Free Republic 4th Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $31,710
Woo hoo!! And the first 36% is in!! Thank you all very much!! God bless.

Posts by palmer

Brevity: Headers | « Text »
  • Internet Crashes Will Be Hard To Stop After Obama's Internet Giveaway

    10/25/2016 3:14:06 PM PDT · 6 of 29
    palmer to bushwon
    One of the cheap Chinese IP camera companies recalled their cameras. They also blamed the owners for not resetting the password even though the password was a backdoor password that could not be changed or disabled by the owner.

    The other thing to think about is how easy it would have been to avoid being taken down in this attack. First do not use DNS within a service. Some companies blamed other providers but in fact it was their fault for using names instead of IPs in a fixed architecture. Second, if a company is stupid enough to rely on DNS, do not rely on one DNS provider. Third, if a company did rely on DNS and had a backup DNS provider, do not wait 2 hours to switch over to the backup.

    Now that this attack is history those providers that learned something for it will be easily able to thwart the next one.

  • The Chris Plante Show Goes Into National Syndication

    10/25/2016 8:58:29 AM PDT · 4 of 18
    palmer to steadcom

    Chris studies history and does not the liberals revise history when they call in. He acknowledges Trump’s imperfections while wholeheartedly supporting him.

  • U.S. takes aim at cyber attacks from connected devices as recalls mount

    10/25/2016 4:40:59 AM PDT · 14 of 17
    palmer to VanShuyten
    So, how many Chicom chips are in US security and military equipment?

    Fake or real? The fakes are where some Chinese chop shop replaced the guts of a real chip or real equipment with fake insecure knock-offs. Those are hard to detect. That's just for the sheer profit of reselling the real components.

    The real chips are where we integrate real Chinese chips or components into our systems. It could be anything. It could be a cable. Think about how small they could make a chip and stick it in a cable, tap the power, tap the data, add a tiny radio connected to another wire to use as an antenna. Are we looking for stuff like that? I certainly hope we are. Personally I think we are screwed.

  • U.S. takes aim at cyber attacks from connected devices as recalls mount

    10/25/2016 4:32:27 AM PDT · 13 of 17
    palmer to Innovative
    I would say it's good that the gov. is taking this seriously,

    I would say it is 100% bad. The government has no regulatory authority over an IP camera in Romania that is attack a DNS server here, nor should they. It would be even worse to give them more authority over ISPs here since those ISPs would limit your choices "for the greater good" (translation: $$ for them).

    The solution to this rather trivial problem is multifold. More DNS caching (yes that has problems but is a llifesaver during the short span of attack). Better attack recognition so it can be responded to quickly. Service providers need to eliminate their use of DNS, that is a no-brainer. There is no reason any service should have gone down.

    The immediate solution is to shorten the duration of the attack which could make a nonevent. The ultimate solution is internet architectures that don't need DNS lookups. There are many and of course Google and Facebook and other powerhouses will come up with some so they can continue getting your eyeballs and their revenue. The worst thing is to have the government, Google, Facebook and others dictate some "solution" or the giving the domestic ISPs more power.

  • Tilting, Sinking San Francisco High-Rise Raises Alarm

    10/24/2016 3:28:58 PM PDT · 55 of 73
    palmer to George from New England
    When radio and TV towers are erected they must own all the land around it so if they fall they don't fall off the site.

    Not in Needham MA:,+MA/@42.3033149,-71.2180111,18z (click on satellite view)

  • Trump, Clinton In Dead Heat As Race Hits Final Two-Week Stretch — IBD/TIPP Poll

    10/24/2016 5:40:48 AM PDT · 24 of 35
    palmer to American in Israel

    Hillary got about 3-4k (MSM says 7k) to her rally at UPenn in Philly the other night. It was poor considering the location and circumstances, but gave her the photos she needs to pretend ordinary people like her. As far I can tell, only truly stupid people like her.

  • The Democracy Alliance meeting (WikiLeaks: Podesta)

    10/23/2016 7:00:37 PM PDT · 12 of 16
    palmer to Jaded

    Yeah, that’s before they came up with the blame Putin strategy. Of course Trump wasn’t on the scene yet.

  • The Democracy Alliance meeting (WikiLeaks: Podesta)

    10/23/2016 6:54:40 PM PDT · 10 of 16
    palmer to PA Engineer

    The attachment definitely piqued my interest.

  • The Democracy Alliance meeting (WikiLeaks: Podesta)

    10/23/2016 6:51:17 PM PDT · 6 of 16
    palmer to Jaded

    I should have just refreshed.

  • The Democracy Alliance meeting (WikiLeaks: Podesta)

    10/23/2016 6:50:29 PM PDT · 5 of 16
    palmer to MNDude
    Attachment is PDF, but I will paste the text here:

    Hillary Clinton's emails and what to do about them

    Barbara Simons
    I believe that this is a more serious situation than perhaps Secretary Clinton and her aides realize. Fortunately, there is a positive step that can and should be taken.

    The problem. There is a very real risk that the system was broken into, possibly by Republican operatives (or China or some other country or organization). If this has happened and if there is anything that might appear problematic in those emails, whether or not it actually is, the relevant emails might be released to the press shortly before the election. Even if the system was not broken into, there is the threat that opponents might release forged emails that are difficult to impossible to distinguish from real ones.

    In addition, there are questions that any computer security expert will ask, such as was the system backed up regularly. If so, then it might be possible at least to respond to forged emails. Of course the claim that the server has been wiped clean (was that also done with any backups that were created?) suggests that there may not be adequate backups.

    Incidentally, depending on how the deletions on the server were done, it might be possible for the email to be recovered by a forensics expert.

    What should be done. Unfortunately, nothing can be done to prevent the risks described above. Given that, it's important to know how real those risks might be. Therefore, I recommend that a forensics investigator be hired to examine the server and any backups and logs that might still exist to see if there may have been a break-in.

    Jeremy Epstein is a prominent computer security expert who has recommended a company called Mandiant. (Neither Jeremy nor I have any involvment with Mandiant of any kind, including financial). According to Jeremy, they are frequently brought in after major corporate breakins. They are very discrete and, in his view, competent. I can put anyone who is interested in touch with Jeremy, who lives in Virginia.

    In my opinion it is critical that a highly qualified forensics expert examine the system as soon as possible. It is important to know if there may be a problem or if an attack may have occurred, so that there can be a well thought out response prepared beforehand.

    Finally, if nothing serious is uncovered by a forensics examination, that does not prove that nothing happened. Regrettably, the absence of proof of a break-in is not proof of the absence of a break-in.

  • [VANITY] Proudly voted straight Republican ticket in Oregon (Mail ballot)

    10/23/2016 9:29:39 AM PDT · 2 of 9
    palmer to nwrep

    Thanks for the Trump vote. No doubt Trump will do better nationwide and could win the popular vote because of people like you in the blue states.

  • Without Trump We Are Done

    10/23/2016 8:12:40 AM PDT · 16 of 49
    palmer to Kaslin

    If Hillary wins there will be lots of vanities and impeachment threads, but nothing will change. The most popular thread here a year from now will be about some stupid TV show.

  • AP Interview: Kaine says Clinton will try to work with GOP

    10/23/2016 5:56:01 AM PDT · 36 of 38
    palmer to FlingWingFlyer
    Of course she will. She loves rich greedy politicians no matter which party they belong to. They can all be bought. It’s those damn Americans she has a problem with

    Indeed. Those republicans also have no problem being in the minority and would probably prefer that. The payoff for them is about the same either way. She OTOH would prefer a scant Republican majority in the house so she can assign blame for the bad economy as long as she can strong arm amnesty and gun control by them.

  • A confident Clinton at Penn pushes McGinty's Senate candidacy

    10/22/2016 9:12:42 PM PDT · 14 of 52
    palmer to euram

    Looking at the picture it looks like your estimate: 3-4k

  • A confident Clinton at Penn pushes McGinty's Senate candidacy

    10/22/2016 9:11:45 PM PDT · 11 of 52
    palmer to nhwingut

    They are spinning it as “helping the down ballot races” but she could help the down ballot races anywhere. Toomey is on her side anyway.

  • A confident Clinton at Penn pushes McGinty's Senate candidacy

    10/22/2016 8:59:34 PM PDT · 3 of 52
    palmer to hsmomx3

    There’s a lot of stupid out there.

  • A confident Clinton at Penn pushes McGinty's Senate candidacy

    10/22/2016 8:55:17 PM PDT · 1 of 52
    There's a set of Getty images with one crowd shot (I don't think we are allowed to post Getty images). The pics are at Looked like a few thousand to me. Some were listening, some milling around. Looks like lots of white female students.
  • Outside Money Favors Hillary Clinton at a 2-to-1 Rate Over Donald Trump

    10/22/2016 8:25:12 PM PDT · 10 of 20
    palmer to Innovative

    She raile against Citizens United but she takes the money. I dunno, but that sounds a little hypocritical or she might just be a liar.

  • FOX News: The widespread cyber attack yesterday was "perpetrated by a government."

    10/22/2016 4:57:13 PM PDT · 44 of 103
    palmer to MarchonDC09122009
    Just type into your browser


  • Emails show Clinton campaign weighing Keystone XL decision

    10/22/2016 4:08:18 PM PDT · 6 of 8
    palmer to digger48
    clean energy superpower.

    We need sails on our aircraft carriers which will carry solar-powered jet fighters so we can project clean power around the world.

  • National Day of Voting Holiday (Vanity)

    10/22/2016 1:13:41 PM PDT · 10 of 43
    palmer to faucetman
    The sad part is that most of your dream will eventually come true. Once the uniparty is permanently installed by successors to Hillary, there will be no reason to vote. Voting will be mandatory and a paid holiday will be part of the deal. At that point most people will be paid by the government so it will be easy to implement. They will dutifully line up and pull the lever for Tweedledee or Tweedledum.

    To stop this from happening, vote Trump!

  • Trump's 'Gettysburg address' makes closing argument for choosing him and unveils first-100-days...

    10/22/2016 12:58:59 PM PDT · 18 of 32
    palmer to maine-iac7

    Do you have flash installed? Then that’s probably your problem. If not, where did you download the video from? What format?

  • WikiLeaks The Obama administration should not have attempted to misuse its instruments [tr]

    10/22/2016 6:00:48 AM PDT · 77 of 77
    palmer to Arthur Wildfire! March
    Yes, you are describing protections against brute forcing. When a system is remote from an attacker, the attacker must connect, try a password or key, then try a few more times while the remote system returns failure messages. After a small number of attempts the remote system closes the connection and times out or it can time out between attempts. At some number of failed attempts it can simply lock out the account.

    Even better if an attacker fails with some number of obvious passwords (e.g. pass, password, pass123, changeme, etc) then the remote system can determine that it is being attacked. At that point the remote system can redirect the attacker into a honeypot. Now the trick is to fool the attacker into thinking they got in when they did not. That means presenting delicious looking data that is actually fake. The whole idea is to waste the attacker's time and computing resources in a giant dead end.

    Even better is to draw the attacker into the honeypot and then assume that the attacker uses insecure code to parse the data that they steal. Then present the attacker with delicious looking data that actually contains your own trojan horses. The attacker steals the data and starts to parse it on their machine and the data exploits a weakness in their parse and takes over their machine. Now you are not just wasting the attacker's time, but you are potentially destroying some of their capability.

  • WikiLeaks The Obama administration should not have attempted to misuse its instruments [tr]

    10/22/2016 5:53:02 AM PDT · 76 of 77
    palmer to wastoute
    Anything “off the shelf” would mean you could never be certain that what you were trying to secure, actually was secure.

    It is not impossible that the NSA could have fooled the world's experts and gotten positive reviews of algorithms (e.g. AES) with security flaws. But if that is the case it would be because of a vastly superior and completely secret NSA technology to brute force or bypass the security. Brute force is plausible and described in academic literature but with technology that is completely speculative (e.g. large scale quantum computing). Bypasses are not in the literature AFAIK and would be unlikely with the exception of minor weaknesses that would reduce the brute force computing requirements. See Schneier for descriptions of those.

    There is also evidence that the Chinese have rolled their own perhaps for those reasons. But that is probably a bad idea given alternatives like adding rounds to a public algorithm. If you simply add rounds you greatly increase the brute force computation requirements at the cost of a bit more computing on your end.

  • Hacked Cameras, DVRs Powered Today’s Massive Internet Outage

    10/22/2016 5:44:48 AM PDT · 16 of 18
    palmer to 80skid

    I’m sure if we don’t have overt Chinese parts then the we have bootleg parts that some traitor bought that have some Chinese guts inside them. There are programs to built unforgeable part involving things like physically unclonable functions (PUF) but I don’t think we ready for widespread use of those techniques yet.

  • Hacked Cameras, DVRs Powered Today’s Massive Internet Outage

    10/21/2016 8:00:03 PM PDT · 12 of 18
    palmer to Yo-Yo
    With so much crap being made in China, what are the odds that most of it has botware preinstalled just waiting for the activation codes to be sent by Beijing?

    The odds are 100% and it is going to get worse.

  • Syrian army says it will 'bring down' any Turkish war planes in its airspace

    10/21/2016 7:04:27 PM PDT · 9 of 19
    palmer to Sequoyah101

    I guess we’ll find out.

  • WikiLeaks The Obama administration should not have attempted to misuse its instruments [tr]

    10/21/2016 6:56:21 PM PDT · 60 of 77
    palmer to Arthur Wildfire! March
    Unfortunately, the NSA was hacked over the summer, and the US government demands that all encryption algorithms of US companies be stored there.

    I had that argument with another freeper. He claimed there are secret encryption algorithms. I stated that there are no secret encryption algorithms. Of course I have no way of knowing that. However the NSA along with NIST have developed several public encryption algorithms that were reviewed and critiqued by top worldwide encryption experts. Those algorithms are in fact used by the government and most US companies. It would go against all accepted practice to use a secret algorithm.

    A company that invents and uses its own algorithm is not doing itself any favors. The secrecy must be in the key and the key alone in order to assure that the a cyber loss is not a catastrophe. If you lose a key in a cyber attack you have lost one key and life goes on. If you lose an algorithm which, being code, is harder to protect than a key which is data, that is a catastrophe.

    Thus I would end any speculation about secret encryption algorithms. I speak strictly as an applied crypto expert with two decades of experience, not as an insider or anything like that.

  • Hillary Supporter Goes Nuts With Peanut-Butter Smear

    10/21/2016 4:31:07 AM PDT · 18 of 30
    palmer to csvset

    Smells like peanut butter.

  • Nate Silver tweeted that the Trump camp thinks they can win Maryland

    10/20/2016 8:17:12 PM PDT · 72 of 123
    palmer to Starboard
    And too many people with financial ties to the federal government. The odds of Trump winning both states are extremely remote in my opinion

    Basically true, but there are also a million or two cleared contractors who are not happy with her extremely reckless handling of classified material. Among those folks there are not a lot of Trump supporters but there are some.

  • Senate races tightening up in North Carolina and Wisconsin

    10/20/2016 9:20:41 AM PDT · 16 of 24
    palmer to Diana in Wisconsin
    I'm perplexed over Johnson/Feingold.

    I'm not. I listened to their debate on radio (C-SPAN). I could tell every now and then that Feingold was lying, for example trying to talk around his socialism on health care. Feingold also had the nerve to say that X million more people were covered when in fact there are zero more people in Wisconsin covered. His presentation was slick and perfect for the LIVs.

    Johnson on the other hand was much more precise overall but less smooth and didn't come across (on radio) nearly as polished. He had good facts but the moderators quickly moved to a new topic whenever Johnson won on substance.

  • Hillary: All 17 of our security agencies say that Russia hacked our national computer systems

    10/20/2016 3:34:40 AM PDT · 103 of 124
    palmer to butterdezillion
    This is a link that talks about an analysis connecting the DCLeaks hack with the Russians:

    I can tell you without even reading it that it is not valid. The only "evidence" for Russian hackers is that the DNC immediately called a former Russian hacker to find evidence for Russian hacking last spring. The report from that hacker, Dmitri Alperovitch, is complete BS.

  • More Soros voting machines

    10/19/2016 5:27:18 PM PDT · 34 of 48
    palmer to thefixisin

    I do software, not voting machine software. If I were to write software that cheated I would not make it obvious. The vote rigging hack would be extremely subtle so nobody would find it. Point #2 is that the it is very unlikely the machines are reprogrammed each election. If it is the same software with just new lists of candidates, then the R->D vote switch hack would have to be programmed in well in advance of knowing the candidates’ names.

  • More Soros voting machines

    10/19/2016 4:58:59 PM PDT · 25 of 48
    palmer to thefixisin
    How easy it would be to program the machine to change every other Trump vote to Hillary.

    Obviously the code would not be written like that. Instead they will determine the candidate with the party with more C's in the party name and add a 2% randomized chance of switching a vote to that candidate. But given the complexity and input data it could be much more subtle than that.

  • WikiLeaks Confirms: Ecuador Cut Off Assange's Web Access

    10/17/2016 3:09:27 PM PDT · 62 of 87
    palmer to danamco
    FR's server is at a hosting site, not likely to be disconnected. What will probably happen under Hillary and global control of DNS is that the domain name will appear on more blacklists. It already happens, trolls insert links to dubious sites (could also be inadvertent) and then google announces that the whole domain is dangerous because of those few outgoing links.

    In short, censorship won't be overt like getting cut off, but covert by making it harder for ordinary people, especially at workplaces, libraries and schools to connect. Overt disconnetion would quickly be reversed or JohnRob would put the server somewhere else. Covert is much harder to deal with.

  • Trump Leading Ohio by 6.67% Pre-Debate, Trump Gains 4% Post-Debate (tr)

    10/16/2016 8:01:17 PM PDT · 7 of 17
    palmer to justlittleoleme

    I think this poll is of all adults or (more likely) all voters. The other pollsters like to skew their results by oversampling Democrats based on higher Dem turnout in 2012. They then call that a “poll of likely voters”. But that doesn’t mean they polled actual likely voters.

  • WikiLeaks: Re: Foreign registered agents

    10/16/2016 4:12:31 PM PDT · 5 of 38
    palmer to smitty2012
    Money quote from the money man: I do want to push back a bit (it’s my job!): I feel like we are leaving a good amount of money on the table (both for primary and general, and then DNC and state parties)… and how do we explain to people that we’ll take money from a corporate lobbyist but not them; that the Foundation takes $ from foreign govts but we now won’t.
  • Obama Signs Order To Prepare Nation For Solar Storms

    10/16/2016 3:28:19 PM PDT · 52 of 92
    palmer to RFEngineer

    Looks like lightning has around 1 microsecond and EMP is 0.01 microsecond or less rise times.

  • Obama Signs Order To Prepare Nation For Solar Storms

    10/16/2016 3:23:57 PM PDT · 51 of 92
    palmer to RFEngineer
  • Obama Signs Order To Prepare Nation For Solar Storms

    10/16/2016 3:12:39 PM PDT · 45 of 92
    palmer to RFEngineer
    The grid is chock full of eletronics.

    Sure. And a nearby lightning strike delivers far more energy as EMP at basically the same high frequencies as EMP. Most electronics survives fine with some surge protection. You are correct that EMP will bring parts of the grid down, not by blowing transformers, but by disrupting SCADA and networking. Those are easier to replace, and won't nearly as long as the transformers. Back up within a week.

  • Obama Signs Order To Prepare Nation For Solar Storms

    10/16/2016 2:57:52 PM PDT · 38 of 92
    palmer to meatloaf

    An EMP can be engineered to create more grid damage. But low frequencies require much more energy than high frequencies to induce currents. To get transformer-damaging currents with EMP would be quite difficult.

  • Obama Signs Order To Prepare Nation For Solar Storms

    10/16/2016 2:51:03 PM PDT · 32 of 92
    palmer to Sasparilla
    It would cost billions to protect the electric grid from an EMP event.

    The grid is generally not vulnerable to EMP. EMP will do far more damage to electronics. Solar events will not damage electronics other than those directly attached to long lines (i.e. nothing in your house).

  • Obama Signs Order To Prepare Nation For Solar Storms

    10/16/2016 2:48:39 PM PDT · 27 of 92
    palmer to milford421
    Solar event? Would an EMP event produce the same result?

    Generally no. Solar events will affect nothing but long lines, blowing up transformers on the grid. They are very low frequency magnetic field fluctuations which is why the long line is needed to generate current.

    EMP is the opposite, extremely high frequency electric fields. EMP can also contain lower frequencies but not significant magnetic fields. The high frequency electric fields can be picked up by very short antennas and damage all sorts of electronics including semiconductors.

    They are both serious threats but different and require different mitigation. The best way to mitigate EMP is missile defense.

  • The Regimes “Cyber Action Against Russia” isn’t about Russia

    10/16/2016 11:36:32 AM PDT · 25 of 28
    palmer to Arthur Wildfire! March

    Another thread posted in chat asked what will we do if Hillary wins. I am not a pessimist but I am a realist and the media is going to do their best to make sure she wins. One question is if she wins and further turns over the internet to the globalists and the corporations, what are we going to do about it? I think there’s a lot we can do, but we have to think about how to be most effective under the new regime.

  • The Regimes “Cyber Action Against Russia” isn’t about Russia

    10/16/2016 5:45:44 AM PDT · 21 of 28
    palmer to Arthur Wildfire! March
    True. A stupid and arrogant fool like Podesta is an easy cyber target. His password was probably guessable or revealed from other leaked emails. The "hackers" who got in merely had to sync a standard email client to download all his email. There are a few caveats with how they would access in particular they would avoid doing that from Russian, eastern European or (especially) Chinese IP addresses that would tip off Google which undoubtedly keeps blacklists of those. They might even set alarms for important accounts if there are access attempts from those IP ranges. I don't know if they do that, but it would not be difficult to do and they ought to do it.

    The upshot is that there was no super Russian "tradecraft" involved. Podesta himself was not "hacked". Nor was Google "hacked" in any real sense. It was a pedestrian login and email sync. It could have most easily been done from Western European or American or Canadian IP address spaces.

    Thus you correctly identified the main way our regime will combat it. They will lie about "Russians", they will throw up chaff like leaking obviously incorrect material to discredit the real material. Wikileaks however is not stupid enough to fall for any fake material. Also Wikileaks knows most of their sources although some sources might send material via an anonymizer to avoid being ID'd if Assange gets captured or hacked.

  • The Regimes “Cyber Action Against Russia” isn’t about Russia

    10/15/2016 5:07:18 PM PDT · 15 of 28
    palmer to ShivaFan; Arthur Wildfire! March
    Good post. The US govt has plenty of tax money to spend on targeted insecurity. The Chinese mainly have to keep producing their endless stream of insecure crap. With back doors and plain old poor design their devices are easy to take over later. E.g. the millions of internet cameras that are taken over for DDOS attacks. The Russians are freeloading and probably the least of our worries.

    In some sense the main cyber combatants are on the same side, and it isn't our side. We have very little security available to us: various insecure operating systems larded up with crapware giving hackers a large attack surface. Unless you load your own stripped down linux or root your android phone you are pretty much a sitting duck. The only safety we have is our insignificance, nobody cares enough about most of us to bother attacking. It will get worse.

  • Stormy Climate Deception

    10/15/2016 8:31:32 AM PDT · 5 of 10
    palmer to rktman
    a moderately warmer planet with more atmospheric carbon dioxide would hugely benefit crop, forest and other plant growth, wildlife and humans

    On the money. Thanks to global warming (and efficiency) we no longer have to use as much energy for heating: but heating still requires almost 7 times as much energy as cooling.

  • Hillary Corruption Led to Syria-Russia Crisis [aw!m vanity]

    10/15/2016 8:15:06 AM PDT · 23 of 35
    palmer to Arthur Wildfire! March; Cboldt
    And we are now on the brink of war. A cyber-war could disrupt online communications right before the election.

    As Cboldt said on the other thread: "The story is pure propaganda targeted at the US population. There won't be any "ramped up" US cyber attack. Clandestine network activity will continue as usual, and both sides know it."

    I think Cboldt is correct. The only "evidence" I have seen about Russian attacks is that the DNC brought in a former Russian (now naturalized American) to "prove" that the Russians were hacking into the DNC servers. You can read his stuff here:

    There is rarely a dull day at CrowdStrike where we are not detecting or responding to a breach at a company somewhere around the globe. In all of these cases, we operate under strict confidentiality rules with our customers and cannot reveal publicly any information about these attacks. But on rare occasions, a customer decides to go public with information about their incident and give us permission to share our knowledge of the adversary tradecraft with the broader community and help protect even those who do not happen to be our customers. This story is about one of those cases.

    CrowdStrike Services Inc., our Incident Response group, was called by the Democratic National Committee (DNC), the formal governing body for the US Democratic Party, to respond to a suspected breach. We deployed our IR team and technology and immediately identified two sophisticated adversaries on the network – COZY BEAR and FANCY BEAR. We’ve had lots of experience with both of these actors attempting to target our customers in the past and know them well. In fact, our team considers them some of the best adversaries out of all the numerous nation-state, criminal and hacktivist/terrorist groups we encounter on a daily basis. Their tradecraft is superb, operational security second to none and the extensive usage of ‘living-off-the-land’ techniques enables them to easily bypass many security solutions they encounter. In particular, we identified advanced methods consistent with nation-state level capabilities including deliberate targeting and ‘access management’ tradecraft – both groups were constantly going back into the environment to change out their implants, modify persistent methods, move to new Command & Control channels and perform other tasks to try to stay ahead of being detected. Both adversaries engage in extensive political and economic espionage for the benefit of the government of the Russian Federation and are believed to be closely linked to the Russian government’s powerful and highly capable intelligence services.

    The bold is mine of course. Not the most subtle of propaganda, but there it is: the origin of all the Russian hacking stories.

  • Wisconsin Sen. Ron Johnson stands by Trump in debate

    10/15/2016 5:01:36 AM PDT · 13 of 29
    palmer to goldstategop
    What a snake, like Ryan.

    I listened to most of the debate and Johnson had genuine conservative positions throughout. Feingold was much slicker and lied a lot.

  • Voter Fraud Lawsuit Hits Hillary’s Campaign: ‘They’re Nailed!’

    10/15/2016 4:56:13 AM PDT · 21 of 25
    palmer to Trump_vs_Evil_Witch
    Internal Hillary's & Trump's internal polls show her losing by a wider margin