It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
In his attribution of the DNC hack, Dmitri Alperovitch, of Crowdstrike and the Atlantic Council, linked APT28 (Fancy Bear) to previous hacks at TV5 Monde in France and of the Bundestag in Germany: FANCY BEAR (also known as Sofacy or APT 28) is a separate Russian-based threat actor, which has been active since mid 2000s … FANCY BEAR has also been linked publicly to intrusions into the German Bundestag and France’s TV5 Monde TV station in April 2015. Alperovitch’s identification of these two incidents ought to make them of particular interest for re-examination (CA readers will recall that the mention of Peter Gleick in the forged Heartland memo proved important.) In each case, including the DNC hack, attribution of the TV5 Monde and Bundestag hacks resulted in a serious deterioration of relations between Russia and the impacted nation – arguably the major result of each incident. In today’s post, I’ll re-visit the TV5 Monde hack, which took place in April 2015, almost exactly contemporary with the root9B article discussed in Part 1. It proved to be a very interesting backstory.
Since May 2017 Congress made noise about banning Kaspersky products from the U.S. Defense Department and other government entities. In September the Department of Homeland Security order all federal agencies to remove Kaspersky software from their system. Kaspersky Lab makes some 60% of its total revenues in the United States. The DHS order and the resulting press reports will do very serious damage to its business. It will help to sell competing U.S. products. Eugene Kaspersky, the owner of the company, has offered to provide the source code of the products for review by U.S. government specialists. He also offered to testify before Congress. Both to no avail. There is fear mongering, without any evidence, that Kaspersky may cooperate with the Russian government. Similar accusations could be made about any anti-virus product. U.S. and British spies systematically target all anti-virus products and companies: The British spy agency regarded the Kaspersky software in particular as a hindrance to its hacking operations and sought a way to neutralize it. ... An NSA slide describing "Project CAMBERDADA" lists at least 23 antivirus and security firms that were in that spy agency's sights. They include the Finnish antivirus firm F-Secure, the Slovakian firm Eset, Avast software from the Czech Republic. and Bit-Defender from Romania. Notably missing from the list are the American anti-virus firms Symantec and McAfee as well as the UK-based firm Sophos. That the NSA and the British GCHQ did not list U.S. and British made anti-virus products on their "to do" list lets one assume that these packages can already be controlled by them.
Like the Las Vegas thing and how the story seems to change and will probably keep changing until the story settles into a conspiracy to feed out key boards with finger tapping for many years to come like JFK or 911 .
originally posted by: the2ofusr1
a reply to: pavil
The time stamping seems to be a point of entry at Climate Audit on a previous post ... Its not a simple issue that can be explained by me but if you go to Climate Audit you will find a thread there that goes through the in's and out's of the matter with a great discussion about it ...