Anonymous ID: 8c7ffa Nov. 6, 2025, 4:22 a.m. No.23819804   🗄️.is 🔗kun

“Given Lisa Monaco’s leadership role in weaponizing the Biden Department of Justice against its political enemies, as evidenced in the recently released documents detailing ‘Arctic Frost’, it is wholly inappropriate and a risk to national security for Monaco to have any role whatsoever in the oversight of DHS contracts at Microsoft,” Fitzpatrick said in a statement provided to the DCNF.

 

EXCLUSIVE: ‘Arctic Frost’ Prosecutor Could Use Cushy Big Tech Job To Target Conservatives, Watchdog Warns

 

Nov 3 2025 (excerpt)

 

The Center to Advance Security in America (CASA) is demanding the Department of Homeland Security (DHS) review its contracts with Microsoft after the tech giant hired former Biden Justice Department official Lisa Monaco, according to a letter obtained by the Daily Caller News Foundation. The letter warns that Monaco’s senior position poses a national security risk, as she is privy to sensitive information between Microsoft and the federal government.

 

“The risk that Monaco could again use access to information contained in Department contracts to turn against her political opponents, or even those Microsoft users within the government with whom she disagrees, is great given her past outrageous behavior,” CASA Director James Fitzpatrick stated to DHS. “Considering the various national security implications of Microsoft’s government contracts being overseen by Monaco, we ask you to immediately initiate a review of Microsoft’s contracts with the Department for potential termination.”

 

https://dailycallernewsfoundation.org/2025/11/03/exclusive-arctic-frost-prosecutor-could-use-cushy-big-tech-job-to-target-conservatives-watchdog-warns/

Anonymous ID: 8c7ffa Nov. 6, 2025, 4:32 a.m. No.23819831   🗄️.is 🔗kun

[During oral arguments yesterday, the Trump admin made it completely clear that climate change is a hoax. It's on the record. Why Gorsuch even used climate as an example is a mystery. I guess he "believes" in the hoax.]

 

Gorsuch: Could the president impose a 50% tariff on gas powered cars and auto parts to deal with the unusual and extraordinary threat from abroad of climate change?

 

Sauer: This admin would say it’s a hoax

 

Gorsuch: I’m sure you would

 

https://x.com/Acyn/status/1986101846285668665

Anonymous ID: 8c7ffa Nov. 6, 2025, 5:47 a.m. No.23820137   🗄️.is 🔗kun   >>0154 >>0269 >>0524 >>0591 >>0634 >>0660

Volt Typhoon Energy Grid Cyberattack Exposes US Infrastructure Vulnerabilities

 

The Volt Typhoon advanced persistent threat (APT) group maintained access to a Massachusetts power utility's OT network for almost a year, highlighting critical infrastructure vulnerabilities.

 

Mar 2025 (excerpt)

 

An Energy Grid Cyberattack on US has exposed vulnerabilities within the US power grid. Security researchers at Dragos uncovered a prolonged cyber intrusion by the Volt Typhoon advanced persistent threat (APT) group, a threat actor linked to China.

 

The intrusion targeted Littleton Electric Light and Water Departments (LELWD), a small public power utility in Massachusetts. Volt Typhoon maintained unauthorized access to LELWD’s operational technology (OT) network for nearly a year, from February to November 2024.

 

“One of the biggest challenges with cybersecurity in critical infrastructure is the long lifespan of the devices. Something that was designed and tested to the best practices available when it was released can easily become vulnerable to attacks using more sophisticated attacks later in its lifecycle.”

 

Tim Mackey, head of software supply chain risk strategy at Black Duck, warned

Nathaniel Jones, vice president of threat research at Darktrace, added that the impact on Critical National Infrastructure (CNI) is a “continued and growing concern with the applications of AI-based capabilities for both offensive and defensive teams.”

 

The targeting of CNI entities suggests a strategic goal beyond simple data theft. Donovan Tindill, director of OT cybersecurity at DeNexus, noted that exfiltrating OT data allows attackers to gain geopolitical leverage:

 

Understand system configurations and operations.

Steal intellectual property (e.g., manufacturing techniques).

Identify supply chain relationships for potential disruption.

Map the electrical grid’s structure and criticality.

Use data for ransom or extortion.

Manipulate OT systems for specific objectives.

Dragos’ investigation revealed Volt Typhoon’s tactics, including Server Message Block (SMB) traversal and Remote Desktop Protocol (RDP) lateral movement. LELWD successfully contained the threat and reconfigured its network to prevent further exploitation. Importantly, no customer-sensitive data was compromised during the US Grid Cyberattack in Massachusetts.

 

Agnidipta Sarkar, vice president of CISO advisory at ColorTokens, emphasized the need for a proactive approach.

 

“Attack sophistication is on the rise, and OT/ICS organizations shut down when faced with a cyber-attack. Unfortunately, cyber OT leadership is focusing on stopping attacks instead of stopping the proliferation of attacks.”

 

The attackers aimed to exfiltrate data related to OT operating procedures and the spatial layout of the energy grid.

 

https://dailysecurityreview.com/security-spotlight/volt-typhoon-energy-grid-cyberattack-exposes-us-infrastructure-vulnerabilities/