Snowflake charged with felony leaking

Let's make this simple. On what grounds would you have denied her clearance?

It's as simple as the contractor weeding out potential problems with their employees. I bet they wish they would have weeded Reality Winner[lol!] out.

Do you mean to imply it doesn't matter what kinds of political views are held by applicants for a security clearance? You might want to think that through a bit.
 
It's as simple as the contractor weeding out potential problems with their employees. I bet they wish they would have weeded Reality Winner[lol!] out.

Do you mean to imply it doesn't matter what kinds of political views are held by applicants for a security clearance? You might want to think that through a bit.

You didn't answer my question. You didn't even come close.
 
on October 27, they set up an “operational” Gmail account designed to appear as if it belonged to an employee at VR Systems, and used documents*obtained from the previous operation to launch a second spear-phishing operation “targeting U.S. local government organizations.” These emails contained a Microsoft Word document that had been “trojanized” so that when it was opened it would send out a beacon to the “malicious infrastructure” set up by the hackers.
The NSA assessed that this phase of the spear-fishing operation was likely launched on either October 31 or November 1 and sent spear-fishing emails to 122 email addresses “associated with named local government organizations,” probably to*officials “involved in the management of voter registration systems.” The emails contained Microsoft Word attachments purporting to be benign documentation for VR Systems’ EViD voter database product line, but which were in reality maliciously embedded with automated software commands that are triggered instantly and invisibly when the user opens the document. These particular weaponized files used PowerShell, a Microsoft scripting language designed for system administrators and installed by default on Windows computers, allowing vast control over a system’s settings and functions.



https://theintercept.com/2017/06/05...ian-hacking-effort-days-before-2016-election/
 
on October 27, they set up an “operational” Gmail account designed to appear as if it belonged to an employee at VR Systems, and used documents*obtained from the previous operation to launch a second spear-phishing operation “targeting U.S. local government organizations.” These emails contained a Microsoft Word document that had been “trojanized” so that when it was opened it would send out a beacon to the “malicious infrastructure” set up by the hackers.
The NSA assessed that this phase of the spear-fishing operation was likely launched on either October 31 or November 1 and sent spear-fishing emails to 122 email addresses “associated with named local government organizations,” probably to*officials “involved in the management of voter registration systems.” The emails contained Microsoft Word attachments purporting to be benign documentation for VR Systems’ EViD voter database product line, but which were in reality maliciously embedded with automated software commands that are triggered instantly and invisibly when the user opens the document. These particular weaponized files used PowerShell, a Microsoft scripting language designed for system administrators and installed by default on Windows computers, allowing vast control over a system’s settings and functions.



https://theintercept.com/2017/06/05...ian-hacking-effort-days-before-2016-election/

Thank you katsung47.
 
Thank you katsung47.

on October 27, they set up an “operational” Gmail account designed to appear as if it belonged to an employee at VR Systems, and used documents*obtained from the previous operation to launch a second spear-phishing operation “targeting U.S. local government organizations.” These emails contained a Microsoft Word document that had been “trojanized” so that when it was opened it would send out a beacon to the “malicious infrastructure” set up by the hackers.
The NSA assessed that this phase of the spear-fishing operation was likely launched on either October 31 or November 1 and sent spear-fishing emails to 122 email addresses “associated with named local government organizations,” probably to*officials “involved in the management of voter registration systems.” The emails contained Microsoft Word attachments purporting to be benign documentation for VR Systems’ EViD voter database product line, but which were in reality maliciously embedded with automated software commands that are triggered instantly and invisibly when the user opens the document. These particular weaponized files used PowerShell, a Microsoft scripting language designed for system administrators and installed by default on Windows computers, allowing vast control over a system’s settings and functions.



https://theintercept.com/2017/06/05/...2016-election/
 
...detroit...

on October 27, they set up an “operational” Gmail account designed to appear as if it belonged to an employee at VR Systems, and used documents*obtained from the previous operation to launch a second spear-phishing operation “targeting U.S. local government organizations.” These emails contained a Microsoft Word document that had been “trojanized” so that when it was opened it would send out a beacon to the “malicious infrastructure” set up by the hackers.
The NSA assessed that this phase of the spear-fishing operation was likely launched on either October 31 or November 1 and sent spear-fishing emails to 122 email addresses “associated with named local government organizations,” probably to*officials “involved in the management of voter registration systems.” The emails contained Microsoft Word attachments purporting to be benign documentation for VR Systems’ EViD voter database product line, but which were in reality maliciously embedded with automated software commands that are triggered instantly and invisibly when the user opens the document. These particular weaponized files used PowerShell, a Microsoft scripting language designed for system administrators and installed by default on Windows computers, allowing vast control over a system’s settings and functions.



https://theintercept.com/2017/06/05/...2016-election/
 
on October 27, they set up an “operational” Gmail account designed to appear as if it belonged to an employee at VR Systems, and used documents*obtained from the previous operation to launch a second spear-phishing operation “targeting U.S. local government organizations.” These emails contained a Microsoft Word document that had been “trojanized” so that when it was opened it would send out a beacon to the “malicious infrastructure” set up by the hackers.
The NSA assessed that this phase of the spear-fishing operation was likely launched on either October 31 or November 1 and sent spear-fishing emails to 122 email addresses “associated with named local government organizations,” probably to*officials “involved in the management of voter registration systems.” The emails contained Microsoft Word attachments purporting to be benign documentation for VR Systems’ EViD voter database product line, but which were in reality maliciously embedded with automated software commands that are triggered instantly and invisibly when the user opens the document. These particular weaponized files used PowerShell, a Microsoft scripting language designed for system administrators and installed by default on Windows computers, allowing vast control over a system’s settings and functions.



https://theintercept.com/2017/06/05/...2016-election/

How do you go from compromised gmail accounts to compromised voting machines?
 
You didn't answer my question. You didn't even come close.

You ignored my point about private sector employers being free to weed out prospects for having too many freckles...if they want to.

What basis would I deny Reality[lol!] the job? Ok, since we are talking about this person having access to classified information as opposed to janitorial work---I absolutely wouldn't stop at the standard background check. In this day and age you can learn a lot about someone by looking at their social media.

The minute I saw things like #F*****Wall on her Twitter, she's out of here. Next applicant please.

And there's not a thing anyone could do about it.

You're turn: are you saying any Tom, Dick or Mohammed should get a security clearance, regardless of their political views?
 
You ignored my point about private sector employers being free to weed out prospects for having too many freckles...if they want to.

What basis would I deny Reality[lol!] the job? Ok, since we are talking about this person having access to classified information as opposed to janitorial work---I absolutely wouldn't stop at the standard background check. In this day and age you can learn a lot about someone by looking at their social media.

The minute I saw things like #F*****Wall on her Twitter, she's out of here. Next applicant please.

And there's not a thing anyone could do about it.

You're turn: are you saying any Tom, Dick or Mohammed should get a security clearance, regardless of their political views?

Why did you even bother quoting my question to you if all you wanted to do was make a point without answering the question?
 
Back
Top