The Machine - Intelligence ArtificE - THYX | FRANK BACON - TAKESCRED / A GRIZZLY STEPPE

in aifammafia •  6 years ago  (edited)

I would give up everything I am for one iota of a chance to be a robot with no loss of consciousness. There mere thought fills me with... despair and ecstasy at the same time. ~R Fox - 2 years ago

REPLY

This song makes me wish true AI was here now. And it was our best friend.
Working together for mutual gain, learning and discovery. ~Extremebehaviour - 11 months ago

Screen Shot 2019-02-01 at 10.15.06 AM.png

This Joint Analysis Report (JAR) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The U.S. Government is referring to this malicious cyber activity by RIS as GRIZZLY STEPPE.

Screen Shot 2019-02-01 at 3.30.42 PM.png

Previous JARs have not attributed malicious cyber activity to specific countries or threat actors. However, public attribution of these activities to RIS is supported by technical indicators from the U.S. Intelligence Community, DHS, FBI, the private sector, and other entities. This determination expands upon the Joint Statement released October 7, 2016, from the Department of Homeland Security and the Director of National Intelligence on Election Security.

Screen Shot 2019-01-30 at 10.03.14 PM.png

This activity by RIS is part of an ongoing campaign of cyber-enabled operations directed at the U.S. government and its citizens. These cyber operations have included spearphishing campaigns targeting government organizations, critical infrastructure entities, think tanks, universities, political organizations, and corporations leading to the theft of information. In foreign countries, RIS actors conducted damaging and/or disruptive cyber-attacks, including attacks on critical infrastructure networks. In some cases, RIS actors masqueraded as third parties, hiding behind false online personas designed to cause the victim to misattribute the source of the attack. This JAR provides technical indicators related to many of these operations, recommended mitigations, suggested actions to take in response to the indicators provided, and information on how to report such incidents to the U.S. Government.

SteemIt1.png

BUILD your OWN ADventure!

frAnkbaCon

JiveNeviL

Hamilton6886notlimaH

AI-FAM*MAF-IA

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

Testes testes 1, 2... 3?

Posted using Partiko Messaging