Posted on 11/26/2020 3:58:28 PM PST by SeekAndFind
1. I am simply asking the question in response to a poster calling Jim Hoft gay. Calling someone a fag has been used by people today to disparage a person regardless of his sexual orientation
2. Hoft’s sexual orientation is irrelevant to the truth or falsity of his report.
He’s gay.
https://www.washingtontimes.com/news/2016/jun/13/jim-hoft-conservative-blogger-comes-out-as-gay-aft/
Bttt.
5.56mm
So... when he's taking it up the poop chute he's conservative?
When he's got another dude's pecker in his mouf he's conservative?
Or maybe is he spending those blog bucks at the gay bar?
The Andy Gump of this forum tossing stones again from his glass house.
Andy Gump married a Puerto Rican hooker.
Look up to the Elephant Man as your role model. At least he didn’t bore the world with a constant whine. Okay, God dealt you a lousy hand so man up and learn to live with it.
Joint Cybersecurity Advisory Iranian Advanced Persistent Threat Actor Identified Obtaining Voter Registration Data
See Sidney Powell's work (documents submitted in Georgia) at:
https://www.courtlistener.com/docket/18694655/pearson-v-kemp/
Scroll down to:
"MOTION for Temporary Restraining Order IMMEDIATE HEARING REQUESTED . . ."
"[Attachment 2] Exhibit Joint CyberSecurity Advisory Exhibit"
https://www.courtlistener.com/recap/gov.uscourts.gand.284055/gov.uscourts.gand.284055.6.2.pdf
October 30, 2020
EXCERPT:
- - -
Analysis by CISA and the FBI indicates this actor scanned state websites, to include state election websites, between September 20 and September 28, 2020, with the Acunetix vulnerability scanner . . . Acunetix is a widely used and legitimate web scanner, which has been used by threat actors for nefarious purposes. Organizations that do not regularly use Acunetix should monitor their logs for any activity from the program that originates from IP addresses provided in this advisory and consider it malicious reconnaissance behavior.
Additionally, CISA and the FBI observed this actor attempting to exploit websites to obtain copies of voter registration data between September 29 and October 17, 2020 . . . This includes attempted exploitation of known vulnerabilities, directory traversal, Structured Query Language (SQL) injection, web shell uploads, and leveraging unique flaws in websites.
CISA and the FBI can confirm that the actor successfully obtained voter registration data in at least one state. The access of voter registration data appeared to involve the abuse of website misconfigurations and a scripted process using the cURL tool to iterate through voter records. A review of the records that were copied and obtained reveals the information was used in the propaganda video.
CISA and FBI analysis of identified activity against state websites, including state election websites, referenced in this product cannot all be attributed to this Iranian APT actor. FBI analysis of the Iranian APT actor's activity has identified targeting of U.S. elections' infrastructure . . . within a similar timeframe, use of IP addresses and IP ranges - including numerous virtual private network (VPN) service exit nodes - which correlate to this Iran APT actor . . . and other investigative information.
- - -
The Joint CyberSecurity Advisory Exhibit includes several specific illustrations of the investigations' findings.
- - -
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.