Anonymous ID: fdbd7f July 21, 2020, 6:53 p.m. No.10038909   🗄️.is 🔗kun

>>10038801

>10038801>>10038832 >>10038850

 

https://www.joshwho.net/rashida-tlaib-warns-feds-will-have-to-arrest-her-if-they-set-foot-in-detroit/

 

https://www.bizpacreview.com/2020/07/21/rep-rashida-tlaib-tells-feds-helping-subdue-rioters-theyll-have-to-arrest-her-first-nobody-argues-949566

Anonymous ID: fdbd7f July 21, 2020, 6:54 p.m. No.10038936   🗄️.is 🔗kun   >>9024 >>9191 >>9239

>>10038851 Great job! Better trained Space Professionals mean more advantages in space.

>https://twitter.com/SpaceForceDoD/status/1285752172311977984?s=20

NOTABLE

 

United States Space Force

@SpaceForceDoD

Great job! Better trained Space Professionals mean more advantages in space.

Quote Tweet

Schriever AFB

@SchrieverAFB

· Jul 18

Twelve operators from the =1st= and =7th= Space Operations Squadrons executed an orbital engagement training event last week to train operators in realistic space warfighting scenarios.

 

More information on the scenario and organization here: https://go.usa.gov/xfj4W

Image

6:43 PM · Jul 21, 2020

Anonymous ID: fdbd7f July 21, 2020, 6:57 p.m. No.10038972   🗄️.is 🔗kun   >>9011

>>10038916

>1 year delta

NOTABLE

 

3459

Fake News Links Anthony Comello's Mental Instability to Qanon

Q

!!mG7VJxZNCI

21 Jul 2019 - 1:41:15 PM

https://twitter.com/maggieNYT/status/1153021405476401153📁

Every single 'dirty' tactic being deployed to stop the growth of this movement.

Ask yourself a very simple Q - why?

Why are the biggest media co's in the world…….

Q

Anonymous ID: fdbd7f July 21, 2020, 6:58 p.m. No.10038995   🗄️.is 🔗kun   >>9004

>>10038952 @chicagosmayor July 20 "Mr. President or not—I don’t care one bit what your name is. I will not allow troops in Chicago, and I will do everything in my power to stop you." > July 21 "17 shot in Chicago tonight!"

NOTABLE

Anonymous ID: fdbd7f July 21, 2020, 7:14 p.m. No.10039194   🗄️.is 🔗kun   >>9231

>>10039148

>>>10039112

>

>NOTABLE

 

Chinese Hackers Charged in Decade-Long Crime and Spying Spree

 

From defense contractors to videogame companies, the indictment details an astonishing array of victims.

 

Li Xiaoyu had a problem. At some point in his decade-long hacking spree with former college classmate Dong Jiazhi, as alleged in a recent Justice Department indictment, the Chinese national found himself unable to break into the mail server of a Burmese human rights group. The usual methods apparently hadn’t worked. For Li, the solution came from having a friend in high places: An officer with China’s Ministry of State Security handed him zero-day malware—unknown to security vendors, and so harder to defend against—to help finish off the job.

 

Other countries have long blurred the lines between criminal and state-sponsored hacking, particularly Russia, Iran, and North Korea. But in a detailed indictment unsealed by the Department of Justice Tuesday, the United States has for the first time officially accused China of belonging to that club. Since at least 2009, authorities say, Li and Dong have hacked hundreds of companies around the world. Their targets range from manufacturing and engineering companies to videogame and education software to solar energy to pharmaceuticals. More recently—and unsurprisingly, given the intense international interest—the pair has targeted firms working on Covid-19 vaccines and treatments. They’ve allegedly stolen invaluable intellectual property to pass along to their MSS handlers, while lining their own pockets along the way.

 

“China is using cyberintrusions as part of its rob, replicate, and replace strategy to technological development,” said assistant attorney general for national security John Demers at a press conference Tuesday. “China is providing a safe haven for criminal hackers who, as in this case, are hacking in part for their own personal gain, but willing to help the state and on call to do so.”

 

The indictment outlines at length how Li and Dong allegedly worked as a tag team. Dong would research victims and how they might be exploited; Li did the dirty work of compromising the networks and exfiltrating the data. The pair used the same general workflow regardless of the victim, which makes sense given the volume of attacks to which they have been linked. Efficiency at scale counts for a lot.

 

First, they would identify high-value targets, and attempt to get a foothold either through poorly configured networks or through fresh vulnerabilities that their targets hadn’t yet patched. On September 11, 2018, for instance, Adobe disclosed a critical bug in its ColdFusion platform; by October 20 of that year, Li had successfully exploited it to install a so-called web shell on the network of a US government biomedical research agency in Maryland.

 

NOTABLE