The Ukrainian central bank said on Friday it had warned state-owned and private lenders of the appearance of new malware as security services said Ukraine faced cyber attacks like those that knocked out global systems in June.
Who are these operators, why are they so skilled and what are they up to?
It is about disrupting and holding accountable entrenched actors and conduct that have reared their ugly heads again and again over the years continuing to present.
This is the 2nd of limited information slides for documentation and reference purposes. Informations and statements were previously and contemporaneously documented. Related efforts are not recent and have been ongoing for a significant period.
Some problems need to be exposed and stopped. It is even more imperative when they are somewhat systemic — and especially when federal employees (albeit a handful or more but in leadership/decision-making positions and orchestrated in conduct) are not held accountable and allowed to continue violating the law, civil, and constitutional rights, intimidate, use violence and cause harm to witnesses, the public and their colleagues. Closely related issues are past and continued personal safety of individuals and violations of law and rights not addressed yet.
In the spirit of this blog … better late than never. It is not only not late, it is about disrupting and holding accountable entrenched actors and conduct that have reared their ugly heads again and again over the years continuing to present. Some times, only time, perceived weakened defenses, vulnerable victims and absence of restraints can lock individuals and their conduct sufficiently as to limit wiggle room, claims of being mistaken and deniability in general.
This is the first of limited information slides for documentation and reference purposes. Informations and statements were previously and contemporaneously documented. Related efforts are not recent and have been ongoing for a significant period.
Even Cipher Brief is not immune to being mesmerized by shiny technology objects! Blockchain is useful in ensuring the integrity of something as it was recorded. For bitcoin, a record of transaction accurately represents that transaction. That was the purpose and that is where is starts and ends. However, a record of a supply chain activity is not proof of supply chain integrity. A bad part can still make in into the THAAD system and could have been caught before with or without blockchain.
If the U.S. Department of Defense were an economy unto itself, it would be the 20th largest in the world. Like any other advanced modern economy, it is deeply integrated with the entire globe, its supply chains often stretching into countries with whom the United States has adversarial relations.
Putin’s government draws on a century of espionage tradecraft to influence Western society. Now it’s updated for the digital age.
Former top CIA official explains how counterintelligence and criminal probes can work at cross-purposes such that the guilty walk free.