#TrumpRussia … Agent Orange whines about his lies hoping you won’t notice Kaspersky’s problems

 

the-new-york-times-used-a-full-page-to-print-trumps-lies-since-taking-office_1_.jpg

By ann summers

a full page of the Sunday NY Times was devoted to Trump’s lies

Trump is beginning to get touchy about the tabulation of verifiable lies … as the history of other network shenanigans occurs online and as one can see, it happens synchronously, making collusion not so different from coordination, cooperation, and connection. Winks and nods. And have you yet forgotten all those other issues that are part of the fake-news eco-system, including how social media is only one form of Big Data and a rhetorical attack is only one form of an information commodity whereas hacking can steal many.

In the world of financial crime, the path to election fraud goes through a micro-target wielded by perhaps the same IT personnel and reveals itself in ransomware as but one example, a tool that can also be an instrument of lawfare (see Russian sanctions). At what moment is there non-state and state-sponsored cyber terror when data becomes a security risk (GOP vendors making US voter data accessible on vulnerable servers)

The Trump 2016 campaign and 2017 WH is but a disorganized sign of much more organized criminal networks piggy-backed onto Bigly data manipulation. Sad! is how Agent Orange keeps telling us not to look behind the digital curtain of “The Cyber”. Even if CTs are the result of fuzzy numbers, there is a fuzzy logic that makes Trump more than the product of a smart toaster.

DDavWZvUIAAXYIz_1_.jpg

taxonomy-of-trump-tweets_1_.png
https://www.nytimes.com/interactive/2017/06/23/opinion/trumps-lies.html?smid=tw-nytimes&smtyp=cur

are you distracted … yet

C7Ed_NCXgAg_ruF_1_.jpg
img_1784_1_.jpg
screenshot-from-2017-01-15-13-28-35_1_.png
kaspersky-cyber-event-bali-lurk-04_wd6j_1_.jpg

Who polices the cyberpolice

Cyberthreat real-time map by Kaspersky shows you the real-time attack detected by their various source system.

On-Scanner access

On Demand Scanner

Web Anti-virus

Mail Anti-virus

Intrusion Detection System

Vulnerability Scan

Kaspersky Anti-spam

Botnet Activity detection

1-e0wucf2adndoeflm_ickgg_1_.jpeg

What a Map of the Fake-News Ecosystem Says About the Problem

Jonathan Albright, a professor at Elon University in North Carolina, is an expert in data journalism who has worked for both Google and Yahoo. He specializes in media analytics and social networks, and he has created a network map or topology that describes the landscape of the fake-news ecosystem.

Even if Facebook and Google are the largest distributors of fake news or disinformation because of their size, Albright’s work arguably provides a scientifically-based overview of the supply chain underneath that distribution system. And that could help determine who the largest players are and what their purpose is.

Albright says his research started with a look at the traffic generated by some of the top fake-news distribution sites. As he described in a post published on Medium, he came to the conclusion that banning them from ad networks run by Google or Facebook wouldn’t solve the problem.

That’s because much of the traffic to and from those sites—and therefore their presence at the top of Google’s search engine or high up in the Facebook news feed—is achieved organically, he argued. Many seemed to be driven primarily by sharing through old-fashioned networks. In other words: they’re sent via email.

This led Albright deeper into the traffic-analysis and social mapping process. He tried to determine which of the top sites were driving the most traffic and who else they were connected to via Facebook and Twitter.

More than anything, the impression one gets from looking at Albright’s network map is that there are some extremely powerful “nodes” or hubs that propel a lot of the traffic involving fake news. And it also shows an entire universe of sites that many people have probably never heard of.

r0oPw-kaspersky_crveni_okobar_1_.jpg
Norse-Corp-594638_1_.jpg

Cyber Attack Maps Index

1. Norse

2. Digital Attack Map

3. FireEye

4. SUCURI

5. Wordfence

6. Kaspersky

7. Threat Cloud

8. Trend Micro

9. AKAMAI

fileless-malware1_1_.png

banks, government organizations, telecom companies

 

This entry was posted in 2016 Election, Celebrity, Congress, Conspiracy, Corruption, DOJ, History, Internet, Jurisprudence, Media, NSA, Political Science, Politics, Propaganda, Russia, Society, United States and tagged , , , , , . Bookmark the permalink.

5 Responses to #TrumpRussia … Agent Orange whines about his lies hoping you won’t notice Kaspersky’s problems

  1. I had Kaspersky installed on my computer. Decided it would be beyond stupid to keep it, so deleting it. No anti-virus software is bulletproof, so I use multiple antivirus programs and a VPN.

    It is imperative that all installed programs be compatible, or nothing will work.

    • ann summers says:

      ditto that… learned my lesson with Symantec

    • Terry Welshans says:

      I use Webroot.

      • Webroot has had excellent reviews. I have been running Malwarebytes for a long time. It has never interfered with any other antivirus program that is running on the same computer. I can’t say that for several others. We had an office computer running AVG. When our secretary installed another antivirus program, the computer slowed down more than the old XT I had that ran at 4 MHz. I deleted both of the culprit programs.

        I am using Malwarebytes with Norton’s premium package on the laptop. I used Black Ice when it first came out as freeware. They sold out and it is now BitDefender. I think I am going to install that to replace the Kaspersky.

  2. Terry Welshans says:

    I looked at Kaspersky, but the name was too Russian sounding for me. I looked them up and found the king pin there was ‘ex GRU.’ No such thing as ‘ex GRU’ like there is no such thing as an ‘ex Marine.’

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s