Anonymous ID: 18a19e Sept. 4, 2020, 8:24 p.m. No.10532915   🗄️.is 🔗kun   >>2921 >>2925 >>2928 >>2929 >>2933 >>2934 >>2945 >>2949 >>2961 >>2969 >>2970 >>2980 >>2991 >>3002 >>3022 >>3063

Arrrr Shipmates, good to see ye again!

 

Eyes on the South China sea ye, 'The 7th & friends', hanging tough.

 

Enemies F & D. Who be the biggest sponsor or the now emasculated main sponsor of state terror?

 

Who be funding the funders of the Comm/Marxist/Islamist/Anarchist alliance in the US?

 

Why are they now getting desperate mi hearties? Failing much?

 

Who was shipping gold around? To who, what, where…WHY?

 

How was that stopped? Gold prices now?

 

Arrr! Make no mistake shipmates, eyes on the region mentioned and India related; the battle heats up, but good and GOD WINS ye!

 

Tit for Tat; watch The waters.

 

WWG1WGA. We are on a Ship., READY?

Anonymous ID: 18a19e Sept. 4, 2020, 8:32 p.m. No.10532980   🗄️.is 🔗kun   >>3093 >>3159

>>10532915

 

Arrr!

 

Navy CIO: ‘Malicious Cyber Actors’ Attacking Military Telework Infrastructure

 

“We’ve seen a number of potential exploits by malicious cyber actors. Kind of the easiest stuff and because everyone is super responsive and working from home – lots of phishing activity. And Especially early on, if it said COVID-19 in the subject line, you were going to open it,” Weis said.

“And really then that’s the front door and then getting somebody to click on an attachment or whatnot that you can get into somebody’s face with a COVID-themed message,” he continued. “The other is – there was an uptick in the registration of domain names that contain COVID, COVID-19, along with DOD specific variants of that, as the services rushed to push out tracking, tracing capability services, etc, for use in this teleworking environment.”

 

https://news.usni.org/2020/09/02/navy-cio-malicious-cyber-actors-attacking-military-telework-infrastructure.