Glitches glitches glitches … Chads and chads … flash back to 2000 vote this major irritant and election pregnant, hanging, dimpled chads. Now no Chads allowed! No samples … what a crying shame!
WASHINGTON (AP) — This is the story of how an office supply glitch became a major irritant between the United States and one of its close security partners.
Source: Office supply glitch? How Chad wound up on travel ban list
Months of work and finally done with the intro for now! Alpha Mike Foxtrot 🤠🤡🐴🐸🐥🐀🐒🌞⭐🌟💫✨☀⚡🔥💥
Integration of 9 posts in one introductory framework document on Dropbox download or
It is about disrupting and holding accountable entrenched actors and conduct that have reared their ugly heads again and again over the years continuing to present.
The first 5 posts included a limited overview of links between people, places and events. The 3 posts that followed set the domestic and cross-border investigative, legal, operational frameworks and environments.
This is not just (and does not need to be at all) about one event or a significant number of of cross-border acts but the design (intent, goal, planning) and the systemic (multi-agency supervisory/leadership level,) continuous and repeated nature of egregious violations of U.S. laws, Constitution, civil rights, values, codes of conduct and ethics — which will not stop functioning for cross-border or domestics accountability avoidance, fame, fortune, career ambitions, anything or anyone.
Subsequent violations have taken place in the U.S., over the years, affecting more innocent people. Until stopped and people responsible are held accountable, it will happen again and again.
Finally, international groups and countries take notice of this sort of conduct, actors, and decide on their own approach as is relevant to, and appropriate for them.
This is the 9th of limited information slides for documentation and reference purposes. Information, context and statements were previously and contemporaneously documented and independently verifiable. Conclusions and assessments are self-evident or clearly marked and separately identified. Related efforts are not recent and have been ongoing for a significant period.
Slide 8 – previous post
Slide 8 –previous post
Exploiting the popular Kaspersky antivirus software, Russian hackers searched millions of computers for American intelligence keywords. Israeli intelligence tipped off American officials.
Source: How Israel Caught Russian Hackers Scouring the World for U.S. Secrets
The Treasury Department’s inspector general said Friday it is looking into allegations that a Treasury Department agency has been illegally looking at the private financial records of U.S. citizens.
Source: Treasury’s IG probing allegations of illegal surveillance on US citizens
The Treasury Department’s Office of Intelligence and Analysis has been illegally rifling through and filing away the private financial records of US citizens, Treasury employees alleged.
Source: US Intelligence Unit Accused Of “Domestic Spying” On Americans’ Finances
Investigators believe Russian hackers exploited Kaspersky Lab software to steal classified documents that a National Security Agency employee stored on his home computer.
Source: New N.S.A. Breach Linked to Popular Russian Antivirus Software