ID: fcb812 July 17, 2020, 6:49 a.m. No.9986885   🗄️.is 🔗kun

>>9986413 (PB)

 

Attorney General Barr said yesterday that we are being attacked by China. He gave multiple examples in what was an effective introductory seminar on "unrestricted warfare."

 

https://en.wikipedia.org/wiki/Unrestricted_Warfare

 

AG Barr says we're being attacked by China. He describes how we are being attacked. He gives multiple examples of actual attacks, on supply chains, databases, infrastructure, the financial markets and describes how predatory lending, black mail and subversion work with the "Belt and Road Initiative" to extend China's influence and functional control of nations and institutions worldwide.

 

MSM coverage focus?

 

Politico says Barr " criticized Apple"

 

https://www.politico.com/news/2020/07/16/william-barr-apple-china-366223

 

NPR reported what AG Barr said "blasted Big Tech, and avoided stating the obvious: we're at war and our formidable and well prepared nation state adversary is CHY-Na.

 

AG Barr described in detail the novel nature of unrestricted or non linear warfare - with China.

 

https://en.wikipedia.org/wiki/Unrestricted_Warfare

 

MSM media did not "miss the point entirely," they have deliberately ignored it. Subversion of US media is integral to Chinese unrestricted warfare strategy.

 

NPR listeners are programmed to expect capsule or synoptic judgment in every story; the absence o such cues and the summary signifies the stories insignificance and consign it to the memory hole.

ID: fcb812 July 17, 2020, 6:59 a.m. No.9986953   🗄️.is 🔗kun   >>7100 >>7293

There are strong indications that this attack was perpetrated by individuals who’ve traditionally specialized in hijacking social media accounts via “SIM swapping,” an increasingly rampant form of crime that involves bribing, hacking or coercing employees at mobile phone and social media companies into providing access to a target’s account.

 

People within the SIM swapping community are obsessed with hijacking so-called “OG” social media accounts. Short for “original gangster,” OG accounts typically are those with short profile names (such as @B or @joe). Possession of these OG accounts confers a measure of status and perceived influence and wealth in SIM swapping circles, as such accounts can often fetch thousands of dollars when resold in the underground.

 

In the days leading up to Wednesday’s attack on Twitter, there were signs that some actors in the SIM swapping community were selling the ability to change an email address tied to any Twitter account. In a post on OGusers — a forum dedicated to account hijacking — a user named “Chaewon” advertised they could change email address tied to any Twitter account for $250, and provide direct access to accounts for between $2,000 and $3,000 apiece.

 

“This is NOT a method, you will be given a full refund if for any reason you aren’t given the email/@, however if it is revered/suspended I will not be held accountable,” Chaewon wrote in their sales thread, which was titled “Pulling email for any Twitter/Taking Requests.”

 

Hours before any of the Twitter accounts for cryptocurrency platforms or public figures began blasting out bitcoin scams on Wednesday, the attackers appear to have focused their attention on hijacking a handful of OG accounts, including “@6.”

 

That Twitter account was formerly owned by Adrian Lamo — the now-deceased “homeless hacker” perhaps best known for breaking into the New York Times’s network and for reporting Chelsea Manning‘s theft of classified documents. @6 is now controlled by Lamo’s longtime friend, a security researcher and phone phreaker who asked to be identified in this story only by his Twitter nickname, “Lucky225.”

 

Lucky225 said that just before 2 p.m. EDT on Wednesday, he received a password reset confirmation code via Google Voice for the @6 Twitter account. Lucky said he’d previously disabled SMS notifications as a means of receiving multi-factor codes from Twitter, opting instead to have one-time codes generated by a mobile authentication app.

 

But because the attackers were able to change the email address tied to the @6 account and disable multi-factor authentication, the one-time authentication code was sent to both his Google Voice account and to the new email address added by the attackers.

 

“The way the attack worked was that within Twitter’s admin tools, apparently you can update the email address of any Twitter user, and it does this without sending any kind of notification to the user,” Lucky told KrebsOnSecurity. “So [the attackers] could avoid detection by updating the email address on the account first, and then turning off 2FA.”

 

Lucky said he hasn’t been able to review whether any tweets were sent from his account during the time it was hijacked because he still doesn’t have access to it (he has put together a breakdown of the entire episode at this Medium post).

 

But around the same time @6 was hijacked, another OG account – @B — was swiped. Someone then began tweeting out pictures of Twitter’s internal tools panel showing the @B account.

 

Cached copies of @Shinji’s tweets prior to Wednesday’s attack on Twitter are available here and here from the Internet Archive. Those caches show Shinji claims ownership of two OG accounts on Instagram — “j0e” and “dead.”

 

KrebsOnSecurity heard from a source who works in security at one of the largest U.S.-based mobile carriers, who said the “j0e” and “dead” Instagram accounts are tied to a notorious SIM swapper who goes by the nickname “PlugWalkJoe.” Investigators have been tracking PlugWalkJoe because he is thought to have been involved in multiple SIM swapping attacks over the years that preceded high-dollar bitcoin heists.

 

MORE

https://krebsonsecurity.com/

ID: fcb812 July 17, 2020, 8:24 a.m. No.9987509   🗄️.is 🔗kun

>>9987393

Looks like a Huguenot descendant.

 

https://en.wikipedia.org/wiki/Jacob_Pleydell-Bouverie,_6th_Earl_of_Radnor

 

Lady Frances Pleydell Bouverie

 

http://www.thepeerage.com/p3568.htm#i35677

 

.