New recipes

DC Bar Offers $4 Happy Hour Drinks Every Time Trump Fires a Senior White House Official

DC Bar Offers $4 Happy Hour Drinks Every Time Trump Fires a Senior White House Official


We are searching data for your request:

Forums and discussions:
Manuals and reference books:
Data from registers:
Wait the end of the search in all databases.
Upon completion, a link will appear to access the found materials.

Regardless of your political affiliation, you can drink to this: At the D.C. bar The Bird, all drinks are $4 following the termination of a senior White House official. According to Foodbeast, this halves the bar’s normal prices during happy hour, which runs from 4 to 7 p.m. on weekends.

The Bird’s first “You’re Fired” happy hour took place August 18 following the exit of White House adviser Steve Bannon. The bar’s Twitter account

. “We’ve seen crowds before but it truly was a sea of people #ByeBannon,” the account wrote. The menu features a strawberry Aperol spritz, passion fruit red sangria, an intriguing duck-infused whiskey, and more.

The majority of users who replied to the tweet applauded the promotion, but Lila RB, also known as @birthdaypalin, did not. She wrote, “Pathetic! Stay out of politics.”

Some important questions also arose, like what would happen in event of a double termination? What if the president himself got the boot? While we don’t know the answers to those burning questions, we do know the 15 best chain restaurant happy hours. Cheers!


The Maskirovka Slips XV: Guccifer 2.0 Is Finally Exposed

SCOOP: An officer with Russia's military intelligence agency made a crucial slip-up in tradecraft &ndash one that revealed his secret identity as Guccifer 2.0. @kpoulsen & I report. https://t.co/unXztJlG2q

&mdash Spencer Ackerman (@attackerman) March 22, 2018

From Spencer Ackerman and Kevin Poulsen at The Daily Beast:

Guccifer 2.0, the &ldquolone hacker&rdquo who took credit for providing WikiLeaks with stolen emails from the Democratic National Committee, was in fact an officer of Russia&rsquos military intelligence directorate (GRU), The Daily Beast has learned. It&rsquos an attribution that resulted from a fleeting but critical slip-up in GRU tradecraft.

That forensic determination has substantial implications for the criminal probe into potential collusion between President Donald Trump and Russia. The Daily Beast has learned that the special counsel in that investigation, Robert Mueller, has taken over the probe into Guccifer and brought the FBI agents who worked to track the persona onto his team.

Mueller&rsquos office declined to comment for this story. But the attribution of Guccifer 2.0 as an officer of Russia&rsquos largest foreign intelligence agency would cross the Kremlin threshold&mdashand move the investigation closer to Trump himself.

Proving that link definitively was harder. Ehmke led an investigation at ThreatConnect that tried to track down Guccifer from the metadata in his emails. But the trail always ended at the same data center in France. Ehmke eventually uncovered that Guccifer was connecting through an anonymizing service called Elite VPN, a virtual private networking service that had an exit point in France but was headquartered in Russia.

Working off the IP address, U.S. investigators identified Guccifer 2.0 as a particular GRU officer working out of the agency&rsquos headquarters on Grizodubovoy Street in Moscow. (The Daily Beast&rsquos sources did not disclose which particular officer worked as Guccifer.)

Security firms and declassified U.S. intelligence findings previously identified the GRU as the agency running &ldquoFancy Bear,&rdquo the ten-year-old hacking organization behind the DNC email theft, as well as breaches at NATO, Obama&rsquos White House, a French television station, the World Anti-Doping Agency, and countless NGOs, and militaries and civilian agencies in Europe, Central Asia, and the Caucasus.

Much, much more at the link. Including a recounting of how the GRU officer posing as Guccifer 2.0&rsquos stolen data was used by Republican campaigns aside from the presidential election. Now that Special Counsel Mueller can tie Guccifer 2.0 directly to the GRU (Russian military intelligence), it means that the counterintelligence portion of his investigation will not be contained just to the presidential campaign. Any Republican campaign official and/or operation any Republican candidate, whether they won their race or not and any conservative group that got and/or used Guccifer 2.0&rsquos stolen Democratic information are highly likely to also be in the Special Counsel&rsquos crosshairs.

As is the case with all the breaking Cambridge Analytica news this week, Ackerman&rsquos and Poulsen&rsquos reporting provides significant new information about another major and significant bridging node in Russia&rsquos active measures and cyberwarfare network. This provides those of us paying attention and following the news reporting on Putin&rsquos Cold War against the US, as well as our allies and partners, important information of who was doing what, when, and on whose behalf. It also tells us that the counterintelligence component of the Special Council&rsquos investigation is still cranking away on determining the full dimensions and parameters of Putin&rsquos active measures and cyberwarfare campaign against the US.


The Maskirovka Slips XV: Guccifer 2.0 Is Finally Exposed

SCOOP: An officer with Russia's military intelligence agency made a crucial slip-up in tradecraft &ndash one that revealed his secret identity as Guccifer 2.0. @kpoulsen & I report. https://t.co/unXztJlG2q

&mdash Spencer Ackerman (@attackerman) March 22, 2018

From Spencer Ackerman and Kevin Poulsen at The Daily Beast:

Guccifer 2.0, the &ldquolone hacker&rdquo who took credit for providing WikiLeaks with stolen emails from the Democratic National Committee, was in fact an officer of Russia&rsquos military intelligence directorate (GRU), The Daily Beast has learned. It&rsquos an attribution that resulted from a fleeting but critical slip-up in GRU tradecraft.

That forensic determination has substantial implications for the criminal probe into potential collusion between President Donald Trump and Russia. The Daily Beast has learned that the special counsel in that investigation, Robert Mueller, has taken over the probe into Guccifer and brought the FBI agents who worked to track the persona onto his team.

Mueller&rsquos office declined to comment for this story. But the attribution of Guccifer 2.0 as an officer of Russia&rsquos largest foreign intelligence agency would cross the Kremlin threshold&mdashand move the investigation closer to Trump himself.

Proving that link definitively was harder. Ehmke led an investigation at ThreatConnect that tried to track down Guccifer from the metadata in his emails. But the trail always ended at the same data center in France. Ehmke eventually uncovered that Guccifer was connecting through an anonymizing service called Elite VPN, a virtual private networking service that had an exit point in France but was headquartered in Russia.

Working off the IP address, U.S. investigators identified Guccifer 2.0 as a particular GRU officer working out of the agency&rsquos headquarters on Grizodubovoy Street in Moscow. (The Daily Beast&rsquos sources did not disclose which particular officer worked as Guccifer.)

Security firms and declassified U.S. intelligence findings previously identified the GRU as the agency running &ldquoFancy Bear,&rdquo the ten-year-old hacking organization behind the DNC email theft, as well as breaches at NATO, Obama&rsquos White House, a French television station, the World Anti-Doping Agency, and countless NGOs, and militaries and civilian agencies in Europe, Central Asia, and the Caucasus.

Much, much more at the link. Including a recounting of how the GRU officer posing as Guccifer 2.0&rsquos stolen data was used by Republican campaigns aside from the presidential election. Now that Special Counsel Mueller can tie Guccifer 2.0 directly to the GRU (Russian military intelligence), it means that the counterintelligence portion of his investigation will not be contained just to the presidential campaign. Any Republican campaign official and/or operation any Republican candidate, whether they won their race or not and any conservative group that got and/or used Guccifer 2.0&rsquos stolen Democratic information are highly likely to also be in the Special Counsel&rsquos crosshairs.

As is the case with all the breaking Cambridge Analytica news this week, Ackerman&rsquos and Poulsen&rsquos reporting provides significant new information about another major and significant bridging node in Russia&rsquos active measures and cyberwarfare network. This provides those of us paying attention and following the news reporting on Putin&rsquos Cold War against the US, as well as our allies and partners, important information of who was doing what, when, and on whose behalf. It also tells us that the counterintelligence component of the Special Council&rsquos investigation is still cranking away on determining the full dimensions and parameters of Putin&rsquos active measures and cyberwarfare campaign against the US.


The Maskirovka Slips XV: Guccifer 2.0 Is Finally Exposed

SCOOP: An officer with Russia's military intelligence agency made a crucial slip-up in tradecraft &ndash one that revealed his secret identity as Guccifer 2.0. @kpoulsen & I report. https://t.co/unXztJlG2q

&mdash Spencer Ackerman (@attackerman) March 22, 2018

From Spencer Ackerman and Kevin Poulsen at The Daily Beast:

Guccifer 2.0, the &ldquolone hacker&rdquo who took credit for providing WikiLeaks with stolen emails from the Democratic National Committee, was in fact an officer of Russia&rsquos military intelligence directorate (GRU), The Daily Beast has learned. It&rsquos an attribution that resulted from a fleeting but critical slip-up in GRU tradecraft.

That forensic determination has substantial implications for the criminal probe into potential collusion between President Donald Trump and Russia. The Daily Beast has learned that the special counsel in that investigation, Robert Mueller, has taken over the probe into Guccifer and brought the FBI agents who worked to track the persona onto his team.

Mueller&rsquos office declined to comment for this story. But the attribution of Guccifer 2.0 as an officer of Russia&rsquos largest foreign intelligence agency would cross the Kremlin threshold&mdashand move the investigation closer to Trump himself.

Proving that link definitively was harder. Ehmke led an investigation at ThreatConnect that tried to track down Guccifer from the metadata in his emails. But the trail always ended at the same data center in France. Ehmke eventually uncovered that Guccifer was connecting through an anonymizing service called Elite VPN, a virtual private networking service that had an exit point in France but was headquartered in Russia.

Working off the IP address, U.S. investigators identified Guccifer 2.0 as a particular GRU officer working out of the agency&rsquos headquarters on Grizodubovoy Street in Moscow. (The Daily Beast&rsquos sources did not disclose which particular officer worked as Guccifer.)

Security firms and declassified U.S. intelligence findings previously identified the GRU as the agency running &ldquoFancy Bear,&rdquo the ten-year-old hacking organization behind the DNC email theft, as well as breaches at NATO, Obama&rsquos White House, a French television station, the World Anti-Doping Agency, and countless NGOs, and militaries and civilian agencies in Europe, Central Asia, and the Caucasus.

Much, much more at the link. Including a recounting of how the GRU officer posing as Guccifer 2.0&rsquos stolen data was used by Republican campaigns aside from the presidential election. Now that Special Counsel Mueller can tie Guccifer 2.0 directly to the GRU (Russian military intelligence), it means that the counterintelligence portion of his investigation will not be contained just to the presidential campaign. Any Republican campaign official and/or operation any Republican candidate, whether they won their race or not and any conservative group that got and/or used Guccifer 2.0&rsquos stolen Democratic information are highly likely to also be in the Special Counsel&rsquos crosshairs.

As is the case with all the breaking Cambridge Analytica news this week, Ackerman&rsquos and Poulsen&rsquos reporting provides significant new information about another major and significant bridging node in Russia&rsquos active measures and cyberwarfare network. This provides those of us paying attention and following the news reporting on Putin&rsquos Cold War against the US, as well as our allies and partners, important information of who was doing what, when, and on whose behalf. It also tells us that the counterintelligence component of the Special Council&rsquos investigation is still cranking away on determining the full dimensions and parameters of Putin&rsquos active measures and cyberwarfare campaign against the US.


The Maskirovka Slips XV: Guccifer 2.0 Is Finally Exposed

SCOOP: An officer with Russia's military intelligence agency made a crucial slip-up in tradecraft &ndash one that revealed his secret identity as Guccifer 2.0. @kpoulsen & I report. https://t.co/unXztJlG2q

&mdash Spencer Ackerman (@attackerman) March 22, 2018

From Spencer Ackerman and Kevin Poulsen at The Daily Beast:

Guccifer 2.0, the &ldquolone hacker&rdquo who took credit for providing WikiLeaks with stolen emails from the Democratic National Committee, was in fact an officer of Russia&rsquos military intelligence directorate (GRU), The Daily Beast has learned. It&rsquos an attribution that resulted from a fleeting but critical slip-up in GRU tradecraft.

That forensic determination has substantial implications for the criminal probe into potential collusion between President Donald Trump and Russia. The Daily Beast has learned that the special counsel in that investigation, Robert Mueller, has taken over the probe into Guccifer and brought the FBI agents who worked to track the persona onto his team.

Mueller&rsquos office declined to comment for this story. But the attribution of Guccifer 2.0 as an officer of Russia&rsquos largest foreign intelligence agency would cross the Kremlin threshold&mdashand move the investigation closer to Trump himself.

Proving that link definitively was harder. Ehmke led an investigation at ThreatConnect that tried to track down Guccifer from the metadata in his emails. But the trail always ended at the same data center in France. Ehmke eventually uncovered that Guccifer was connecting through an anonymizing service called Elite VPN, a virtual private networking service that had an exit point in France but was headquartered in Russia.

Working off the IP address, U.S. investigators identified Guccifer 2.0 as a particular GRU officer working out of the agency&rsquos headquarters on Grizodubovoy Street in Moscow. (The Daily Beast&rsquos sources did not disclose which particular officer worked as Guccifer.)

Security firms and declassified U.S. intelligence findings previously identified the GRU as the agency running &ldquoFancy Bear,&rdquo the ten-year-old hacking organization behind the DNC email theft, as well as breaches at NATO, Obama&rsquos White House, a French television station, the World Anti-Doping Agency, and countless NGOs, and militaries and civilian agencies in Europe, Central Asia, and the Caucasus.

Much, much more at the link. Including a recounting of how the GRU officer posing as Guccifer 2.0&rsquos stolen data was used by Republican campaigns aside from the presidential election. Now that Special Counsel Mueller can tie Guccifer 2.0 directly to the GRU (Russian military intelligence), it means that the counterintelligence portion of his investigation will not be contained just to the presidential campaign. Any Republican campaign official and/or operation any Republican candidate, whether they won their race or not and any conservative group that got and/or used Guccifer 2.0&rsquos stolen Democratic information are highly likely to also be in the Special Counsel&rsquos crosshairs.

As is the case with all the breaking Cambridge Analytica news this week, Ackerman&rsquos and Poulsen&rsquos reporting provides significant new information about another major and significant bridging node in Russia&rsquos active measures and cyberwarfare network. This provides those of us paying attention and following the news reporting on Putin&rsquos Cold War against the US, as well as our allies and partners, important information of who was doing what, when, and on whose behalf. It also tells us that the counterintelligence component of the Special Council&rsquos investigation is still cranking away on determining the full dimensions and parameters of Putin&rsquos active measures and cyberwarfare campaign against the US.


The Maskirovka Slips XV: Guccifer 2.0 Is Finally Exposed

SCOOP: An officer with Russia's military intelligence agency made a crucial slip-up in tradecraft &ndash one that revealed his secret identity as Guccifer 2.0. @kpoulsen & I report. https://t.co/unXztJlG2q

&mdash Spencer Ackerman (@attackerman) March 22, 2018

From Spencer Ackerman and Kevin Poulsen at The Daily Beast:

Guccifer 2.0, the &ldquolone hacker&rdquo who took credit for providing WikiLeaks with stolen emails from the Democratic National Committee, was in fact an officer of Russia&rsquos military intelligence directorate (GRU), The Daily Beast has learned. It&rsquos an attribution that resulted from a fleeting but critical slip-up in GRU tradecraft.

That forensic determination has substantial implications for the criminal probe into potential collusion between President Donald Trump and Russia. The Daily Beast has learned that the special counsel in that investigation, Robert Mueller, has taken over the probe into Guccifer and brought the FBI agents who worked to track the persona onto his team.

Mueller&rsquos office declined to comment for this story. But the attribution of Guccifer 2.0 as an officer of Russia&rsquos largest foreign intelligence agency would cross the Kremlin threshold&mdashand move the investigation closer to Trump himself.

Proving that link definitively was harder. Ehmke led an investigation at ThreatConnect that tried to track down Guccifer from the metadata in his emails. But the trail always ended at the same data center in France. Ehmke eventually uncovered that Guccifer was connecting through an anonymizing service called Elite VPN, a virtual private networking service that had an exit point in France but was headquartered in Russia.

Working off the IP address, U.S. investigators identified Guccifer 2.0 as a particular GRU officer working out of the agency&rsquos headquarters on Grizodubovoy Street in Moscow. (The Daily Beast&rsquos sources did not disclose which particular officer worked as Guccifer.)

Security firms and declassified U.S. intelligence findings previously identified the GRU as the agency running &ldquoFancy Bear,&rdquo the ten-year-old hacking organization behind the DNC email theft, as well as breaches at NATO, Obama&rsquos White House, a French television station, the World Anti-Doping Agency, and countless NGOs, and militaries and civilian agencies in Europe, Central Asia, and the Caucasus.

Much, much more at the link. Including a recounting of how the GRU officer posing as Guccifer 2.0&rsquos stolen data was used by Republican campaigns aside from the presidential election. Now that Special Counsel Mueller can tie Guccifer 2.0 directly to the GRU (Russian military intelligence), it means that the counterintelligence portion of his investigation will not be contained just to the presidential campaign. Any Republican campaign official and/or operation any Republican candidate, whether they won their race or not and any conservative group that got and/or used Guccifer 2.0&rsquos stolen Democratic information are highly likely to also be in the Special Counsel&rsquos crosshairs.

As is the case with all the breaking Cambridge Analytica news this week, Ackerman&rsquos and Poulsen&rsquos reporting provides significant new information about another major and significant bridging node in Russia&rsquos active measures and cyberwarfare network. This provides those of us paying attention and following the news reporting on Putin&rsquos Cold War against the US, as well as our allies and partners, important information of who was doing what, when, and on whose behalf. It also tells us that the counterintelligence component of the Special Council&rsquos investigation is still cranking away on determining the full dimensions and parameters of Putin&rsquos active measures and cyberwarfare campaign against the US.


The Maskirovka Slips XV: Guccifer 2.0 Is Finally Exposed

SCOOP: An officer with Russia's military intelligence agency made a crucial slip-up in tradecraft &ndash one that revealed his secret identity as Guccifer 2.0. @kpoulsen & I report. https://t.co/unXztJlG2q

&mdash Spencer Ackerman (@attackerman) March 22, 2018

From Spencer Ackerman and Kevin Poulsen at The Daily Beast:

Guccifer 2.0, the &ldquolone hacker&rdquo who took credit for providing WikiLeaks with stolen emails from the Democratic National Committee, was in fact an officer of Russia&rsquos military intelligence directorate (GRU), The Daily Beast has learned. It&rsquos an attribution that resulted from a fleeting but critical slip-up in GRU tradecraft.

That forensic determination has substantial implications for the criminal probe into potential collusion between President Donald Trump and Russia. The Daily Beast has learned that the special counsel in that investigation, Robert Mueller, has taken over the probe into Guccifer and brought the FBI agents who worked to track the persona onto his team.

Mueller&rsquos office declined to comment for this story. But the attribution of Guccifer 2.0 as an officer of Russia&rsquos largest foreign intelligence agency would cross the Kremlin threshold&mdashand move the investigation closer to Trump himself.

Proving that link definitively was harder. Ehmke led an investigation at ThreatConnect that tried to track down Guccifer from the metadata in his emails. But the trail always ended at the same data center in France. Ehmke eventually uncovered that Guccifer was connecting through an anonymizing service called Elite VPN, a virtual private networking service that had an exit point in France but was headquartered in Russia.

Working off the IP address, U.S. investigators identified Guccifer 2.0 as a particular GRU officer working out of the agency&rsquos headquarters on Grizodubovoy Street in Moscow. (The Daily Beast&rsquos sources did not disclose which particular officer worked as Guccifer.)

Security firms and declassified U.S. intelligence findings previously identified the GRU as the agency running &ldquoFancy Bear,&rdquo the ten-year-old hacking organization behind the DNC email theft, as well as breaches at NATO, Obama&rsquos White House, a French television station, the World Anti-Doping Agency, and countless NGOs, and militaries and civilian agencies in Europe, Central Asia, and the Caucasus.

Much, much more at the link. Including a recounting of how the GRU officer posing as Guccifer 2.0&rsquos stolen data was used by Republican campaigns aside from the presidential election. Now that Special Counsel Mueller can tie Guccifer 2.0 directly to the GRU (Russian military intelligence), it means that the counterintelligence portion of his investigation will not be contained just to the presidential campaign. Any Republican campaign official and/or operation any Republican candidate, whether they won their race or not and any conservative group that got and/or used Guccifer 2.0&rsquos stolen Democratic information are highly likely to also be in the Special Counsel&rsquos crosshairs.

As is the case with all the breaking Cambridge Analytica news this week, Ackerman&rsquos and Poulsen&rsquos reporting provides significant new information about another major and significant bridging node in Russia&rsquos active measures and cyberwarfare network. This provides those of us paying attention and following the news reporting on Putin&rsquos Cold War against the US, as well as our allies and partners, important information of who was doing what, when, and on whose behalf. It also tells us that the counterintelligence component of the Special Council&rsquos investigation is still cranking away on determining the full dimensions and parameters of Putin&rsquos active measures and cyberwarfare campaign against the US.


The Maskirovka Slips XV: Guccifer 2.0 Is Finally Exposed

SCOOP: An officer with Russia's military intelligence agency made a crucial slip-up in tradecraft &ndash one that revealed his secret identity as Guccifer 2.0. @kpoulsen & I report. https://t.co/unXztJlG2q

&mdash Spencer Ackerman (@attackerman) March 22, 2018

From Spencer Ackerman and Kevin Poulsen at The Daily Beast:

Guccifer 2.0, the &ldquolone hacker&rdquo who took credit for providing WikiLeaks with stolen emails from the Democratic National Committee, was in fact an officer of Russia&rsquos military intelligence directorate (GRU), The Daily Beast has learned. It&rsquos an attribution that resulted from a fleeting but critical slip-up in GRU tradecraft.

That forensic determination has substantial implications for the criminal probe into potential collusion between President Donald Trump and Russia. The Daily Beast has learned that the special counsel in that investigation, Robert Mueller, has taken over the probe into Guccifer and brought the FBI agents who worked to track the persona onto his team.

Mueller&rsquos office declined to comment for this story. But the attribution of Guccifer 2.0 as an officer of Russia&rsquos largest foreign intelligence agency would cross the Kremlin threshold&mdashand move the investigation closer to Trump himself.

Proving that link definitively was harder. Ehmke led an investigation at ThreatConnect that tried to track down Guccifer from the metadata in his emails. But the trail always ended at the same data center in France. Ehmke eventually uncovered that Guccifer was connecting through an anonymizing service called Elite VPN, a virtual private networking service that had an exit point in France but was headquartered in Russia.

Working off the IP address, U.S. investigators identified Guccifer 2.0 as a particular GRU officer working out of the agency&rsquos headquarters on Grizodubovoy Street in Moscow. (The Daily Beast&rsquos sources did not disclose which particular officer worked as Guccifer.)

Security firms and declassified U.S. intelligence findings previously identified the GRU as the agency running &ldquoFancy Bear,&rdquo the ten-year-old hacking organization behind the DNC email theft, as well as breaches at NATO, Obama&rsquos White House, a French television station, the World Anti-Doping Agency, and countless NGOs, and militaries and civilian agencies in Europe, Central Asia, and the Caucasus.

Much, much more at the link. Including a recounting of how the GRU officer posing as Guccifer 2.0&rsquos stolen data was used by Republican campaigns aside from the presidential election. Now that Special Counsel Mueller can tie Guccifer 2.0 directly to the GRU (Russian military intelligence), it means that the counterintelligence portion of his investigation will not be contained just to the presidential campaign. Any Republican campaign official and/or operation any Republican candidate, whether they won their race or not and any conservative group that got and/or used Guccifer 2.0&rsquos stolen Democratic information are highly likely to also be in the Special Counsel&rsquos crosshairs.

As is the case with all the breaking Cambridge Analytica news this week, Ackerman&rsquos and Poulsen&rsquos reporting provides significant new information about another major and significant bridging node in Russia&rsquos active measures and cyberwarfare network. This provides those of us paying attention and following the news reporting on Putin&rsquos Cold War against the US, as well as our allies and partners, important information of who was doing what, when, and on whose behalf. It also tells us that the counterintelligence component of the Special Council&rsquos investigation is still cranking away on determining the full dimensions and parameters of Putin&rsquos active measures and cyberwarfare campaign against the US.


The Maskirovka Slips XV: Guccifer 2.0 Is Finally Exposed

SCOOP: An officer with Russia's military intelligence agency made a crucial slip-up in tradecraft &ndash one that revealed his secret identity as Guccifer 2.0. @kpoulsen & I report. https://t.co/unXztJlG2q

&mdash Spencer Ackerman (@attackerman) March 22, 2018

From Spencer Ackerman and Kevin Poulsen at The Daily Beast:

Guccifer 2.0, the &ldquolone hacker&rdquo who took credit for providing WikiLeaks with stolen emails from the Democratic National Committee, was in fact an officer of Russia&rsquos military intelligence directorate (GRU), The Daily Beast has learned. It&rsquos an attribution that resulted from a fleeting but critical slip-up in GRU tradecraft.

That forensic determination has substantial implications for the criminal probe into potential collusion between President Donald Trump and Russia. The Daily Beast has learned that the special counsel in that investigation, Robert Mueller, has taken over the probe into Guccifer and brought the FBI agents who worked to track the persona onto his team.

Mueller&rsquos office declined to comment for this story. But the attribution of Guccifer 2.0 as an officer of Russia&rsquos largest foreign intelligence agency would cross the Kremlin threshold&mdashand move the investigation closer to Trump himself.

Proving that link definitively was harder. Ehmke led an investigation at ThreatConnect that tried to track down Guccifer from the metadata in his emails. But the trail always ended at the same data center in France. Ehmke eventually uncovered that Guccifer was connecting through an anonymizing service called Elite VPN, a virtual private networking service that had an exit point in France but was headquartered in Russia.

Working off the IP address, U.S. investigators identified Guccifer 2.0 as a particular GRU officer working out of the agency&rsquos headquarters on Grizodubovoy Street in Moscow. (The Daily Beast&rsquos sources did not disclose which particular officer worked as Guccifer.)

Security firms and declassified U.S. intelligence findings previously identified the GRU as the agency running &ldquoFancy Bear,&rdquo the ten-year-old hacking organization behind the DNC email theft, as well as breaches at NATO, Obama&rsquos White House, a French television station, the World Anti-Doping Agency, and countless NGOs, and militaries and civilian agencies in Europe, Central Asia, and the Caucasus.

Much, much more at the link. Including a recounting of how the GRU officer posing as Guccifer 2.0&rsquos stolen data was used by Republican campaigns aside from the presidential election. Now that Special Counsel Mueller can tie Guccifer 2.0 directly to the GRU (Russian military intelligence), it means that the counterintelligence portion of his investigation will not be contained just to the presidential campaign. Any Republican campaign official and/or operation any Republican candidate, whether they won their race or not and any conservative group that got and/or used Guccifer 2.0&rsquos stolen Democratic information are highly likely to also be in the Special Counsel&rsquos crosshairs.

As is the case with all the breaking Cambridge Analytica news this week, Ackerman&rsquos and Poulsen&rsquos reporting provides significant new information about another major and significant bridging node in Russia&rsquos active measures and cyberwarfare network. This provides those of us paying attention and following the news reporting on Putin&rsquos Cold War against the US, as well as our allies and partners, important information of who was doing what, when, and on whose behalf. It also tells us that the counterintelligence component of the Special Council&rsquos investigation is still cranking away on determining the full dimensions and parameters of Putin&rsquos active measures and cyberwarfare campaign against the US.


The Maskirovka Slips XV: Guccifer 2.0 Is Finally Exposed

SCOOP: An officer with Russia's military intelligence agency made a crucial slip-up in tradecraft &ndash one that revealed his secret identity as Guccifer 2.0. @kpoulsen & I report. https://t.co/unXztJlG2q

&mdash Spencer Ackerman (@attackerman) March 22, 2018

From Spencer Ackerman and Kevin Poulsen at The Daily Beast:

Guccifer 2.0, the &ldquolone hacker&rdquo who took credit for providing WikiLeaks with stolen emails from the Democratic National Committee, was in fact an officer of Russia&rsquos military intelligence directorate (GRU), The Daily Beast has learned. It&rsquos an attribution that resulted from a fleeting but critical slip-up in GRU tradecraft.

That forensic determination has substantial implications for the criminal probe into potential collusion between President Donald Trump and Russia. The Daily Beast has learned that the special counsel in that investigation, Robert Mueller, has taken over the probe into Guccifer and brought the FBI agents who worked to track the persona onto his team.

Mueller&rsquos office declined to comment for this story. But the attribution of Guccifer 2.0 as an officer of Russia&rsquos largest foreign intelligence agency would cross the Kremlin threshold&mdashand move the investigation closer to Trump himself.

Proving that link definitively was harder. Ehmke led an investigation at ThreatConnect that tried to track down Guccifer from the metadata in his emails. But the trail always ended at the same data center in France. Ehmke eventually uncovered that Guccifer was connecting through an anonymizing service called Elite VPN, a virtual private networking service that had an exit point in France but was headquartered in Russia.

Working off the IP address, U.S. investigators identified Guccifer 2.0 as a particular GRU officer working out of the agency&rsquos headquarters on Grizodubovoy Street in Moscow. (The Daily Beast&rsquos sources did not disclose which particular officer worked as Guccifer.)

Security firms and declassified U.S. intelligence findings previously identified the GRU as the agency running &ldquoFancy Bear,&rdquo the ten-year-old hacking organization behind the DNC email theft, as well as breaches at NATO, Obama&rsquos White House, a French television station, the World Anti-Doping Agency, and countless NGOs, and militaries and civilian agencies in Europe, Central Asia, and the Caucasus.

Much, much more at the link. Including a recounting of how the GRU officer posing as Guccifer 2.0&rsquos stolen data was used by Republican campaigns aside from the presidential election. Now that Special Counsel Mueller can tie Guccifer 2.0 directly to the GRU (Russian military intelligence), it means that the counterintelligence portion of his investigation will not be contained just to the presidential campaign. Any Republican campaign official and/or operation any Republican candidate, whether they won their race or not and any conservative group that got and/or used Guccifer 2.0&rsquos stolen Democratic information are highly likely to also be in the Special Counsel&rsquos crosshairs.

As is the case with all the breaking Cambridge Analytica news this week, Ackerman&rsquos and Poulsen&rsquos reporting provides significant new information about another major and significant bridging node in Russia&rsquos active measures and cyberwarfare network. This provides those of us paying attention and following the news reporting on Putin&rsquos Cold War against the US, as well as our allies and partners, important information of who was doing what, when, and on whose behalf. It also tells us that the counterintelligence component of the Special Council&rsquos investigation is still cranking away on determining the full dimensions and parameters of Putin&rsquos active measures and cyberwarfare campaign against the US.


The Maskirovka Slips XV: Guccifer 2.0 Is Finally Exposed

SCOOP: An officer with Russia's military intelligence agency made a crucial slip-up in tradecraft &ndash one that revealed his secret identity as Guccifer 2.0. @kpoulsen & I report. https://t.co/unXztJlG2q

&mdash Spencer Ackerman (@attackerman) March 22, 2018

From Spencer Ackerman and Kevin Poulsen at The Daily Beast:

Guccifer 2.0, the &ldquolone hacker&rdquo who took credit for providing WikiLeaks with stolen emails from the Democratic National Committee, was in fact an officer of Russia&rsquos military intelligence directorate (GRU), The Daily Beast has learned. It&rsquos an attribution that resulted from a fleeting but critical slip-up in GRU tradecraft.

That forensic determination has substantial implications for the criminal probe into potential collusion between President Donald Trump and Russia. The Daily Beast has learned that the special counsel in that investigation, Robert Mueller, has taken over the probe into Guccifer and brought the FBI agents who worked to track the persona onto his team.

Mueller&rsquos office declined to comment for this story. But the attribution of Guccifer 2.0 as an officer of Russia&rsquos largest foreign intelligence agency would cross the Kremlin threshold&mdashand move the investigation closer to Trump himself.

Proving that link definitively was harder. Ehmke led an investigation at ThreatConnect that tried to track down Guccifer from the metadata in his emails. But the trail always ended at the same data center in France. Ehmke eventually uncovered that Guccifer was connecting through an anonymizing service called Elite VPN, a virtual private networking service that had an exit point in France but was headquartered in Russia.

Working off the IP address, U.S. investigators identified Guccifer 2.0 as a particular GRU officer working out of the agency&rsquos headquarters on Grizodubovoy Street in Moscow. (The Daily Beast&rsquos sources did not disclose which particular officer worked as Guccifer.)

Security firms and declassified U.S. intelligence findings previously identified the GRU as the agency running &ldquoFancy Bear,&rdquo the ten-year-old hacking organization behind the DNC email theft, as well as breaches at NATO, Obama&rsquos White House, a French television station, the World Anti-Doping Agency, and countless NGOs, and militaries and civilian agencies in Europe, Central Asia, and the Caucasus.

Much, much more at the link. Including a recounting of how the GRU officer posing as Guccifer 2.0&rsquos stolen data was used by Republican campaigns aside from the presidential election. Now that Special Counsel Mueller can tie Guccifer 2.0 directly to the GRU (Russian military intelligence), it means that the counterintelligence portion of his investigation will not be contained just to the presidential campaign. Any Republican campaign official and/or operation any Republican candidate, whether they won their race or not and any conservative group that got and/or used Guccifer 2.0&rsquos stolen Democratic information are highly likely to also be in the Special Counsel&rsquos crosshairs.

As is the case with all the breaking Cambridge Analytica news this week, Ackerman&rsquos and Poulsen&rsquos reporting provides significant new information about another major and significant bridging node in Russia&rsquos active measures and cyberwarfare network. This provides those of us paying attention and following the news reporting on Putin&rsquos Cold War against the US, as well as our allies and partners, important information of who was doing what, when, and on whose behalf. It also tells us that the counterintelligence component of the Special Council&rsquos investigation is still cranking away on determining the full dimensions and parameters of Putin&rsquos active measures and cyberwarfare campaign against the US.


Watch the video: Hook Club. Beach Bar, Club, Καφετέρια, Μπαρ, Αγκίστρι, Κλαμπ, Ποτά, Ροφήματα, Cocktails (June 2022).


Comments:

  1. Dolmaran

    I would like to encourage you to visit a site that has a lot of information on the subject that interests you.

  2. Fekinos

    I think you are making a mistake. I can prove it. Email me at PM, we will talk.

  3. Vasek

    I confirm. And I ran into this. We can communicate on this theme. Here or at PM.



Write a message