Anonymous ID: b06d3a June 27, 2022, 10:21 a.m. No.16537250   🗄️.is đź”—kun   >>7283 >>7328 >>7334

>>16537177

Defcon2 or Defcon3 - I see both

 

Overall Current OSINT Defcon Level: 3 (Three) Taken from Defcon Level Warning System

 

 

June 27, 2022 - The United States now has over 100,000 troops stationed in Europe, which has increased from the 70,000 U.S. troops that were stationed in Europe when Russia's invasion on Ukraine began at the end of February. Read more

 

June 27, 2022 - The North Atlantic Treaty Organization (NATO) is increasing the number of its NATO Response Force troops at high readiness from 40,000 to "well over 300,000", according to NATO Secretary-General Jens Stoltenberg on Monday. Read more

 

June 27, 2022 - Russian state media Channel 1 talks about Lithuania, NATO Article 5, military presence being established on the Belarusian border and targeting oil tankers in the Netherlands. Read more

 

June 27, 2022 - Russian President Vladimir Putin told the President of Belarus Alexander Lukashenko that Russia will be providing Belarus nuclear capable Iskander missile systems in the "next few months". Read more Taken from Defcon Level Warning System:

 

https://www.defconlevel.com/european-command-news.php

Anonymous ID: b06d3a June 27, 2022, 11:07 a.m. No.16537589   🗄️.is đź”—kun   >>7858

Service Members Have Until June 30th To Participate In Medical Experimentation Or Senior Pentagon Leadership Will Initiate Court-Martial Proceedings

 

June 27, 2022

 

SECDEF Austin and Senior Pentagon Leadership have given an estimated 2.1 million service members until June 30 to participate in experimental drugs, or they will face punitive actions, including possible criminal proceedings.

 

To the shock of service members, Senior Pentagon Leadership is ignoring a 2005 FDA directive to the DoD that “refusal [to participate in investigational drugs] may not be grounds for any disciplinary action under the Uniform Code of Military Justice.” In addition, SECDEF Austin and his subordinates are flat out ignoring a 2005 court ruling that “Congress has prohibited the administration of investigational [experimental] drugs to service members without their consent.” One service member said, “it’s as if there is no more accountability in the military.”

 

Military directives issued by all branches require service members to participate in one of the following experimental drugs by June 30: 1) Investigational drug ID 19736, 2) Investigational drug ID 22657, or 3) Investigational drug ID 19745. These drugs have not been approved by the FDA, have no legal intent, and come with inherent risks such as death and/or permanent disability. 1st Lt. Mark Bashaw, U.S. Army Preventive Medicine Officer, told CovidPenalty.com, “The Defense Medical Epidemiological Database (DMED) is showing a 1,164% increase in adverse events in 2021 compared to the last 24 years of data (1977-2021) when comparing these experimental drugs to FDA-approved drugs. These drugs are deadly and dangerous, and this experimental campaign must be halted immediately, cease and desist!”

 

SECDEF issued an order on August 24, 2021, to his commanders that they may not use experimental drugs in mandates. However, he is now blindly allowing his generals to penalize service members under the Uniform Code of Military Justice because they refuse to participate in medical experimentation.

 

Dr. Terry Adirim, the former Health Assistant to the Secretary of Defense, issued a memorandum to the military commands in 2021 that DoD health providers “will” use experimental drugs “as if” they are FDA-approved drugs. Her guidance to pretend experimental drugs are the same as licensed drugs violates an international treaty, federal law, and military regulations. However, Senior Pentagon Leadership, the Office of Inspector General, and JAG refused to correct Dr. Adirim’s memorandum. Instead, they used her directive as the basis to engage in gross abuse of human rights not seen since the Nuremberg Trials.

 

Military regulations stipulate that service members who refuse the administration of an experimental drug “may not incur a penalty or lose a benefit to which they are otherwise entitled.” Service members expressed immense frustration and anger over the apparent callousness of commanders who care more about Senior Pentagon Leadership’s political goals than their brothers-in-arms’ health, safety, and rights.

 

Brian Ward, the founder of CovidPenalty.com, said, “Service members require special protections given the immunity the military has when those under their care are injured during active service, and the abuse of powers by SECDEF Austin warrants a criminal investigation by the Armed Services Committee.”

 

To date, no FDA-approved drugs have been made available to service members to comply with SECDEF Austin’s mandate. The fact that the Armed Services Committee has remained silent as senior Pentagon leadership violates federal law and military regulations is stunning. May we all pray for our men and women in uniform whose rights are being lawlessly ignored.

 

Quotes by service members do not demonstrate their endorsement of the opinions of this article.

 

https://www.covidpenalty.com/2022/06/27/service-members-have-until-june-30th-to-participate-in-medical-experimentation-or-senior-pentagon-leadership-will-initiate-court-martial-proceedings/

Anonymous ID: b06d3a June 27, 2022, 11:15 a.m. No.16537646   🗄️.is đź”—kun   >>7650 >>7858

Killnet hits Lithuania over EU sanctions affecting Kaliningrad

 

Russia-affiliated hacker group Killnet took down several Lithuanian government websites in response to the Baltic country following EU sanctions.

 

Threat actors loyal to the Kremlin, the Killnet collective, launched distributed denial-of-service (DDoS) attacks against Lithuanian government institutions and private businesses in an attempt to muscle the nation into dropping EU-level sanctions against Russia.

 

Killnet released a video message on the group's Telegram account demanding Lithuania allow the transit of goods to Kaliningrad or the Baltic nation will be continuously attacked.

 

Jonas Skardinskas, the head of cybersecurity at the Lithuania's National Cyber Security Center (NCSC) warned that the disruptions might continue for several days with transport, energy and finance sectors feeling the brunt of the attacks.

 

STI-website-down

 

The website of Lithuania's State Tax Inspectorate.

At the time of publishing this article, the website of Lithuania's State Tax Inspectorate (STI) was displaying a failure notice. One of the nation's largest accounting service providers, B1.lt, was also down. Local media reported that STI has put internal IT systems on hold for 'security concerns.'

 

The NCSC said that threat actors are targeting country's Secure public data transmission network with 'intensive DDoS attacks.' Authorities are working with affected businesses to mitigate the disruptions and restore services. Authorities also expect an increase in ransomware attacks.

 

Under attack

Killnet boasted of attacking Lithuania's e-government services and the website of the country's police. However, both were fully functional at the time of publishing. The group also said its attacks disrupted several websites that provide accounting services in the country. Taking down accounting services and STI's page for declaring tax duty can become an inconvenience for businesses that need to pay their taxes at the end of the month.

 

Russian hackers have continued attacking Lithuanian website's throughout Monday. Users with IP addresses outside Lithuania experienced issues with Lithuanian airport websites while some could not connect to websites of financial service providers. Killnet boasted attacking over a thousand Lithuanian websites, repeating the demands drop EU sanctions against Russia.

 

Websites of major telecommunication services providers were also affected by the DDoS attack with some loading unusually slow and other not loading at all. The group also targeted a platform for purchasing cross country bus tickets as well as website of the Supreme Court of Lithuania.

 

Lithuania's cyber watchdog noted an increase in DDoS attacks against the country last Friday, saying that threat actors targeted government agencies, transport, and finance sectors.

 

Attackers disrupted the website of the Lithuanian Railways, preventing passengers from purchasing train tickets online. It's not clear whether the attacks NCSC announced are related to Killnet.

 

Lithuania, a NATO and EU member, borders Kaliningrad, the Russian exclave wedged between Lithuania and Poland. Freight transport from the Russian mainland reaches Kaliningrad via Lithuanian territory. This route has been made difficult to complete for some good amidst EU sanctioning Russia for starting a war against Ukraine.

 

While Russian officials threatened Lithuania, the nation's leaders responded that the sanctions are imposed by the EU, not by Lithuania alone.

 

Crooks turned crusaders

 

The attack against Lithuania is hardly the first one Killnet has performed. The group has unsuccessfully tried to disrupt the Eurovision song contest, from which Russia was banned over the war in Ukraine.

 

Government websites in Italy, Romania, Germany, as well as websites in Czechia, Latvia, and elsewhere were under Killnet's cyber fire. The pro-Russian group has declared war against NATO and countries that support Ukraine.

 

When it debuted at the beginning of the year, Killnet was not even the name of an outfit – rather it was the moniker given to a distributed denial of service (DDoS) tool offered at a price to other threat actors.

 

https://cybernews.com/cyber-war/killnet-hits-lithuania-over-eu-sanctions-affecting-kaliningrad/

Anonymous ID: b06d3a June 27, 2022, 11:15 a.m. No.16537650   🗄️.is đź”—kun   >>7858

>>16537646

The group tried to rent botnets that had a capacity of 500GB per second for $1,350 per month. After Russia invaded Ukraine and hackers from around the world flocked to help the country defend against Moscow's invasion, Killnet refocused and started hacktivism in support of Russia.

 

Competing hacker groups launched numerous attacks after Russia invaded Ukraine. Anonymous, Ukraine's IT Army, Hacker Forces, and many other hacktivist groups started targeting Russia's state-owned enterprises and businesses.

 

According to the United Nations, the Russian invasion of Ukraine has created the 'fastest-growing refugee crisis in Europe since World War II.' Over 12 million people were displaced due to the conflict in a nation with 44 million residents.

 

Witness testimonies from Ukrainian towns Russian forces have occupied for close to a month point to severe human rights violations and targeted lethal attacks against civilians. Reports of "gross and systematic violations and abuses of human rights" got Russia suspended from the UN Human Rights Council

 

https://cybernews.com/cyber-war/killnet-hits-lithuania-over-eu-sanctions-affecting-kaliningrad/