dec. 5, the FSB said in a statement.”

A few hours after the announcement made by the FSB, the Russian Central Bank confirmed that hackers have stolen 2 billion rubles, roughly 31 million US dollars, from accounts at the Russian central bank.

The Russian authorities haven’t disclosed the identity of the alleged threat actor behind the attack.

The Russian bank industry was recently hit by a string of cyber attacks, a few day ago experts from Kaspersky Lab revealed that at least five of Russia’s largest banks were targeted by massive DDoS attacks.

The attacks were powered by devices located in 30 countries across the world, including the United States.

The Russian Government was accused by Washington of interference in the recent US Presidential Election.

The Office of the Director of National Intelligence and the Department of Homeland Security have issued a joint security statement to accuse the Russian government of a series of intrusions into the networks of US organizations and state election boards involved in the Presidential Election.

“The U.S. Intelligence Community (USIC) is confident that the Russian Government directed the recent compromises of e-mails from US persons and institutions, including from US political organizations. The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts. These thefts and disclosures are intended to interfere with the US election process” reads the statement.

There is more to the Obama administration and decisions than we know. This matter of cyber intrusions, sanctions, lawyers, Russian interference will not go away any time soon.

 

Radioactivity in Europe Due to Russian Nuclear Test?

U.S. Air Force deploys WC-135 nuclear sniffer aircraft to UK as spike of radioactive Iodine levels is detected in Europe

The USAF WC-135C Constant Phoenix might be investigating a spike in radioactive levels in Norway. Someone speculates the release of this radionuclide could be the effect of a Russian nuclear test.

On Feb. 17, 2017, U.S. Air Force WC-135C Constant Phoenix Nuclear explosion “sniffer,” serial number 62-3582, using radio callsign “Cobra 55” deployed to RAF Mildenhall, UK.

As we have already reported the WC-135 is a derivative of the Boeing C-135 transport and support plane. Two of these aircraft are in service today out of the ten examples operated since 1963. The aircraft are flown by flight crews from the 45th Reconnaissance Squadron from Offutt Air Force Base while mission crews are staffed by Detachment 1 from the Air Force Technical Applications Center.

The WC-135, known as the “sniffer” or “weather bird” by its crews, can carry up to 33 personnel. However, crew compliments are kept to a minimum during mission flights in order to lessen levels of radioactive exposure.

Effluent gasses are gathered by two scoops on the sides of the fuselage, which in turn trap fallout particles on filters. The mission crews have the ability to analyze the fallout residue in real-time, helping to confirm the presence of nuclear fallout and possibly determine the characteristics of the warhead involved: that’s why the aircraft is important to confirm the type of explosion of today’s test.

 

Along with monitoring nuke testing, the WC-135 is used to track radioactive activity as happened after the Chernobyl nuclear plant disaster in the Soviet Union in 1986 and Fukushima incident back in 2011.

One of these aircraft was deployed near North Korea in anticipation of Kim Jong Un rocket launches then was spotted transiting the UK airspace in August 2013 raising speculations it was used in Syria thanks to the ability to detect chemical substances down wind from the attack area days, or weeks after they were dispersed.

Although they cross the European airspace every now and then, their deployment in the Old Continent is somehow rare. As of yet, there has been no official statement from the U.S. military about the reasons why such nuclear research aircraft was deployed there. However, many sources suggest the aircraft was tasked with investigating the spike in Iodine levels detected in northern Europe since the beginning of January.

Iodine-131 (131I), a radionuclide of anthropogenic origin, has recently been detected in tiny amounts in the ground-level atmosphere in Europe. The preliminary report states it was first found during week 2 of January 2017 in northern Norway. Iodine-131 was also detected in Finland, Poland, Czech Republic, Germany, France and Spain, until the end of January.

However, no one seems to know the reason behind the released Iodine-131. Along with nuclear power plants, the isotope is also widely used in medicine and its presence in the air could be the effect of several different incidents.

Or, as someone speculates, it could have been the side effect of a test of a new nuclear warhead in Russia: an unlikely (considered the ability to detect nuke tests through satellites and seismic detectors) violation of Nuclear Test Ban Treaty.

Maybe the WC-135 will help authorities find out the origin of the Iodine-131.

Detection of radioactive iodine at trace levels in Europe in January 2017

Iodine-131 (131I), a radionuclide of anthropogenic origin, has recently been detected in tiny amounts in the ground-level atmosphere in Europe. The preliminary report states it was first found during week 2 of January 2017 in northern Norway. Iodine-131 was also detected in Finland, Poland, Czech Republic, Germany, France and Spain, until the end of January.

Iodine-131 is a radionuclide with a short half-life (T1/2 = 8.04 day). The detection of this radionuclide is proof of a rather recent release.

Besides the iodine release, the origin of which is still unknown, the poor dispersion conditions due to the thermal stratification [1] of the atmosphere also affected the observed concentration levels, including those of naturally occurring radionuclides such as Lead-210 (210Pb) [2], or fine particles (PM2.5 and PM10) leading to pollution episodes, particularly in the Western part of Europe during week 4 of January.

It must be pointed out that only particulate iodine was reported. When detectable, gaseous iodine is usually dominant and can be estimated to be 3 to 5 times higher than the fraction of particulate iodine.

In France, particulate 131I reached 0.31 µBq/m3 and thus the total (gaseous + particulate fractions) can be estimated at about 1.5 µBq/m3. These levels raise no health concerns.

The data has been shared between members of an informal European network called Ring of Five gathering organizations involved in the radiological surveillance of the atmosphere. In France, IRSN is responsible for monitoring the radioactivity of the atmosphere on a nation-wide scale. Its surveillance network OPERA-Air includes high-volume aerosol samplers (700 to 900 m3 of air per hour) and measurement equipment capable of detecting trace amounts of radioactivity.

 

Particulate Iodine-131 (value +/- uncertainty) in the atmosphere(µBq/m3) :
Particulate Iodine-131 (value +/- uncertainty) in the atmosphere(µBq/m3)

More information about the Ring of Five (Ro5) network

 

Notes:
1- Thermal stratification of the atmosphere that often affects the lower atmospheric layers in winter. The colder air at ground-level compare with altitude stuck or considerably limit atmospheric pollutant dispersion.
2- The 210Pb concentration detected by IRSN peaked at 1600 µBq/m3 in January, four times higher than the usual mean value.

What did Google Know, When did The Know it?

Image result for google russian hacking Techviral

A Glimpse Into How Much Google Knows About Russian Government Hackers

A 2014 leaked private report from Google shows how much the internet giant knows about government hacking groups.

Motherboard: In October of 2014 an American security company revealed that a group of hackers affiliated with the Russian government, dubbed APT28, had targeted Georgia and other Eastern European countries in a wide-ranging espionage campaign. Two and a half years later, APT28—also known as “Fancy Bear” or “Sofacy”—is a household name not just in the cybersecurity industry, but in the mainstream too, thanks to its attack on the US Democratic party and the ensuing leaks of documents and emails.

Before that report by FireEye, APT28 was a well-kept secret within the cybersecurity industry. At the time, several companies were willing to share information about the hacking group. Even Google investigated the group, and penned a 40-page technical report on the hacking group that has never been published before.

This sort of document, which Motherboard obtained from two independent sources, may be a common sight in the threat intelligence industry, but the public rarely gets to see what such a report from Google looks like. The report draws from one of Google’s most interesting sources of data when it comes to malware and cybersecurity threats: VirusTotal, a public malware repository that the internet giant acquired in 2012.

Sofacy and X-Agent, the report read, referring to the malware used by APT28, “are used by a sophisticated state-sponsored group targeting primarily former Soviet republics, NATO members, and other Western European countries.”

“It looks like Google researchers were well aware of Sofacy before it was publicly disclosed.”

While Google security researchers don’t dwell into who’s really behind these operations, they do hint that they agree with the now widespread belief that APT28 works for the Russian government in a clever, indirect, way—in the very title of the report: “Peering into the Aquarium.”

While that might seem like an obscure title, for those who follow Russian espionage activities, it’s a clear reference to the headquarters of the military intelligence agency known as GRU or Glavnoye Razvedyvatel’noye Upravleniye, which are popularly known as “The Aquarium.”

“It looks like Google researchers were well aware of Sofacy before it was publicly disclosed,” Matt Suiche, a security researcher and the founder of Comae Technologies and the OPCDE  conference, told Motherboard in an online chat after reviewing the report. “And also attributed Sofacy and X-Agent to Russia before it was publicly done by FireEye, ESET or CrowdStrike.”

In its report Google security researcher note that APT28 attacks a large number of targets with its first-stage malware Sofacy, but only uses the more tailored and sophisticated X-Agent, which was recently used against Ukraine’s military units, for “high-priority targets.”

“Sofacy was three times more common than X-Agent in the wild, with over 600 distinct samples,” Google’s report stated.

Asked for comment, a Google spokesperson said via email that the company’s “security teams are constantly monitoring potential threats to internet users, and regularly publish information to better protect them.”

The report noted that Georgia had the highest ratio of submissions of Sofacy malware, followed by Romania, Russia and Denmark.

While this report is now a bit dated, it shows that for all its sophistication, APT28 has been often caught in the act of hacking politically interesting targets, betraying the origin of the hackers behind the dry nickname. It also reveals how much a company like Google, which doesn’t have software installed on thousands of customers computers like other antivirus and security vendors that is designed to specifically detect malware, can still learn a lot about government hacking groups thanks to the other data it has access to.

*** Related reading:

State-sponsored hackers targeting prominent journalists, Google warns

Politico: Google has warned a number of prominent journalists that state-sponsored hackers are attempting to steal their passwords and break into their inboxes, the journalists tell POLITICO.

Jonathan Chait of New York Magazine said he received several messages from Google warning him about an attack from a government-backed hacker starting shortly after the election. He said the most recent warning came two to three weeks ago.

Julia Ioffe, who recently started at The Atlantic and has covered Russia for years, said she got warnings as recently as two weeks ago. (See one of the warnings: http://bit.ly/2kMUyRb)

Some journalists getting the warnings say they suspect the hackers could be Russians looking to find incriminating emails they could leak to embarrass journalists, either by revealing alleged liberal bias or to expose the sausage-making of D.C. journalism.

“The fact that all this started right after the election suggests to me that journalists are the next wave to be targeted by state-sponsored hackers in the way that Democrats were during it,” said one journalist who got the warning. “I worry that the outcome is going to be the same: Someone, somewhere, is going to get hacked, and then the contents of their gmail will be weaponized against them — and by extension all media.”

The Russian embassy did not respond to a request for comment.

Image result for russian embassy washington dc Russian embassy Washington DC

Google cautioned that the warnings did not mean the accounts had been compromised already and were sent due to “an abundance of caution.”

“Since 2012, we’ve notified users when we believe their Google accounts are being targeted by government-backed attackers,” said a Google spokesperson in a statement. “We send these warnings out of an abundance of caution — they do not indicate that a user’s account has already been compromised or that a more widespread attack is occurring when they receive the notice.”

Ezra Klein, the founder of Vox, said he had received the warning as recently as a few days back. CNN senior media reporter Brian Stelter said he has been getting the alerts for the past few months.

Other journalists who confirmed they’ve recently gotten the warnings include New York Times national security correspondent David Sanger, Times columnist Paul Krugman and Yahoo Washington bureau chief Garance Franke-Ruta.

GQ special contributor Keith Olbermann said the warnings started a few weeks after the election, and he received the most recent alert earlier this week, a “big bright red bar” across the top of his Gmail. Some of the reporters say they are tightening up their email security to try to prevent the hackers from getting in.

Chait also said he was “contacted over email by a stranger who offered to help me by giving me an encryption key to protect me from hackers. He would not give me his name, meet me or talk on the phone, despite repeated requests.”

The stranger also emailed The Atlantic’s David Frum, James Fallows and Adam Serwer, Andrew Sullivan and Ars Technica’s Dan Goodin.

Stanford professor Michael McFaul, the former U.S. ambassador to Russia, said he also received hacking warnings from Google. He added: “Given my background, one would have to guess that it’s the Russians.”

Russian Spy Operations History in the U.S.

In 2015:

The FBI announced on Monday that it had busted a Russian spy ring that was allegedly focused on obtaining economic information including details about US markets and sanctions on Russian banks.

According to a federal complaint filed by FBI special agent Gregory Monaghan in a Manhattan federal court on Friday, an alleged spy, Evgeny Buryakov, posed as a banker in the New York office of an unnamed Russian bank.

Buryakov is reportedly being arraigned in the Southern District of New York.

Monaghan said Buryakov (aka”Zhenya”) was on “deep cover” and working for Russia’s Foreign Intelligence Service (SVR) to gather intelligence and transmit it back to Moscow. The SVR used multiple forms of cover.

The complaint includes several stunning revelations, including claims that staffers at an unidentified Russian news organization in the US are engaged in spying; and indications that American law enforcement bugged the New York office of the Foreign Intelligence Service.

According to the complaint, Buryakov worked with two other men who were involved in intelligence-gathering activities for the SVR: Victor Podobnyy and Igor Sporyshev. The complaint said Sporyshev served as a trade representative to the Russian Federation in New York. Podobnyy was allegedly an attaché to the permanent mission of the Russian Federation to the United Nations. More here from BusinessInsider.

***

Related reading: Russian Hacking, We knew Because we had an Inside Operative(s)

SPIES, SPIES EVERYWHERE
A journey through D.C. espionage

WaPo: Mystery and intrigue are running wild in the capital these days. Secret conversations with dangerous diplomats, explosive foreign dossiers on American leaders, handwringing over national security and leaky intelligence. If you dip into our new book “Spy Sites of Washington, D.C.,” you will find that sneaking, lying and skullduggery are as old as the republic itself. And our region is full of the traces: hotels and parks and saloons and embassies and government offices where the deceitful and disloyal got up to their antics. Here is a sampling of sites where our nation’s espionage history has played out.

Presidential Daily Briefing for Trump on Russia

There are rumors flying that the intelligence agencies are holding back on key items that would otherwise be included in the PDB’s, especially items regarding Russia. Okay, we cannot know for sure that is true or not. In fact there are denials this is accurate. While countless media outlets are reporting that some ‘higher-ups’ in some intel agencies are in a war with President Trump, it is all because he is in a war with them. Sheesh….while all this is going on, other allied world leaders are watching all this and are feeling quite uneasy over intelligence collaboration and most especially where all this leads.

Image result for russian spy ship norfolk, virginia

Some one needs to restore order and confidence here and do it fast. At issue is Russia and Iran.

  1. The Russian spy ship doing an ‘in-your-face’ Atlantic coast water adventure and is presently just outside of Norfolk, Virginia and headed back to the Cuba region.
  2. Meanwhile, the new Secretary of State, Rex Tillerson is in Germany meeting with his Russian counterpart Sergey Lavrov.
  3. Another item is General Dunford is in Azerbaijan, meeting with Russian Chief of General Staff of the Armed Forces, Gerasimov.
  4. Qassem Soleimani, head of the Iranian Qods Force is in Moscow. Soleimani has a U.S. and U.N. travel ban and sanctions on him such that he is not allowed to travel. Hah…
  5. Ciaran Martin, head of GCHQ’s new National Cyber Security Centre states that Russia is escalating the rate of hacks against the UK. The United States, Canada, Australia and the UK are the four countries of record that make up GCHQ.
  6. Deputy Defense Secretary Bob Work met with Ukrainian Foreign Affairs Minister Pavlo Klimkin at the Pentagon regarding discussion over the recent escalation of violence by combined Russian separatist forces in eastern Ukraine.
  7. Because of Russian aggression and the lasting threat to the Baltic States, General Mattis has ordered U.S. troops deploy in Bulgaria.
  8. Russian troops attacked Ukrainian positions 139 times using heavy armor in all sectors in Donbas in the past 48 hours.

    Situation in Donbas February 13, 2017 Ukraine conflict map

    9.  Russia tells White House it will not return Crimea to Ukraine.
    10. Russia has secretly deployed a new cruise missile that American officials say violates a landmark arms control treaty, posing a major test for President Trump as his administration is facing a crisis over its ties to Moscow. The missile (Kalibr) is a SSC-8. It is a nuclear capable missile first tested in 2008. While this launch was ground based, it can also be launched from a submarine and is capable of holding 1000 lbs of conventional explosives or a nuclear warhead. There are variants to this weapon, there is also the Iskander and the 9M728. Nonetheless, it is a violation of the INF Treaty.
    Lastly and a very good thing, while Vladimir Putin is calling for full intelligence cooperation with the United States, General Mattis has not, no….not ready. Further, Mattis said that Russia needs to prove itself….tic tic tic…

    11. Soldiers, tanks and M88 recovery vehicles from the 1st Battalion, 8th Infantry Regiment’s “Fighting Eagles” recently arrived at the airbase in Romania in support of Operation Atlantic Resolve. So far, more than 350 U.S. soldiers have arrived this month with another 150 set to arrive before the end of February.

So, should there be some normalizing of relations between the White House and the Kremlin? Nah….has not worked out so well when it comes to Iran or Cuba…