Briefing on the Attribution of the WannaCry Malware Attack to North Korea

Briefing on the Attribution of the WannaCry Malware Attack to North Korea

Show Video

Morning, all sorry for being tardy. This morning. I'd. Like to talk to you today about a cyber, issue of significance, in May of this year a dangerous, cyber attack known as one a cry spread. Rapidly and indiscriminately, across the world the. Malware encrypted, and rendered useless hundreds, of thousands of computers and hospitals schools businesses. And homes in over 150, countries, while. Victims receive ransom demands paying those demands, did not unlock their computers, now, this was a careless and reckless attack. It. Affected, individuals. Industry governments, and, the consequences, were beyond economic. The. Computers, affected, badly. In the U in the UK and their health care system put. Lives at risk not just money. After. Careful investigation in, the United States is publicly, attributing, the massive one a cry cyber attacks in North Korea. We. Do not make this allegation, lightly we. Do so with evidence and we do so with partners. Other. Governments and private companies agree, the United Kingdom Australia. Canada. New Zealand and, Japan have, seen our analysis and they join us in denouncing North Korea for one a cry. Commercial. Partners have also acted, Microsoft. Traced the attack the cyber affiliates, of North Korean government and others, in the security community have contributed their analysis. The. Stability of the internet and the security of our computers, is vital to free and fair trade and the fundamental, principles of our Liberty and. Accountability. And cooperation, are the cornerstone, principles, of our cyber security strategy. North. Korea has acted especially especially badly, largely unchecked for more than a decade many, of you have reported on that. It's. Malicious behavior is growing more egregious and stopping that malicious behavior starts, with this. Step of accountability. The. Attribution, is the steps we're talking them accountable but. It's not the last step, addressing. Cyber security threats also requires governments, and businesses to cooperate, to mitigate cyber risk and increase. The cost to hackers by defending America. The. US will lead this effort. President. Trump has rallied allies and responsible, tech companies around the free world to increase the security and resilience of the Internet, cooperation. Between industry and good governments will bring improve security and, we. Can no longer afford to wait. We.

Applaud Our corporate partners Microsoft, and Facebook especially, for. Acting on their own initiative last week without, any direction by the US government or coordination to. Disrupt the activities of North Korean hackers. Microsoft. Acted before the. Attack in ways that spared many US targets. Last. Week Microsoft, and Facebook and, other major tech companies acted. To disable, a number of North Korean cyber exploits, and disrupt their operations as, the. North Koreans, were still infecting, computers across the globe. They. Shut down accounts, the, North Korean regime hackers, used to launch attacks and patched systems. I'm. Extremely proud of, the hard and dedicated, work of the intelligence services and cybersecurity professionals I'm. Very happy today to have one of the finest with me. I'd. Like to introduce Jeanette, Mann for assistant, secretary, for cybersecurity and communications at, DHS. We. Call today I call. Today and the president calls today. On. The private sector to increase its accountability in. The cyber realm by, taking actions that deny North Korea and the. Bad actors the ability to launch reckless, and destructive, cyber acts. As. Responsible, US companies join us in this cooperation, it will fall to Jeanette and her leadership team Chris Krebs secretary, Nielsen they're. In charge literally, of coordinating, the operations. That will protect us. As. We make the internet safer we will continue to hold accountable those who harm us or. Attempt to threaten us whether. They act alone or on behalf of criminal organizations or, hostile nations. With. That turnover Jeanette thank you. Thank. You sir, at. DHS, cybersecurity, is, a core mission of ours and just like preventing, terrorism or responding, to hurricanes, and wildfires it. Is a shared responsibility between. Government. Industry and the American people wanna. Cry is a great example of how this partnership works it began, on May 12th the Friday before Mother's Day we. First learned that something unusual was happening from our partners in the asia-pacific region as, the, Malheur traversed, the globe we received information from, our partners in Europe as the. Day went on and the National Health Service in the UK was impacted, we knew we were dealing with a serious, issue and began to activate our domestic industry, partnership, by. Mid-afternoon I had all of the major Internet, service providers, either on the phone or on our watch floor sharing information with us about what they were seeing globally and in the United States we. Partnered, with the Department of Health and Human Services to reach out to hospitals, across the country to offer assistance we. Engaged with federal CIOs, across our government to ensure that our systems were not vulnerable I, asked. For assistance from our partners in the IT and cybersecurity industry, and by 9:00 p.m. that night I had over 30 companies represented. On calls many. Of whom offered us analytical, assistance, throughout the weekend by. Working closely with these companies in the FBI throughout, that night we were able to issue a technical, alert publicly, that would assist offenders, with defeating this malware we.

Stayed On alert all weekend, but were largely able to escape the impacts here in this country that other countries, experienced, in many. Ways want, a cry was a defining moment and, an inspiring, one it, demonstrated, the tireless commitment of our industry, partners a moment. That showed how the government, and private sector got, it right that our preparation, our investments, in cyber security keeping. Our systems up to date and sharing information paid, off, although. The wanna cry attack demonstrated, our national capability, to effectively, operate and respond we cannot be complacent we. Are seeing increased activity, and sophistication. From both nation states and non-state actors in many, instances, these are the same adversaries, we have faced in the past they're just now operating, in a different space most. Devices, are connecting, to the Internet which broadens, the threat landscape and compounds, the for security practitioners. And, there's no sign of these trans abating in the years to come this, is why cybersecurity, continues. To be one of the most significant, and strategic, risks to the United States in. Addition, to broadening the threat landscape we, see some gaps between, what an entity might consider, adequate, security for themselves or, their sector, and what, is in the public's interest the. American, people depend, upon critical services, and functions such, as electricity, a stable, financial system and dependable, communications. All things, that enable our modern way of life, many, of these are run by the private sector therefore. In order to ensure the security of these services and functions we, rely heavily on public/private collaboration, this. Collaboration, is entirely voluntary and provides, companies, with strong liability. And privacy, protections, should they participate, to. Ensure adequate security, in the private sector DHS, plans to move beyond only offering voluntary, assistance, to more proactively, becoming the world leader in cyber, risk analysis, and intervening, directly with companies when this when necessary, specific. To North Korea we have issued technical, alerts to, assist network, defenders, in understanding. The types of malware that, they are using and urge them to remove them from their systems so that they cannot continue, to have access to our infrastructure, as we, learned during the wanna cry attack these incidents, can have life-threatening, consequences. So. How did we get here the, internet was engineered for interoperability, trust and openness innovation. And automation equals, efficiency, and cost savings but, often times the cost of security which is too commonly, an afterthought, are bolted on aftermarket. Attackers. Only have to be right once but, defenders, have to be right all the time some. Say that defending, cyberspace, is impossible, and that attacks are inevitable, I disagree. With this assumption, we can take small tangible. Actions, to, make the cyber ecosystem. Safer, our, goal is a cyber environment, where a given threat, such as a malicious, email can only be used once before it is blocked by all other potential, victims we. Need to get to the advantage, to the defender, we, make it way too easy for attackers by operating, independently, our, adversaries, are not distinguishing, between public, and private so, neither should we government. And industry must work together. Now more than ever if we are serious about improving our collective, defense we. Cannot secure our homeland alone, a company. Can't single-handedly, defend itself against a nation-state attacker. Cybersecurity. Is a shared responsibility we.

All Play a part in keeping the internet safe to. Prevent another attack like, want to cry we are calling on all companies, to commit to the collective defence of our nation and. This commitment does not end on our borders as identified. In the wanna cry incident cyber security defense is a global challenge as many, as 150, countries had systems infected, by this ransomware, and it is only through international, partnerships, that the United States had time to prepare, therefore. We are working to strengthen our international partnerships, with cyber security sentence, centers across, the world we. Are taking a greater leadership, role in cyber security at DHS, we seek to drive the market toward more secure scalable, and interoperable, solutions, ahead, of us like great challenges, but even greater opportunities. Which, I know we can accomplish by working the catch together thank, you very much. Okay. Question. Sir the. Two, questions, the. United States was. Apparently. A bit slow to. Publicly, identify North. Korea as the culprit and all of this, was. There some new evidence that came to the fore that. Led. To making. This public conclusion. Second. Question is about Marcus, Hutchins, has been identified as, an individual, who helped out, to. Stop. The wanna cry. What's. Gonna happen to him given the fact that he's been locked, up when unrelated, charges will the u.s. interview so. Two questions there one did we do it too slowly no. I'm my answer is no I think the most important thing is to do it right and not to do it fast we. Took a lot of time to look through classified, sensitive. Information, what, we did was rely, on and, some of it I can't share unfortunately. Technical. Links to previously. Identified North Korean cyber tools tradecraft. Operational. Infrastructure, we. Had to examine a lot and, we had to put it together in a way that allowed us to make a confident, attribution, as, we move forward an attribution, becomes, part of our accountability pillar, we, can't do it wrong, we, can't get it wrong we can't try to rush it I think, ultimately at this point if, we had gotten it wrong it would have been more of a damage to our reputation. And national security that would have been a boon for us to do it quicker the. Second question I can't comment on the ongoing criminal. Prosecution. Or. Judicial. Proceedings, there but, I will note that to. Some degree we, got lucky a lot, of ways in the United States we were well-prepared so it wasn't luck it was preparation, it was partnership, with private companies and so forth. But. We also had a programmer, that was sophisticated, that, noticed a, glitch. In the malware a, kill, switch and then acted to kill it he took a risk but. It worked it, caused a lot of a. Lot, of benefit so, we'll give him that next time we're not going to get so lucky so what we're calling on here today is an, increased, partnership, and increased, rapidity, and routine speed, of sharing information so that we can prevent, patient, zero from being patient 150. You. Said, that, cyber, affiliates, within the North Korean government were, responsible, for this North Korea is a fairly. Inclusive. Inclusive. Country, how do you believe generally. That their cyber. Operation. Than they're hacking operations. Would work. How. Does that all piece together in your mind from whatever what. You've been able to entail and secondly, you, talked about one in the private sector to do more, what.

Do You mean exactly what you, want to see how the private sector yes so the, difficulty, in attribution, is often to figure out who was operating the keyboard and on whose behalf and, so those are the two gifts the two biggest challenges people, operating keyboards all over the world on behalf of a North Korean actor can be launching from places that are not in North Korea so that's one of the challenges behind cyber, attribution, we're. Comfortable in this case though that it was directed by the government of North Korea we're, also comfortable, in saying that there were actors on their behalf intermediaries. Carrying out this attack and that they had carried out those types of attacks on behalf of the North Korean government in the past and that was one of the tradecraft. Routines. That allowed us to reach that conclusion that. Said how. They operate is often a little mysterious, if, we knew better with perfect knowledge we would be able to address North Korean problem, with. More clarity and part, of the larger. Strategy. Of increased pressure on North Koreans is to, get. Them to change that behavior I mean my. Observation, they've, got some smart programmers, it's a real shame that their governments leading them down the use of that in the wrong wrong direction if, they have smart people there and a free government they'd be positive. Contributors, to the world I wish that their. Leadership and despots would get out of the way, source. The, majority. Of these, operations, or do you think this comes from actual. I. Don't think there's an outsourcing, distinction, here with the North Korean regime I think that everything that happens in North Korea happens with and by the direction of their leadership. Private. Sector what we're doing here is, improving. Our own ability to work with them so there's two halves to this remember. That what they do is they report to us all the time targeted, attack, vectors that they're seeing we put it together and share it back out with everybody so if you're receiving a. Phishing. Attack and you report it to us we can notify the whole country, to be, on the lookout for that so we want them to increase their sharing, of information with us and then, as we move forward and become more sophisticated in, this administration we're, gonna ask them to look into sharing. More technical. Information on, how they're architected, and where their exposure points are so if we can get a better strategic view with defending ourselves. The. Purpose, of ransomware is to raise money so do you have a sense now of exactly, how much money the North Koreans raised as a result of this and you have any idea what the, money that, it could have fund the nuclear program did it go just to the regime for its own benefit or where, did that money go yeah, it's interesting right there's two conundrums, here at first we don't really know how much money they raised but they didn't seem to architect, it in the way that a smart, ransomware, architect.

Would Do so they, didn't want to get a lot of money out of this if they did they would have opened computers, if you paid once, word got out that paying didn't unlock your computer the payment stopped and so, I, think, that in this case now, this was a reckless attack and, it was meant to cause havoc and destruction the. Money was an ancillary, side. Benefit I don't think they got a lot of it. Two. Things first was the consequence. For this what is I understand that we have to have a collective defence of our nation's now what is the consequence, for the North Korea for doing this well. At this point North, Korea has done everything, wrong as a actor. On the global stage that the country can do and, president Trump has used just about every lever you can use short of starving the people of North Korea to death to, change their behavior so, we don't have a lot of room, left here to imply, pressure to change their behavior it's, nevertheless important, to call them out to let them know that it's them and we know it's them and and. I think at this point some of the benefit that comes from this attribution, is. Letting them know that we're going to move to stop their behavior it, also allows us to galvanize, back to the question previously the private sector in. This case the private sector also acted. Facebook, took down accounts, that stopped, the. Operational, execution. Of ongoing cyber attacks and, Microsoft acted to patch existing. Attacks not just the one to cry attack initially so now this is allowing us to call on, all like-minded. And good responsible, companies to, stop supporting, North. Korean hackers whether they're operating North Korea or elsewhere and it's secondarily, an opportunity, for us to call in the other countries in the region that were affected to mobilize them to stop that same behavior often, North Koreans can travel outside of North Korea to hack where, they can rely on people outside of the country with better access to the Internet to carry out this malicious, activity, and we need other countries, not just other companies, to work with us follow, up on this it seems there's a different, handling, of different intelligence, assessments, first on North Korea there's an elaborate rollout appear, today where you're calling out North Korea by, name for its cyber activities, but take, Russia, for example for interfering, in the u.s. election. Why hasn't there been a similar rollout, like this to, call Russia out for his activities. I'm. Not sure this is all that elaborate but I'll tell you that there was I think President, Obama called him out and, I think for what it's worth and underreported. President Trump not only continued, the national emergency, for cyber security but, he did so himself. And sanctioned, the Russians involved in the hacks of last year and so you. Know I think that that was the appropriate act I think he's continued, that for another year and will probably continue it for the year after that. This. Was this, was, yeah. This was the continuation of, the, national emergency with respect to significant, malicious cyber enabled activities, mm-hmm. President, Trump continued. That national, emergency, pursuant, to the international, emergency. Economic Powers Act, to, deal with the unusual and extraordinary threat, to the National Security foreign. Policy and economy of the United States now. Look in addition if, that's not making people comfortable this, year we acted to remove kaspersky from, all of our federal networks we. Did so because having, a company that can report back information to the Russian government constituted. A risk unacceptable, to our federal networks, in. A spirit of cooperation which, is the second pillar of our strategy accountability. Being one cooperation. Being the second we've, had providers. Sellers. Retail, stores follow suit we've had other private companies and other foreign governments also follow suit with that action I think, we're leading to take bad actors whether they be Russia North, Korea at, times China and Iran off, the internet knocking them off their game and I think today is about North Korea but, I welcome the question on Russia I think we stand with a good record. Sir. Thanks, Don I have a follow-up on that and a separate question, president.

Has Said sort, of casting doubt on the on the, findings, about Russian, interference he said unless you cavity hackers in the act it's very hard to know exactly who. Is, behind it major did the US catches, the North Koreans in the act on this yeah that's that's the key here right so today, took us a little a little while but we did in a thoughtful manner because, we believe now we have the evidence to support this. Assertion it's. Very difficult to do when you're looking for individual hackers or different groups in this case we found a concerted effort secondly. You mentioned. Earlier that, North Korea has, I did especially badly, and he said largely unchecked, for the last decade, now there's been reporting, that the US has actually, acted to combat, North Korean parents. We've taken a cadiz reportedly. Against, their nuclear facilities. Using. Our own capabilities. Obviously. None of that it's being confirmed on the record but when you say largely unchecked on something that sort of undermine the idea that the u.s. is actually taking, action to combat what North Koreans don't know I think President terms made it very clear that his view is that previous, administration's, of both parties could. Have done more and should have done more in his opinion to apply more pressure under North Korea when the opportunity, to do so would have resulted in a better world. And I think at this point the, cyber issue has, come on the heels of his other decisive, actions so it leaves us with little room left to apply. Additional pressure but, we will continue to apply that pressure campaign, without any wavering. David. Thanks. Very much for doing this you take us a little more into, your, attribution. Process here we, said the leadership, of North, Korea. Ordered. This, that's. Not something that would necessarily be, visible from the code itself. Can. You tell us a little bit about that within the limits. Of what, what you can and whether, you believe Kim jong-un was. Directly involved in that decision, you also tell us a little bit about what you think the motive was as you pointed out ransom. Seemed to be sort of a cover story. Chaos. You. Can see that but that's, not the usual North. Korean mo. They usually have something that's a little more, concentrated. In your map shows this, is all over the place in Geneva Japan, places. Right so, tell. Us a little bit about about that and how, how. Attribution. Got you to 1/10 so. Let me go backwards on those of you don't mind address them in reverse order and one of the difficulties, here of. This. Assertion is that it is wanton and reckless and it's also one of the most troubling attributes, of what we've seen in water cry why it's so important for us to treat this one differently the, idea here David is that what. Discriminates, on the map is not the intent of the attacker but, the quality of the defenses and security of the people that they saw to, attack so. The targets in the United States were harder thanks, to people like Jeanette so.

They They were suffering less people, in Russia people in, China took, this one badly some. Sectors in Great Britain took, this one very badly and so their computers weren't defended, properly, in this case or. At least in time I shouldn't say properly we're, all struggling to keep up with this increasingly. Reckless, behavior so, I disagree, that they're looking to be more targeted and more sober, in their calculus I think, at this point North Korea has demonstrated that, they want to hold the entire world at risk whether it be through a nuclear missile program, or through one cyberattacks. Secondly. It's a little tradecraft to get to your second question it's. Hard to find that smoking gun but what we've done here is combined a series of behaviors. We've, got analysts, all over the world but also deep, and experienced, analysts within our intelligence community that, looked at not only the operational infrastructure, but also the tradecraft and, the routine and the behaviors, that we've seen demonstrated, in past attacks and, so you have to apply some gumshoe, work here not just some code analysis. Able. To take advantage of. The vulnerabilities. That got, published, and the shadow. Produce website, do you think that would have made a significant. Difference, in their ability to carry out the attack yeah. So I think, what Dave is alluding to here is that, vulnerabilities. Exist in software they're not almost. Never designed, on purpose software, producers, are making a product and they're selling it for a purpose when, we find vulnerabilities United, States government, we, generally. Identify, them and tell the companies and, so they can patch them in, this particular case I'm fairly proud of that process so I'd like to elaborate under. This president's, leadership and. Under the leadership of Rob Joyce who's serving as my deputy now and the cybersecurity coordinator we've. Led the most transparent. Vulnerabilities. Equity's process, in, the world and what that means is the United States government finds vulnerabilities, in software routinely. And then, at, a rate of almost 90% reveals. Those they. Could be useful, tools for us to then exploit for our own national security benefit, but, instead what we choose to do is share those back with the company so they can patch and increase, the collective, defense of the country it's. Not fair for us to keep those exploits, while, people sit vulnerable to those. Totalitarian. Regimes that are going to bring harm to them so, in this particular case, I'm, proud of the vet program and I'd go one step deeper for, you those. Vulnerabilities. That we do keep we. Keep for very specific purposes, so that we can increase our national security and. We use them for very specific purposes only tailored, to our perceived, threats I think. That they're used very carefully they, need to be protected in such a way that we don't leak. Them out and so bad people can get them that that has happened unfortunately, in the past but.

One Level even deeper when, we do use those vulnerabilities, to develop exploits for the purpose of national security for the classified work that we do we. Sometimes find, evidence, of bad behavior, sometimes. It allows us to attribute bad actions other, times it allows us to privately call, and we're doing this on a regular basis, and we're doing it better and in a more routine fashion as this administration advances. We're. Able to call targets, that aren't subject, to big rollouts, we're, able to call companies and we're able to say to them we believe that you've been hacked, you, need to take immediate action it, works well we need to get better at doing that. And I think that allows us to save a lot of time and money so that, process is, an, equities balancing process I think we've got it right and I know the United States is by far head and shoulders above any other country in the world. Two, things one on a matter of policy, is. This administration's. Policy, that an attack on the US company constitutes. An attack on the US government, how, did you get to that conclusion that it's, clearly. Holding the state of, North Korea responsible. Here so, can you explain that, policy, and then on, digital. Currency I believe, I know you said not much money was raised off this you don't think but, that seems to be sort, of an open spaces that does, appear to me how the hackers, were seeking. Any compensation. Right. What are you doing on that yeah so so any crypto currency might be difficult to track so it's both are good and a positive innovation but also a concern, is we hope it doesn't end, up being used for illicit. Behavior. In. This particular case our assumption, on, then that raising a lot of money comes from our belief that the hackers, hit. Targets, that then reported, to us what they did about it the targets seems, to have reported, to us by and large that that mostly, didn't pay some. Seemed to have tried to pay and then quickly reported to others online and through, other media, that, they weren't getting their computers unlocked and so the others stopped paying does that make sense so now, we're able to track the behavior of the targets in that case. You. Would not have necessarily, had, visibility, into how, those, crypto currency was. Yeah. I'm gonna reserve judgment on that it is a difficulty, that as, a general matter I'm, not sure how we would have tracked cryptocurrency, into, this particular, country so I'll, have to get back on that but, I will say that your.

Last Question is, open it's. Not about holding. A country accountable, it's, about simple culpability, we've. Determined it was behind the attack and we're saying it's. Pretty straightforward it's all I've learned about. Cybersecurity, I learned, in kindergarten we're, gonna hold them accountable and we're gonna say it and. We're going to shame them for it and when we need to increase our collective defenses we're going to cooperate and we're going to try to trust each other more and. I think companies are demonstrating, that trust I think this president's inspiring that kind of trust I think, he's bringing them together in a way that's got. Them feeling like we're on their side and I think it's going to improve our security. You're. Saying an attacking us company, yes constitutes, an attack on US government I'm not saying that that's, not the policy and you're not moving in that direction to make that house that's, not the policy right now. Yes. How, do you expect the core, I spawned after this announcement I. Hope. That they decide to stop behaving badly online, I'm. Not naive and I. Think they'll probably continue, to deny and, to, continue to believe that they're beyond. Repercussions. And beyond consequences. But, I think at some point they're gonna realize that this president in this country and, the Allies that he's rallied unanimously, around this cause will, bring them to change their behavior and, if they don't this presidents gonna act on behalf of the United States and its national security interests, and not the national, security interests of another country I think, he's been, clear on that and I'm glad he's our president that regard. Initially. Interpreted, these, findings how many times he was briefed was he receptive. Or. Did he have any doubts and then secondly. Senator. Lindsey Graham says there was a 30%, chance that the president will have to strike, North Korea and. If they test another nuclear weapon that just to seventy, percent do you dispute, Graham. Sighs yeah, I have. No ability to put a percentage on those, outcomes. I, hate that I hate to do so it. Doesn't seem productive for me to do so, that. Said the president's briefed regularly by, the heads of his intelligence communities and that's how he received this information. Sir.

Sweetie Talked about that percent. Of times when you guys share information, back with companies, rather than exploit. Those vulnerabilities, was, this one of the 10% that you guys had held on to. So. I think there's a there's, a case to be made for the. Tool that was used here being cobbled together from a number of different sources but the vulnerability, that was exploited. The, exploit developed, by the culpable party here is the tool the bad tool but. The underlying vulnerability in, the software that they that. They exploited. Predated. And pre-existed, I. Believe, our administration, taking, power. And. So I don't. Know what they get and where they got it but they certainly had a number of things cobbled together and, a pretty complicated intentional. Tool meant to cause harm that. They didn't entirely create themselves and, part of that allowed us to attribute their. Behavior and their culpability here because we, were able to look at where they got different. Parts and tied them together and how they did so and when they tied them together they use their trade craft and reveal their hand. One. Of the criticisms that came out in late man was. That the, NSA, chose, to afford security holes in operating, systems and, criticized, by, Microsoft's. Brad Smith even Vladimir, Putin. Read. That great this attack provides yet another example. Of why the stockpiling. And vulnerabilities. By government, is such a problem you're. Talking about private, industry, meaning, to stuff in information. Sharing but how much is. The US government, and specifically NSA, to blame for this no not at all and I think that while, the US government needs to better protect its tools and things that leak are very unfortunate, and we need to imply security, measures that prevent that from happening I think. Brad also now appreciates, more and better what, we hold onto and why we hold onto it and in part he appreciates, that more and better because we've made it a transparent, process it's. Something that we addressed and changed under, president, Trump's tenure it's. Something we rolled out and, while. You're quoting people have criticized, this I'll. Tell you back at even the ACLU could complimented. Us for how well that process. You. Taught yourself today Brad Smith is standing with me on this he'll, stand with me on television if you need him to Brad's. A good partner for this country and. Brad has come out in this particular case and joined, us in this attribution, so, I think Microsoft is a strong partner I've absolutely no fear that there's any wedge between us. Give. You short shrift the. Reason I thought I answered it already is in part because mr., singer's question earlier touched, on the Vette process. So, I'll go back what. Brad was talking about at that time during that at the time that quote was made contemporaneous, to that remark. Was his belief that we were not adequately, weighing the different, equities.

In The process, when, we held on to tools that were vulnerabilities. That we discovered, inside the government now. He understands, how that process works, because we've made it transparent we've opened it at the time you made those comments it was not an open and transparent process. As. I said we hold on to about 10% give, or take of the, vulnerabilities, that we find for the purpose of national, security exploitation. Happen. Again you're still doing that and not providing. 100%, we. Don't, we don't use them to attack anyone, indiscriminately. We certainly didn't attack. 150. Countries, and hundreds, of thousands of computers the North Koreans took, a vulnerability, modified. It into a weapon and deployed, it recklessly not, the United States, I'm. Gonna rap that was that can I go the last questions that's. A what, Margaret asked you about crypto currency which we have you here I'm you said it's difficult to track Sarah, had told us a couple weeks ago that you, were monitoring, it what exactly is being monitored, why are you monitoring, it what, is the administration's. Position. On, this seemingly. Booming. Industry. Right here you know yeah we don't have a formal position on blockchain, currencies. And crypto currencies at this point blockchain technologies, operate, in, a way that there's, I guess great hope, and promise they. Also have some. They. Also presents some security, risk and concern for us and so I think, what Sarah meant to tell you is that I track, and monitor this very closely from a security perspective because, among other things I'm not only advising. On cyber policy but also on, counterterrorism. Policy, and so what we want to make sure is. That blockchain. Crypto currencies aren't being used to, support the illicit behaviors in a way that we can't discover but. We have other people in the administration equally. Following it for the promise it provides, economically. And. From a trade perspective, so we, don't have any negative or positive view on it right now but we have to monitor it closely as this new technology, is becoming. Quite. Quite, quite I guess expensive. Lucrative. Regulation. Not. Prepared to say that now thank you. I'll. Tell you what I'll give you a full briefing on Puerto Rico I try, to track it regularly, the administration, is tracking it regularly and as for current trips the Secretary of Homeland Security is there today. Wilson. With the Secretary of Housing and Urban Development housings. A major challenge for us in Puerto Rico the. Governor is doing a great job but, he's got a large problem, here as we move forward with 55%. Of us its, housing population, in informal. Housing our two powers. Making strong recovery we're up over I think 65%, in terms of power restoration which is 65%, of the load capacity, which is a significant. Milestone. We. Were hoping to get to 70 here by, the end of the year so we'll see how that tracks pretty, close to what we set for ourselves a. Target. But, Puerto Rico was on my mind on a regular basis and the president's as well yeah, and he sent Kirsten, and Ben Carson down to, see what's happening thank, you thank you Thanks.


2017-12-25 03:11

Show Video


for some unexplained reason I see a FALSE FLAG????? something about this is like the 'DEFINATE WEAPONS OF MASS DESTRUCTION KNOWLEDGE' PRIOR TO THE ILLEGAL INVASION OF IRAQ???? OH wait, there were no weapons after all but you bombed the crap out of it anyway and killed the leader in the we go again.

I noticed what wannacry demands in one of its sentences "You have not so much time"...who talks like that?

I still don’t believe these guys. .

Mr. Bossert

More docile Press. Must be a vacation.... BIG SHOTS ARE GONE. GOOD

This is an example of what N.Korea will do to challenge, sabotage, infiltrate and destroy American society with the tools they currently have... extrapolate that to their tactics when their nuclear weapon program is complete. Trump's biggest victory will be the neutralize that regime, which has been left to him by former Presidents' cowardice.

the info that it came from NK was'nt the white house, it was Symantec back in May. see

It is a malware that can be acquired and used by any government or agency. Of course NK didnt create it...but they can buy it and implement it. If they ever hope to actually attack us they have to get into our infrastructure and through programs like this they may be probing for access.

She will be good at CSGO... HyperDrive responses

@ 0:48 what was that look she did?

bad bad north korea lol what a load of crap, it comes from the agency as usual

what a joke all I hear is lies.

Oh, waitaminute guys, what about do you remember that one time when the NSA's (or was it CIA's) hacking tools were leaked onto the internet that one time and we found out that the thing can be used to hack somebody's shit then cover tracks to make it look like the hackers were somebody other than the actual hackers and it can be used to frame somebody for hacking somebody? Do you remember that way back when that thing happened not even a year ago? When US Gov. claims "Party A" haxxed "Party B", they have 0.0000% credibility. Sorry nope not buying it guys try again fuckers.

Are you calling on ANONYMOUS hackers? They can get IT DONE!

It should be noted that the exploit package used is widely thought to have been developed by the NSA and retained as an undisclosed exploit package for offensive purposes that was leaked. NSA is retaining vulnerabilities for offensive purposes(and since they are an intelligence agency, they lie about it), and the damage caused by the worm would have been tougher to achieve without them doing this.

She's pretty.

8:05 - Public and private 22:20 - VEP program

DHS? The head of Drugs, weapons and child trafficking, organ harvesting and nuc sales? Hey how's Dyncorp? Ya know the millitary private contractor that does trafficking with G4S? G3S also? Shouldn't they all be in cuffs?

"Wannacry?" Sounds like Democrats.

Just spit it out. Most ransomware, viruses and malware originates from the creators of fake anti-virus or anti-malware software, who're hiding or posing as defenders of devices such as laptops and desktop computers or similar. It's no secret that's the real trick. The origin is coming from the biggest "anti" leaders in the industry, since they can solve the problems, so it's them who created it to begin with. Hegelian Dialectic.

This is probably a part of the narrative for governmental control of more private digital assets

How can the white house even say they know from whom this attack came. I remember a really smart guy, "the best" saying something about the origins of cyber attacks being impossible to determine. It could be n.korea, but it could be some skinny woman standing on a waterbed. And since when does the White House believe any intelligence brought forward by our national security and intelligence agencies??

All I hear is north korea ATTACKED USA.

Why is there no mention about the fact that WannaCry is an offshoot of the NSA spying tool EternalBlue which was stolen a few months ago? Does it really matter where an attack was launched from if the coding itself came from our own security administrations? Does the blame not lay with the NSA for having illegaly created such a tool to spy on private citizens to begin with? I feel like this is a politically weighted witch hunt; if only so they can bomb DPRK :( This is really sad people. Please, before you praise efforts here; understand that this is absolutely inflamatory rhetoric and extremely misleading. *edited for spelling*



Day 61.4 My Visit With Three JTTF Officers Today Why the fuck would JTTF be visiting a private citizen doing a private investigation? Nazi Gestapo whores need to be shut down! JTTF HAS HIT TEAMS AND IS KILLING PEOPLE TESTIFYING AGAINST HILLARY! GET THOSE FUCKERS IN PRISON NOW! STAY AWAY FROM US CITIZENS NAZI WHORES WHO HAVE COMMITTED NO CRIME! JUST THERE AS A THREAT? IF U KILL GW, WE KNOW IT WAS U.

Politico story on trafficking - How is it the NSA and CIA and FBI didn't know used cars were being used for trafficking? I thought the NSA Nazi whores can see all? Yeah they can and they are in on it with everyone else! TRAFFICKING IS BIG BUSINESS AND EVERY US PSYCHO BITCH GOV IS IN ON IT!

"North Korea Ate My Homework" =)

All I want for Christmas is the Deep State dead!


The CIA revealed as the Gestapo of the Vatican’s Fourth Reich.

Judge Contreras's clerk is not entering in George Webb's motion to oppose a dismissal of his case against Awans, DWS and more. Could you arrest the criminal asshole judges of the US that are aiding FBI and CIA in letting criminals go and stealing kids from their parents through CPS for child trafficking to elite to rape, toture vatican! Arrest the fuckers!


U pathetic twits all know that even IF 'wanna cry' or whatever other 'virus of the month' came from North Korea, that is not an excuse 2 mass murder people. Here's a radical concept: Protect your comptuer networks & back them up = DUH!! "Wanna Cry" is basically a 'ransom ware' that encrypts files & then extorts people for an unlock key = all totally irrelevant bull$hit if U simply back up your computer, as EVERYBODY ALWAYS should. And this krap they R pretending is some reason 2 destroy yet another nation... as if there R not already 100 other viruses that do the same thing from all over the planet. How fuking stupid do U think we R Mr. T.?? HAHAHAHA

As long as Kim Jung Un and his supporters in South exist in Korean peninsula, N. Korea Regime will NEVER change. The free world eliminate Kim and Moon ASAP or Strike Pyongyang!

Yes yes your happy cartoon avatar shows how 'honorable' U R 2 want 2 mass murder millions of innocent Asians who never attacked or threatened us =)) Yes yes, saying U will defend yourself if attacked is a 'provocation' HAHAHA

Trump will go down as the greatest president of all time. This economy is about to explode. All those complaining "kids" in college will soon be in an excellent position to start their lives with good jobs, homes, and finally, a family of their own. In the end , that is what they all want so let's get to it. Strap in. The rocket is starting. The markets can feel the energy off this guy. No one. Simply no one is more optimistic and infectiously optimistic than Trump. Thank God we didn't elect Hillary. Could you imagine what would be happening right now? She would be making excuses for a "bad" economy, and yapping about how we need more welfare because there is no hope for jobs. She would be saying goodbye to company after company. America, we just avoided a nightmare of a situation by dumping the junk of the Clintons.

..2001 - They certainly are the "worst generation" of Americans. The "greatest generation" was my Grandfather and the WW2 generation. What we have now is a disgusting mash of wimps, sissies, gays and losers.

ROFL @ 'good jobs & a family', as if 'millenials' even WANT a job or family? Doing what? All those 'social services' type bull$hit non-degrees? As if they even WANT 2 have kids ?? Now THAT's funny =)) Their goal is 2 die, & destroy the world. Don't bother. The 'millenial' generation is a waste of time & it's good they R committing suicide that way because it helps remove their dumb azzes form the gene pool =)

We are taking North Korea. Its a nice place, with beautiful people and traditions. When America takes land, it is gaining and upgrading the life of freedom and what it means to be American. Adding/Gaining a new culture with the originality of it land and traditions.(these are to be kept safe).To free the world of a leader who attacks the American dream, freedoms, and the sanctity in our homes and everyday lives. Is what America is Doing/getting done, and preparing to grow as a nation and take on board/Welcome a original tradition of American. The people of/who live in North Korea. Citizenship. They will make for a better America, better the growth continuing, and we know they have no doubt in respecting freedoms. They will be amazing citizens and contribute greatly. They have amazing potential, and our melting pot of culture will benefit immensely.


They will make America better the growth, and we know they have no doubt in respecting freedoms. They will be amazing citizens and contribute greatly. They have amazing potential, and our melting pot of culture will benefit immensely.

Yankees go to hell ! You'll never get the rare earths from NK ! Fucking warmongers !

Xin chúc các bạn một mùa giáng sinh an lành và hạnh phúc.


There are foreign entities spying on us and hacking citizens. There are foreign countries calling us at our homes pretending to be the IRS and trying to scam us.

Was it crooked hillary she stole neclear materials 20 % and the fby investigate her but still able to run for president she must have some fingers in pies

Billary also defends pedophile rapists, but nobody minds because she shares their goal of exterminating the white race. Every democrat objective always boils down 2: "KILLWHITEY!"

Or is this like the tv show doms day prepers

Is this boasting or protecting the lazzer system i was told about in high school thrè countr9 are involved and can shoot down any missle aimed at the us but like tpo gun and them missile that couldnt be tracked and thd crusies liner got strznd at sea is it another terrorism attack or like jfk

What happened in 911 wasnt there reports that there was going to be an attack there was more than one government agency who knew was it like the a22 b52 bomber shnobolie

How is north kreoa i thought they were dump como countries like England

How can 150 countries have all their computers linked is it utah nsa

Is this the same as when i heard on the radio that china hacked the main frame and Australia government brought 4 billion dollors of us coast gaurd planes to stop their xubs going out to far and now its north korea

English is the hardest language to learn most words are spelt differently to how the words sound and in English there anrnt le or la


Peace be unto you And they shall come from the east and from the west and from the north and from the south and shall sit down in the kingdom of God And behold there are last which shall be first and there are first which shall be last The Lord bless you and keep you The Lord make His face shine upon you And be gracious to you The Lord lift up His countenance upon you And give you peace America The Great and Beloved my sweet Uncle Donald John Trump, The LORD God bless you America The Great and Beloved my sweet Uncle Michael Richard Pence, The LORD God bless you America The Great and Beloved my sweet Sister Sarah Elizabeth Huckabee Sanders, The LORD God bless you America The Great and Beloved my sweet Brother Thomas P. Bossert, The LORD God bless you America The Great and Beloved my sweet Sister Jeanette, The LORD God bless you America The Great and Beloved my sweet Brother Francis Cissna, The LORD God bless you America The Great and Beloved my sweet Uncle John, The LORD God bless you America The Great and Beloved my sweet Uncle John, The LORD God bless you America The Great and Beloved my sweet Uncle Steve, The LORD God bless you America The Great and Beloved my sweet Uncle Dave, The LORD God bless you America The Great and Beloved my sweet Sister April, The LORD God bless you IN GOD WE TRUST GOD BLESS AMERICA THE GREAT FAITH GOD BLESS AMERICA THE GREAT NATION GOD BLESS UNITED STATES OF AMERICA אלוהים יברך את ישראל הכלה של אלוהים a sweet Merry Christmas a sweet and a good Happy New Year with auld lang syne my dear and always lucky with you and me and love and hugs and kiss yuli':):)


What steps is Kim Jong-un taking to tackle this in the DPRK?

Thank you Obama.

Can anyone ever give a presentation without a script anymore? I support Trump, don't get me wrong, but I just wish people could actually speak off the cuff. It shows far more competence.

William Fields

This is a pretext for war. This has to be read from a script, no room for mistakes.

If you want the American people to feel safe,why don't you stop online Islamic terrorist recruitment material? WannaDie is more dangerous than WannaCry!!

Miles Downing:Yeah there are still some BAD ACTORS in the federal government (All are from the"hiLIARy Clinton" group)

Donald Trump killed the internet! Strongest President evah!!!!!!!!!!

Time to drop a MOAB on fat boy.

time for you to grow a brain, or volunteer to go do it yourself. Dumb boy!

Great job. Be alert please. Thanks !!!

Israel created WannaCry, not North Korea. This information is easily findable through a simple Google or youtube search.

& 'wanna cry' ransom is all paid through bitcoin, which is just a stupid pyramid scam backed by WA$TED electricity (so-called 'mining' code B.S.), so might use it as a nifty excuse 2 ban BitCoin & other 'crypto currencies'. The whole concept is a $cam = burning endless power while the people at the top just write in whatever 'wealth' they want 2 steal from the rest who think they 'need' 2 'mine' LOL!! Oh yes I'm sure those running Bitcoin don't have insider tricks 2 create whatever fake transaction history they want & add themselves more 'virtual' coins HAHAHAHA YEESH people R so fuking stupid... bitcoin is a joke.


I have seen this guy before, but why didn't the staff explain who is leading this press briefing and what department he is with? Update: The presenter is Thomas P. Bossert, homeland security adviser to President Trump. He is REALLY good and upfront.


Oh here we take-over of the free uncensored internet as we know and see.

If this is a issue you better think twice. One EMP and our electrical grid goes down, our electronics fry so before we even think about this, we better harden our grid. We'll go from this to the stone age in a blink of a eye...

MrBrymstond not really, renaissance at worst

At 31:20- This reporter provides a classic example of why journalists should have at least some basic knowledge of a topic before they are even allowed entry into certain pressers, let alone be allowed to ask accusatory questions. See how quickly her frustration turns into contempt? Like he was dodging the question, ha ha. When did they lower the bar for journalism qualifications? Since Don Lemmon’s years as an undergraduate, maybe? Whenever it was, it had to be the day of the birth of fake media.

BZ!!! (Well Done)

do they get free internet in NK because for some reason if i dont pay the bill mine gets cut off// who the hell gives them internet?

Jessica Sanders JUST THE FAVORED PEOPLE. the starving people don't have the energy to look at a screen.

Both China and Russia supply North Korea with internet, no clue about the bill.

Why do you people think that we are all stupid. DPRK hack is BS. Do this country a favor and fire yourself.

Pete K CIA is in control of little Kimmy. if he behaves he can have all the cheese he wants

It DOES NOT MATTER who put out 'wanna cry' because the SOLUTION is NOT 2 mass murder Koreans! The SOLUTION is 2 back up your $hit, retards. If U murder every Asian on the planet there R still tons of other people throughout the globe pumping out viruses =P I guess we should just nuke the whole world 2 ash 2 'protect' ourselves? HAHAHA

Oh yeah like O'ButtHole & Billary R better? LOL!!!

Pete K Do this planet a favor and kill yourself.

Pete K oh, Great!! Then tell us all who it was!! (with evidence)

Kill the fucking Gooks...then kill the goddamn negative, no-give-shit, Trump-hating press.

Kaspersky Total Security is great to protect against malware like this.

Robert Marshall good job! Three gold stars

Now if only DJT would side with our intelligence over the word of Putin in regards to Russian meddling.

Cream of the Crop So you trust intelligence regarding every other matter apart from Russian interference?

If you did some real research you would find the dossier was paid for by the DNC, not our government. That means its biased if you were too dense to figure out. Buh bye.

Fake news is that way ->

Lmao. Seriously?


When malware of any kind comes your way and computer is locked, disconnect your battery, unplug your pc. wait a couple seconds restart your pc, and do not i repeat DO NOT go back to the last page where the attack occurred. in fact my battery is permanently dead so simply unplugging has stopped those filthy scumbags from getting one over on me.

those popups are not hard to close. difficulty depends on which browser you use, and what tricks the popup uses to take your screen hostage. in the popup I saw, I could hold ESC while using the mouse to close the popup.

snake jones

louis borselio

deathtrap, I'm not talking about being backed up. I'm talking when a pop up grabs hold of your computer and won't let yo do anything until you call a number and they hold your computer hostage until you pay what they want.

WTF does it matter if your machine is backed up? I've lost WAAAY more data due to bad official hard drive drivers from Micro$oft, & their fuk'd up 'chkdsk' & also from hard drive physical failures than N E virus attack. + if U back up your data (as everybody should) it really doesn't matter. U just swap & copy from a backup & U R up & running again in minutes =) It takes me literally about 3 minutes 2 restore my boot partition from the 'DriveImageXML' program. If U have room, always have at least 2 drives in your system & makes it super fast 2 swap around & restore, etc. If Trump gave a $hit about 'peace & security' he would B holding a press conference about how 2 back up & restore computers, not pretending the 'solution' is 2 mass murder Koreans! iIf U murdered every Asian on Earth there R lots of other people still pumping out viruses all the time.

This is not enough for some malware. Some programs will embed themselves irrevocably into your hard drive.

troopy, my method is 100% effective. never had to cave in to the demands of someone having my computer locked up. so who the fuck are you calling an idiot, IDIOT.

This doesn't even make sense. I pray you are either horribly incompetent as far as current technology goes or mentally handicapped, otherwise you are just an idiot.

louis borselio They don’t have lights I doubt they have many computers What is there to put a virus into? Better to air drop some magazines with pictures of the real world

words to by

China thinks it can use NOKO as a buffer to buy time for reverse development of our technologies while expanding their claim to land and other man made islands...So they can expand their military and launch their own Defense space program...However, we see through this.

Is there something wrong with the Chinese having a strong military? At least they haven't invaded a country under false pretexts like the USA.

Son Gaea Okay child of Light begone now. This page is beneath your understanding. Lmao.

mean must data time the m1

And while we waste more time on such frivolous things that only last for mere generations. The Universe expands further out of grasp.

Why not just shut off internet connectivity to all of North Korea? Seems it would be an appropriate and measured response whether the attacks were launched from NK or no.

Yep, North Korea is a lovely place if you don't need to eat, or see a doctor, or want to be free, or if you're ok with a Cabbage Patch baby being GOD.

Because it has nothing 2 do with 'wanna cry' or N E other 'cyber attack'. They R just farting irrelevant bull$hit same as the 'trump is a Russian agent' krap from the other side. Nobody believes Korea is a threat. The only reason they want them all murdered is because they R not under the thumb of the bank$ter jew$. Kim is HELPING his people. North Korea is a nice place, just don't mock the government. U get thrown in jail if U do the same thing in Turkey, but they R under the (((bank$ter$))) so nobody bombs them. In fact, the NUKES in Turkey they got from the USA! America should B doing BU$INE$$ with Korea, not murdering them. Nuclear proliferation is the key 2 world PEACE, as it keeps people from murdering each other as there is nothing 2 gain from destruction, only PROduction =) Nobody attacks India because they can wipe Jew York off the map, etc.

China would have to do this.

Timothy Garrison true


or whatever

sent some bucket of onions to the border

Ok then, so why don't we send THEM a virus and shut them down :)

Because it would have no effect whatsoever, same way 'wanna cry' is a minor annoyance. If U R a corporation or something & so fuking stupid that U don't even back up your data, U have no business being in business =))

So you wanna give them Justin Beiber? .....mmmm whelp I guess i have no arguments. Carry on

Drop an EMP over their government headquarters and computer companies...

fly a giant candy cane in there with a lot of swatches or something

im thinking that might be the plan tbh it would be constitutional to destroy the device that sent the virus at least. which would probably be their main network. which would cripple them for a while



with good reason!


Wait for when the economic crash happens next year and Italy has a communist revolution.


Because Russia, China, S Korea, Iran, Syria are preparing to attack and invade Europe, the middle East an the Far east.


TheReady500 And you think Trump cares about national security? Why is he arming Saudi Arabia?

Trump/Pence 2020

Unless that fatso ends his coke addiction (coca cola soda all day long =)) he is gonna' catch full dimentia B 4 then. He already slurs things & studders & fumbles. He's rotting out his brain with aspartame. It's mind poison.

God Bless the Trump Administration !!!

Wanna cry? LMAO this is a setup. Whatever soyboy......NEXT!!!!!.......


Don't forget Haley

Hmm... Isn't WannaCry part of the C I A (tool's, see WikiLeaks) that does NOT leave the user's fingerprints behind (inevitably setting up other actor's)? People are becoming less likely to believe this stuff. F B I & C I A Have doomed themselves... Hey wait, maybe they can do what was reported in the #JFKDocs Make it *Look* like Cuba's crops were failing due to "weather" which was one of their idea's, how they could have done that all those decade's ago is crazy ( I have a few idea's on How)! These people chose their interest above the criminals they know about & interests they have, stop the unlawful war's. How can we even belive you after all the crap that's come out... We are BETTER than this!

True. WE ARE better than this; they are not!

Close, but not quite. Most ransomware, viruses and malware originates from the creators of fake anti-virus or anti-malware software, who're hiding or posing as defenders of computers or similar devices. That's the real trick. The actual origin comes from some of the biggest "anti" leaders in the industry, since they can solve the problems, so it's them who create it to begin with. It's called Hegelian Dialectic.

and.....Google has NO agenda?

Speculate much?

Right on,,you nailed it!

follow Q-Anon. rumors says CIA or somegroup connected to CIA is in NK and possibly working with or controlling NK. but thats what i heard is going on. we can only speculate.

keep the Trump train a rolling :)) God bless


Deep state trying to start war with rocketboy to divert attention from the banking/debt crisis.


Americas fight is against the envy and stupidity of communism

I don't buy it! Excuse to demonize N Korea for their agenda! Wake the f-ck up people!

So you fought (or did you) for the corporation,, BFD! You're the idiot then aren't you? Big misfire on the Hillary Boy bit! I hate most politicians,,Trump might get a pass if he pulls his dick out of the dirt!

Friggin idiot, and yeah I'm a Korean Vet. Do something for your country dick head. Sad Hillary boy.

I dont believe anything coming from incompetent biased political warmongering govt officials any more. You're all tainted, FBI #Fakenews losers. Remember Iraq? We do. So wrong it wasnt even funny and you used it as an excuse to INVADE a foreign country. Why should we believe you any more? You lie, you create evidence. You're all biased and not to be trusted. Even if its true that NK is behind Wannacry, I dont want the USGOV to use this excuse to put more sanctions on NK that will only serve to kill more of those poor people, and could start a war. Stand down, stop trying to make us think you're useful. You're not, your a blight on humanity. Stop spying on everyone both foreign and domestic. We dont need your help. You are a discredited organization. Go. Away.


Obviously the smartest dude on the Trump team. Nice to hear more than two syllables

Do something for your country but bitch and moan. I'm sure there is a recruiting station near you. I'm guess your a college boy, letting other men/women do your work.

Never heard of it I call b.s well you can thank msm bit never seen it posted anywhere . And today if it don't come from trusted sources and I wouldn't call white house trusted I would call trump trusted Alex Jones next news network Trump news


Mike M you complete dumb ass.

The woman in green needs to get over herself. There is asking a question and than there is putting on a show..hey look at me..its not about you woman..

President Trump Delivers Remarks on the National Security Strategy has also been posted to my #Twitter Mr. President #DonaldJohnTrump sir. Stay well sir, #God bless, and #GodBlessAmerica. #TheWhiteHouse us

30:00 there is always one piece of shit in the room!!!

Government and private Hubs have that tech already.

Anything emailed coming in to our county should be tested first before spending it out through out our Nation.

Oh yeah, like we need 2 bog down the network by scanning it... so people will then write stuff that tricks it into thinking it's safe N E way =)) The solution is not 'antivirus', but simply 2 back $hit up, & turn off security holes. Scanning is bull$hit unless U plan 2 run a piece of software U downloaded from a suspicious place. Other stuff is much harder 2 get infected through, unless U set active X free 4 all in Explorer or something else 'custom & extra stupid' that is not how it's set out of the box. Also, turn off 'workstation' & other 'connective' things in a PC that U don't need.

That's simply not feasible and it let's the government read effectively all your emails.

Companies need to keep their systems up to date, including Firewalls, Antivirus, etc. They also need to train their employees not to open suspicious emails, nor click on unknown links.

Song for xx amen

So if my friend in Hong Kong emails me, the United States Government should read that email before forwarding it to me? That is a man-in-the-middle attack. The USA doesn't need to become isolationist. Besides, email? Email is not the primary attack vector any more. Routers and security holes in the operating system of PC's, Mac's, IOS, Android, Linux are the common culprits. Breaking into a router can give someone almost complete access to every device on the network. Not only that, many homes and business use IOT devices (internet of things - Amazon Alexa, smart tv, smart security camera, etc) that have poor or non-existent security. Even if the router and your windows/apple machine are secure, the IOT device can become compromised and bring the entire network security into question.

Your comments make it clear that you have no idea how the internet works...

Reporter is wrong, the purpose of ransomware is not always to raise money. The goal was chaos, which was achieved, and the package was simply delivered via ransomware.

Our the American Internet should be owned by America we made it.

Umm... didn't Obama give it over to ICANN? Yeah.

Let him be, he has no clue how the internet works

Was it considered "The Internet" before international connections became part of the original network? "The Internet is the global system of interconnected computer networks ..." "English scientist Tim Berners-Lee invented the World Wide Web in 1989. He wrote the first web browser computer program in 1990 while employed at CERN in Switzerland."

We have a world economy. How would an iron fist about the internet correct anything? These attacks are not due to flaws in the internet protocol. It is because of flaws found in the operating system of Windows, Mac, iPhone IOS, Android, Linux, and to a much Much MUCH greater extent Smart TV's, Smart Lightbulbs, Smart Refrigerators, Smart Security Camera, Smart Thermostats, Smart Assistance Speakers, etc (which have poor or non-existant security).

Yes because only the American terrorist government should be allowed to hack your devices, steal your information and or limit your use of said devices in the name of security, your safety of course.


She lost me when she said public utilities are run by private companies.

+Anne Bradley Its actually best when public utilities are run by contractors (you call them private companies), because the government is not properly built to run businesses or otherwise get things done. Government is innately built to maintain the status quo.

Well, they sometimes are, they are called contractors. For example, my trash is picked up by a private company but the service is charged by the government.

Ying their Yang

Does anyone know the name of this guy at the podium? They did not identify him nor did he introduce himself. But he is exremely articulate and excellent with his answers. I thought he handled the press well. He should help Sarah out once in awhile! :)

Tom Bossert, Homeland Security Advisor.

Yeah maybe it was nk then again we already know that anything in cyberspace can be made to look like it originated feom anywhere else. So.... Who knows? Coulda been soros funded ass hats right here in the U.S.

What a joke. Microsoft is the one who puts all of the holes and vulnerabilities into most computers, to begin with. Microsoft products are malware, in and of themselves.

Big deal, the US does that to every other country.

incompetence at the highest level of our government. fat dumbass trump's regime needs to end.

North Korea? Does that surprise anyone? They are wanting a war with North Korean so badly. Are they exploring all possibilities or are they using their usual narrative? After all, the deep state has a lot of false flags hoping to initiate war with any entity we are willing to believe. Without some kind of disaster, they can't get their hands on the Humanity and Relief funds that foundations give to these countries and cities to help with disasters. It is very sad that these evil people steal this money to enhance their own agendas instead of using it for the better good of the world.

wow WannaCry is some powerful code, im personal impressed, not even server detection for sovereign locations.....hmmm super danger.

If the nasty Koreans did it ... they would`ve bragged already

cia is propping up NK. CIA went rogue

Bitcoin will overtake banks just like email did to post offices, so don’t give up. I started buying BTC when it was $5000, I bought 2BTC at first, I used to Buy and Hold until i came across a testimony about a Trader Bennett Parker that teaches people how to trade and increase their Bitcoins,the first week working with him i increased my 2 BTC to 7BTC, bitcoin will soon be worth $20,000 which means a lot of gain for me, increase the little you have, contact him at

tanku somas beautie ful American white house please killng lif yeares wi sekolah to do des Asx bnafes Allred ✅⭐

Other news