"ΑΥΛΑΙΑ" ΓΙΑ ΤΗΝ "ΠΟΛΙΤΙΚΗ 2000-2022",ΕΙΚΟΣΙ ΔΥΟ ΟΛΟΚΛΗΡΑ ΧΡΟΝΙΑ ΜΕΤΑ..

"ΑΥΛΑΙΑ" ΓΙΑ ΤΗΝ "ΠΟΛΙΤΙΚΗ 2000-2022",ΕΙΚΟΣΙ ΔΥΟ ΟΛΟΚΛΗΡΑ ΧΡΟΝΙΑ ΜΕΤΑ.. Η Εφημερίδα «ΠΟΛΙΤΙΚΗ 2000-2022» μετά από εικοσιδύο ολόκληρα χρόνια έκδοσης, ολοκλήρωσε τον κύκλο της. Το έτος 2023 δεν θα είναι πια εδώ αλλά εδώ(http://politikinewsaaa.blogspot.com) ως "Η Χρήσιμη Εφημερίδα!!. Ευχαριστούμε από καρδιάς όσους μας αγάπησαν, μας τίμησαν με την απίστευτη αναγνωσιμότητά της, μας εμπιστεύθηκαν και ακόμα το κάνουν έως σήμερα. Ευχαριστούμε όσους συνεργάστηκαν μαζί μας, όσους μας εμπιστεύθηκαν και μας στήριξαν. Με αληθινή, βαθύτατη εκτίμηση προς Ολους Σας… ΓΙΑΝΝΗΣ και ΜΑΡΙΑ ΒΑΒΟΥΡΑΝΑΚΗ

ΠΡΟΣΟΧΗ!! ΔΙΑΚΟΠΤΕΤΑΙ η λειτουργία του παρόντος Ιστολογίου

ΝΕΑ ΔΙΕΥΘΥΝΣΗ: https://politikinewsaaa.blogspot.gr/

ATTENTION!!! NEW ADDRESS for politikinews:

https://politikinewsaaa.blogspot.gr/

ΣΗΜΕΡΙΝΕΣ ΑΝΑΡΤΗΣΕΙΣ: ΠΡΟΣΟΧΗ!! ΔΙΑΚΟΠΤΕΤΑΙ η λειτουργία του παρόντος Ιστολογίου ΝΕΑ ΔΙΕΥΘΥΝΣΗ: https://politikinewsaaa.blogspot.gr/ ATTENTION!!! NEW ADDRESS for politikinews:https://politikinewsaaa.blogspot.gr/
Απαγορεύεται η αναδημοσίευση, αναπαραγωγή, ολική, μερική ή περιληπτική ή κατά παράφραση ή διασκευή ή απόδοση του περιεχομένου του παρόντος διαδικτυακού τόπου σε ό,τι αφορά τα άρθρα της ΜΑΡΙΑΣ ΧΑΤΖΗΔΑΚΗ ΒΑΒΟΥΡΑΝΑΚΗ και του ΓΙΑΝΝΗ Γ. ΒΑΒΟΥΡΑΝΑΚΗ με οποιονδήποτε τρόπο, ηλεκτρονικό, μηχανικό, φωτοτυπικό ή άλλο, χωρίς την προηγούμενη γραπτή άδεια των Αρθρογράφων. Νόμος 2121/1993 - Νόμος 3057/2002, ο οποίος ενσωμάτωσε την οδηγία 2001/29 του Ευρωπαϊκού Κοινοβουλίου και κανόνες Διεθνούς Δικαίου που ισχύουν στην Ελλάδα.

Τετάρτη 20 Δεκεμβρίου 2017

THE WHITE HOUSE's latest


President Donald J. Trump’s First Year of Foreign Policy Accomplishments
Issued on: December 19, 2017

So let this be our mission, and let this be our message to the world: We will fight together, sacrifice together, and stand together for peace, for freedom, for justice, for family, for humanity, and for the almighty God who made us all.

President Donald J. Trump

AN AMERICA FIRST FOREIGN POLICY: President Donald J. Trump has fulfilled his promise to put America First by prioritizing the defense of America’s borders at home and its interests abroad.
President Trump has announced new policies to secure America’s borders:
Set the highest standard ever for United States visa and immigration vetting and adjudications so that the United States can validate traveler identities, prevent fraud, and ensure individuals do not represent a public safety or national security threat
Implemented enhancements that have raised the bar for refugee vetting and screening
Withdrew from negotiations on the Global Compact on Migration to ensure America’s control of its borders

PROTECT THE HOMELAND: President Trump has taken innovative and aggressive action to protect our people and eliminate threats to the homeland at their source.
President Trump has successfully prosecuted the war against ISIS by empowering commanders with broad authority to defeat the terrorist group.
The coalition against ISIS has recaptured over 95 percent of the territory previously held by ISIS in Iraq and Syria, the government of Iraq has liberated its territory from ISIS , and millions have been freed from the terrorist group’s stranglehold.
President Trump has dramatically increased pressure on North Korea to end its WMD and missile programs:
Initiated the toughest sanctions ever on North Korea that cut off 30 percent of its oil imports, and—when combined with previous resolutions—that banned over 90 percent of the country’s exports
Designated North Korea as a State Sponsor of Terror
Pressured China to reduce banking ties to North Korea
Encouraged action against North Korea from countries around the world such as Malaysia, Kuwait, Peru, and Sudan
President Trump took the bold step of declining to certify that what Iran gave up under the nuclear deal was appropriate and proportionate to the benefits it received, while making clear that the United States demands that Iran fully and strictly comply with all of its nuclear-related obligations.
President Trump launched sanctions against 93 Iran-related entities and individuals to counter Iran’s non-nuclear destabilizing behavior.
President Trump called on Pakistan to do more to combat terrorism within its borders.
President Trump has made it clear that the use of chemical weapons will not be tolerated, as demonstrated by his swift and decisive order to strike the Syrian air base responsible for launching the horrific chemical weapons attack on April 4, 2017, in Khan Shaykhun, Syria, killing innocent civilians.

PEACE THROUGH STRENGTH: President Trump is rebuilding our military, and has revitalized international partnerships and prompted our allies to take on a greater share of the burden of collective defense.
President Trump ordered a dramatic rebuilding of the Nation’s crucial military capacities and capabilities and worked with Congress on a defense budget that would reverse the sequester:
Requested and received an additional $21 billion in Department of Defense funding to address urgent readiness shortfalls
Ordered a Nuclear Posture Review to ensure America’s nuclear forces are up to date and serve as a credible deterrent
Ordered $367 million in missile defense investments for fiscal year 2017 and $4 billion for 2018 to defend against the threat of North Korean missiles
Directed the elevation of US CYBERCOM to a unified combatant command, improving leadership, operational effectiveness and resourcing for cyber efforts
President Trump has reinvigorated the National Space Council and reset America’s sights on manned exploration of the solar system.
Spending by NATO on defense has increased 4.3 percent, or $12.4 billion, over the previous year while increased troop contributions to Afghanistan have contributed to the record highest fill rate of 93 percent.
President Trump has worked with partners and allies in the Middle East to enhance counterterrorism cooperation, including through the creation of the U.S.-Gulf Cooperation Council Terrorist Financing Targeting Center and joint sanctions designations of Al al-Qa’ida and ISIS terrorists.
President Trump has reinvigorated our nuclear security cooperation with countries around the world to ensure that terrorists cannot gain access to the materials necessary for producing nuclear weapons.
President Trump refocused America’s strategy in Afghanistan, providing enhanced military resources to fight ISIS and the Taliban, and outlining a conditions-based strategy for peace.
President Trump is working to ensure that our partners and allies have the capabilities they need to fight shared challenges, such as terrorism.
President Trump championed quadrilateral cooperation with Australia, India, and Japan to ensure a free, open, prosperous, and inclusive Indo-Pacific region.

ENHANCING AMERICAN INFLUENCE: President Trump has made historic trips and delivered speeches abroad restoring America’s influence around the world.
On his first trip abroad, President Trump visited the historic homes of three great world religions, meeting with leaders of more than 50 Muslim majority nations in Saudi Arabia, reassuring America’s key ally in Israel, and meeting with the Pope in the Holy See.
President Trump traveled to Europe where he revitalized the NATO alliance and attended meetings of the G-7 and G-20.
In November, President Trump conducted the longest trip to Asia by an American president in 25 years where he rallied Asian nations to maximize pressure on North Korea, outlined his vision for a free and open Indo-Pacific region, and advanced fair and reciprocal trade.
President Trump exhorted Muslim nations to fight extremism in Riyadh, stood up for Western values in Warsaw, faced down the North Korean threat in Seoul, and delivered a clear vision of nation-state sovereignty and principled realism at the United Nations.


Readout of President Donald J. Trump’s Call with Prime Minister Theresa May of the United Kingdom

Issued on: December 19, 2017

President Donald J. Trump spoke today with Prime Minister Theresa May of the United Kingdom. The two leaders exchanged holiday greetings and warm wishes for Christmas and the New Year. The Prime Minister offered her condolences for the tragic train accident in Washington State. The President and Prime Minister discussed next steps in forging peace in the Middle East. Both leaders also emphasized the urgency of addressing the humanitarian crisis in Yemen. President Trump congratulated the Prime Minister on the decision by European Union leaders to move to the second phase of the Brexit negotiations.


Readout of President Donald J. Trump’s Call with of President Shavkat Mirziyoyev of Uzbekistan

Issued on: December 19, 2017


President Donald J. Trump spoke today with President Shavkat Mirziyoyev of Uzbekistan to discuss regional security and to explore opportunities for improved cooperation. President Trump and President Mirziyoyev discussed Uzbekistan’s role in Central Asia, including its support for President Trump’s South Asia strategy and United States efforts in Afghanistan. President Trump noted Uzbekistan’s reform efforts, which will set the conditions for increased trade and improved security against terrorist threats.


Press Briefing on the Attribution of the WannaCry Malware Attack to North Korea
INFRASTRUCTURE & TECHNOLOGY
Issued on: December 19, 2017

James S. Brady Press Briefing Room

9:09 A.M. EST

MR. BOSSERT: Good morning, all. Sorry for being a little tardy this morning. I’d like to talk to you today about a cyber issue of significance.

In May of this year, a dangerous cyberattack known as WannaCry spread rapidly and indiscriminately across the world. The malware encrypted and rendered useless hundreds of thousands of computers in hospitals, schools, businesses, and homes in over 150 countries. While victims received ransom demands, paying those demands did not unlock their computers.

This was a careless and reckless attack. It affected individuals, industry, governments. And the consequences were beyond economic. The computers affected badly in the UK and their healthcare system put lives at risk, not just money.

After careful investigation, the United States is publicly attributing the massive WannaCry cyberattack to North Korea. We do not make this allegation lightly. We do so with evidence, and we do so with partners.

Other governments and private companies agree. The United Kingdom, Australia, Canada, New Zealand, and Japan have seen our analysis, and they join us in denouncing North Korea for WannaCry.

Commercial partners have also acted. Microsoft traced the attack to cyber affiliates of the North Korean government, and others in the security community have contributed their analysis.

The stability of the Internet and the security of our computers is vital to free and fair trade and the fundamental principles of our liberty. And accountability and cooperation are the cornerstone principles of our cybersecurity strategy.

North Korea has acted especially badly, largely unchecked, for more than a decade. Many of you have reported on that. Its malicious behavior is growing more egregious, and stopping that malicious behavior stops with this step of accountability.

The attribution is a step towards holding them accountable, but it’s not the last step. Addressing cybersecurity threats also requires governments and businesses to cooperate to mitigate cyber risk and to increase the cost to hackers by defending America. The U.S. will lead this effort.

President Trump has rallied allies and responsible tech companies around the free world to increase the security and resilience of the Internet. Cooperation between industry and good governments will bring improved security, and we can no longer afford to wait.

We applaud our corporate partners, Microsoft and Facebook especially, for acting on their own initiative last week without any direction by the U.S. government or coordination to disrupt the activities of North Korean hackers. Microsoft acted before the attack in ways that spared many U.S. targets.

Last week, Microsoft and Facebook and other major tech companies acted to disable a number of North Korean cyber exploits and disrupt their operations as the North Koreans were still infecting computers across the globe. They shut down accounts the North Korean regime hackers used to launch attacks and patched systems.

I’m extremely proud of the hard and dedicated work of the intelligence services and cybersecurity professionals. And I’m very happy today to have one of the finest with me.

I’d like to introduce Jeanette Manfra, Assistant Secretary for Cybersecurity and Communications at DHS. We call today — I call today, and the President calls today, on the private sector to increase its accountability in the cyber realm by taking actions that deny North Korea and the bad actors the ability to launch reckless and disruptive cyber acts.

As responsible U.S. companies join us in this cooperation, it will fall to Jeanette and her leadership team — Chris Krebs, Secretary Nielsen. They’re in charge, literally, of coordinating the operations that will protect us.

As we make the Internet safer, we will continue to hold accountable those who harm us or attempt to threaten us, whether they act alone or on behalf of criminal organizations of hostile nations.

With that, I turn it over to Jeanette. Thank you.

ASSISTANT SECRETARY MANFRA: Thank you, sir.

At DHS, cybersecurity is a core mission of ours. And just like preventing terrorism or responding to hurricanes and wildfires, it is a shared responsibility between government, industry, and the American people.

WannaCry is a great example of how this partnership works. It began on May 12th, the Friday before Mother’s Day. We first learned that something unusual was happening from our partners in the Asia-Pacific region. As the malware traversed the globe, we received information from our partners in Europe. As the day went on and the National Health Service in the U.K. was impacted, we knew we were dealing with a serious issue, and began to activate our domestic-industry partnership.

By midafternoon, I had all of the major Internet service providers either on the phone or on our watch floor sharing information with us about what they were seeing globally and in the United States. We partnered with the Department of Health and Human Services to reach out to hospitals across the country to offer assistance. We engaged with federal CIOs across our government to ensure that our systems were not vulnerable. I asked for assistance from our partners in the IT and cybersecurity industry. And by 9:00 p.m. that night, I had over 30 companies represented on calls, many of whom offered us analytical assistance throughout the weekend.

By working closely with these companies and the FBI throughout that night, we were able to issue a technical alert, publicly, that would assist defenders with defeating this malware. We stayed on alert all weekend but were largely able to escape the impacts here in this country that other countries experienced.

In many ways, WannaCry was a defining moment and an inspiring one. It demonstrated the tireless commitment of our industry partners, a moment that showed how the government and private sector got it right; that our preparation, our investments in cybersecurity, keeping our systems up to date, and sharing information paid off.

Although the WannaCry attack demonstrated our national capability to effectively operate and respond, we cannot be complacent. We are seeing increased activity and sophistication from both nation-states and non-state actors. In many instances, these are the same adversaries we have faced in the past. They are just now operating in a different space.

Most devices are connecting to the Internet, which broadens the threat landscape and compounds the challenge for security practitioners. And there is no sign of these trends abating in the years to come. This is why cybersecurity continues to be one of the most significant and strategic risks to the United States.

In addition to broadening the threat landscape, we see some gaps between what an entity might consider adequate security for themselves or their sector and what is in the public’s interest. The American people depend upon critical services and functions, such as electricity, a stable financial system, and dependable communications — all things that enable our modern way of life. Many of these are run by the private sector.

Therefore, in order to ensure the security of these services and functions, we rely heavily on public-private collaboration. This collaboration is entirely voluntary and provides companies with strong liability and privacy protections should they participate.

To ensure adequate security in the private sector, DHS plans to move beyond only offering voluntary assistance to more proactively becoming the world leader in cyber risk analysis and intervening directly with companies when necessary.

Specific to North Korea, we have issued technical alerts to assist network defenders in understanding the types of malware that they’re using, and urge them to remove them from their systems so that they cannot continue to have access to our infrastructure. As we learned during the WannaCry attack, these incidents can have life-threatening consequences.

So how did we get here? The Internet was engineered for interoperability, trust, and openness. Innovation and automation equals efficiency and cost savings, but oftentimes the cost of security, which is too commonly an afterthought or bolted on after-market. Attackers only have to be right once but defenders have to be right all the time.

Some say that defending cyberspace is impossible and that attacks are inevitable. I disagree with this assumption. We can take small tangible actions to make the cyber ecosystem safer. Our goal is a cyber environment where a given threat, such as a malicious e-mail, can only be used once before it is blocked by all other potential victims.

We need to get the advantage to the defender. We make it way too easy for attackers by operating independently. Our adversaries are not distinguishing between public and private, so neither should we. Government and industry must work together now more than ever if we are serious about improving our collective defense. We cannot secure our homeland alone. A company can’t single-handedly defend itself against a nation-state attacker. Cybersecurity is a shared responsibility. We all play a part in keeping the Internet safe.

To prevent another attack like WannaCry, we are calling on all companies to commit to the collective defense of our nation. And this commitment does not end on our borders. As identified in the WannaCry incident, cybersecurity defense is a global challenge. As many as 150 countries had systems infected by this ransomware. And it is only through international partnerships that the United States had time to prepare.

Therefore, we are working to strengthen our international partnerships with cybersecurity centers across the world. We are taking a greater leadership role in cybersecurity at DHS. We seek to drive the market toward more secure, scalable, and interoperable solutions. Ahead of us lie great challenges, but even greater opportunities, which I know we can accomplish by working together.

Thank you very much.

MR. BOSSERT: Thanks, Jeanette. Questions? Sir.

Q Two questions. The United States was apparently a bit slow to publicly identify North Korea at the culprit in all of this. Was there some new evidence that came to the fore that led to making the public conclusion?

The second question is about Marcus Hutchins, who’s been identified as an individual who helped out to stop the WannaCry. What’s going to happen to him, given the fact that he’s been locked up on unrelated charges? Will the U.S. intervene?

MR. BOSSERT: So, two questions there. One, did we do it too slowly? No. My answer is, no. I think the most important thing is to do it right and not to do it fast. We took a lot of time to look through classified, sensitive information. What we did was, rely on — and some of it I can’t share, unfortunately — technical links to previously identified North Korean cyber tools, tradecraft, operational infrastructure. We had to examine a lot. And we had to put it together in a way that allowed us to make a confident attribution.

As we move forward and attribution becomes part of our accountability pillar, we can’t do it wrong. We can’t get it wrong. We can’t try to rush it. I think ultimately, at this point, if we had gotten it wrong, it would have been more of a damage to our reputation and national security than it would have been a boom for us to do it quicker.

The second question, I can’t comment on the ongoing criminal prosecution or judicial proceedings there. But I will note that, to some degree, we got lucky. In a lot of ways, in the United States we were well-prepared. So it wasn’t luck — it was preparation, it was partnership with private companies, and so forth. But we also had a programmer that was sophisticated, that noticed a glitch in the malware, a kill-switch, and then acted to kill it. He took a risk, it worked, and it caused a lot of benefit. So we’ll give him that. Next time, we’re not going to get so lucky.

So what we’re calling on here today is an increased partnership, an increased rapidity in routine speed of sharing information so that we can prevent patient zero from being patient 150.

Q You said that cyber affiliates within the North Korean government were responsible for this. North Korea is a fairly reclusive country. How do you believe, generally, that their cyber operations and their hacking operations work? How does that all piece together, in your mind, from what you’ve been able to tell? And secondly, you talk about wanting the private sector to do more. Exactly what do you want to see out of the private sector?

MR. BOSSERT: So the difficulty in attribution is often to figure out who is operating the keyboard and on whose behalf. And so those are the two biggest challenges. People operating keyboards all over the world on behalf of a North Korean actor can be launching from places that are not in North Korea. And so that’s one of the challenges behind cyber attribution.

We’re comfortable in this case, though, that is was directed by the government of North Korea. We’re also comfortable in saying that there were actors on their behalf, intermediaries, carrying out this attack, and that they had carried out those types of attacks on behalf of the North Korean government in the past. And that was one of the tradecraft routines that allowed us to reach that conclusion.

That said, how they operate is often a little mysterious. If we knew better, with perfect knowledge, we would be able to address the North Korean problem with more clarity. And part of the larger strategy of increased pressure on North Koreans is to get them to change that behavior.

I mean, my observation: They’ve got some smart programmers. It’s a real shame that their government is leading them down — the use of that — in the wrong direction. If they have smart people there and a free government, they would be positive contributors to the world. I wish that their leadership and despots would get out of the way.

Q So do you think they outsource the majority of these operations? Or do you think this comes from within the actual borders and the actual government of North Korea itself?

MR. BOSSERT: Yeah, I don’t think there’s an outsourcing distinction here with the North Korean regime. I think that everything that happens in North Korea happens with, and by, the direction of their leadership.

Q And on the private sector, you want to see them do more?

MR. BOSSERT: The private sector — what we’re doing here is improving our own ability to work with them. So there’s two halves to this. Remember that what they do is they report to us all the targeted attack vectors that they’re seeing. We put it together and share it back out with everybody. So if you’re receiving a phishing attack and you report it to us, we can notify the whole country to be on the lookout for that.

So we want them to increase their sharing of information with us. And then, as we move forward and become more sophisticated in this administration, we’re going to ask them to look into sharing more technical information on how they’re architected and where their exposure points are so we can get a better strategic view of defending ourselves.

Q Tom, the purpose of ransomware is to raise money. So do you have a sense now of exactly how much money the North Koreans raised as a result of this? And do you have any idea what they did with the money? Did it go to fund the nuclear program? Did it go just to the regime for its own benefit? Or where did that money go?

MR. BOSSERT: Yeah, it’s interesting. There’s two conundrums here. First, we don’t really know how much money they raised, but they didn’t seem to architect it in the way that a smart ransomware architect would do. They didn’t want to get a lot of money out of this. If they did, they would have opened computers if you paid. Once word got out that paying didn’t unlock your computer, the payment stopped.

And so I think that, in this case, this was a reckless attack and it was meant to cause havoc and destruction. The money was an ancillary side benefit. I don’t think they got a lot of it.

Q Two things. First, Tom, was is the consequence for this? I understand that we have to have a collective defense of our nation. What is the consequence to North Korea for doing this?

MR. BOSSERT: Well, at this point, North Korea has done everything wrong as an actor on the global stage that a country can do. And President Trump has used just about every lever you can use, short of starving the people of North Korea to death, to change their behavior. And so we don’t have a lot of room left here to apply pressure to change their behavior.

It’s, nevertheless, important to call them out to let them know that it’s them and we know it’s them. And I think, at this point, some of the benefit that comes from this attribution is letting them know that we’re going to move to stop their behavior. It also allows us to galvanize — back to the question previously — the private sector. In this case, the private sector also acted. Facebook took down accounts that stopped the operational execution of ongoing cyberattacks. And Microsoft acted to patch existing attacks, not just the WannaCry attack initially.

So this is allowing us to call on all likeminded and good, responsible companies to stop supporting North Korean hackers, whether they’re operating in North Korea or elsewhere.

And it’s, secondarily, an opportunity for us to call on the other countries in the region that were affected to mobilize them to stop that same behavior. Often, North Koreans can travel outside of North Korea to hack, or they can rely on people outside of the country with better access to the Internet to carry out this malicious activity. And we need other countries, not just other companies, to work with us.

Q So then to follow up on this, it seems like there’s a different handling of different intelligence assessments. First, on North Korea, there’s an elaborate rollout here today where you’re calling out North Korea by name for its cyber activities. But take Russia, for example, for interfering in the U.S. election. Why hasn’t there been a similar rollout like this to call Russia out for its activities?

MR. BOSSERT: I’m not sure this is all that elaborate, but I’ll tell you that there was. I think President Obama called them out. And I think, for what it’s worth and underreported, President Trump not only continued the national emergency for cybersecurity, but he did so himself and sanctioned the Russians involved in the hacks of last year.

And so I think that that was the appropriate act. I think he’s continued that for another year and will probably continue for that year after that.

Q Have all the sanctions been implemented?

MR. BOSSERT: This was — yeah, this was the Continuation of the National Emergency with Respect to Significant Malicious Cyber-Enabled Activities. President Trump continued that national emergency, pursuant to the International Emergency Economic Powers Act, to deal with the “unusual and extraordinary threat to the national security, foreign policy, and economy of the United States.”

Now, look, in addition, if that’s not making people comfortable, this year we acted to remove Kaspersky from all of our federal networks. We did so because having a company that can report back information to the Russian government constituted a risk unacceptable to our federal networks.

In the spirit of cooperation, which is the second pillar of our strategy — accountability being one, cooperation being the second — we’ve had providers, sellers, retail stores follow suit. And we’ve had other private companies and other foreign governments also follow suit with that action.

I think we’re leading to take bad actors — whether they be Russia, North Korea, at times China and Iran — off the Internet and knocking them off their game. And I think today is about North Korea, but I welcome the question on Russia. I think we stand with a good record.

Sir.

Q Thanks, Tom. I have a follow-up on that and a separate question. The President has said — sort of casting doubt on the findings about Russian interference — he said, unless you catch the hackers in the act, it’s very hard to know exactly who is behind it.

MR. BOSSERT: Very true.

Q Did the U.S. catch the North Koreans in the act on this?

MR. BOSSERT: Yeah, that’s the key here, right? So today, it took us a little while, but we did it in a thoughtful manner because we believe now we have the evidence to support this assertion. It’s very difficult to do when you’re looking for individual hackers or different groups. In this case, we found a concerted effort.

Q And then, secondly, you mentioned earlier that North Korea has acted especially badly and, you said, largely unchecked for the last decade. Now there’s been reporting that the U.S. has actually acted to combat North Korean interference; we’ve taken actions, reportedly, against their nuclear facilities, in terms of using our own capabilities. Obviously, none of that is being confirmed on the record, but when you say largely unchecked, doesn’t that sort of undermine the idea that the U.S. has actually taken action to combat what North Korea is doing?

MR. BOSSERT: No, I think President Trump has made it very clear that his view is that previous administrations of both parties could have done more and should have done more, in his opinion, to apply more pressure on North Korea when the opportunity to do so might have resulted in a better world. And I think, at this point, the cyber issue has come on the heels of his other decisive actions. So it leaves us with little room left to apply additional pressure, but we will continue to apply that pressure campaign without any wavering.

David.

Q Thanks very much for doing this. Can you take us a little more into your attribution process here? You said the leadership of North Korea ordered this. That’s not something that would necessarily be visible from the code itself.

MR. BOSSERT: That’s right.

Q Can you tell us a little bit about that within the limits of what you can, and whether you believe Kim Jong-un was directly involved in that decision? Can you also tell us a little bit about what you think the motive was? As you pointed out, ransom seemed to be sort of a cover story. Chaos — I can see that, but that’s not the usual North Korea m.o.; they usually have something that’s a little more concentrated. And your map shows this is all over the place — Indonesia, Japan. So tell us a little bit about that and how attribution got you to intent.

MR. BOSSERT: Yeah, so let go backwards on those, if you don’t mind — address them in reverse order. One of the difficulties here of this assertion is that it is wanton and reckless. And it’s also one of the most troubling attributes of what we’ve seen in WannaCry, and why it’s so important for us to treat this one differently.

The idea here, David, is that what discriminates on the map is not the intent of the attacker, but the quality of the defenses and security of the people that they sought to attack. So the targets in the United States were harder, thanks to people like Jeanette. So they were suffering less.

People in Russia, people in China took this one badly. Some sectors in Great Britain took this one very badly, and so their computers weren’t defended properly, in this case — or at least in time; I shouldn’t say “properly.” We’re all struggling to keep up with this increasingly reckless behavior.

So I disagree that they’re looking to be more targeted and more sober in their calculus. I think at this point, North Korea has demonstrated that they want to hold the entire world at risk, whether it be through a nuclear missile program or through wanton cyberattacks.

Secondly, it’s a little tradecraft, to get to your second question. It’s hard to find that smoking gun, but what we’ve done here is combined a series of behaviors. We’ve got analysts all over the world, but also deep and experienced analysts within our intelligence community that looked at not only the operational infrastructure, but also the tradecraft and the routine and the behaviors that we’ve seen demonstrated in past attacks. And so you have to apply some gumshoe work here, not just some code analysis.

Q Had they not been able to take advantage of the vulnerabilities that got published in the Shadow Brokers website, do you think that would have made a significant difference in their ability to carry out the attack?

MR. BOSSERT: Yeah. So I think what Dave is alluding to here is that vulnerabilities exist in software. They’re not — almost never designed on purpose. Software producers are making a product, and they’re selling it for a purpose. When we find vulnerabilities, the United States government, we generally identify them and tell the companies so they can patch them.

In this particular case, I’m fairly proud of that process, so I’d like to elaborate. Under this President’s leadership and under the leadership of Rob Joyce, who’s serving as my deputy now and the cybersecurity coordinator, we have led the most transparent Vulnerabilities Equities Process in the world.

And what that means is the United States government finds vulnerabilities in software, routinely, and then, at a rate of almost 90 percent, reveals those. They could be useful tools for us to then exploit for our own national security benefit. But instead, what we choose to do is share those back with the companies so that they can patch and increase the collective defense of the country. It’s not fair for us to keep those exploits while people sit vulnerable to those totalitarian regimes that are going to bring harm to them.

So, in this particular case, I’m proud of the VEP program. And I’d go one step deeper for you: Those vulnerabilities that we do keep, we keep for very specific purposes so that we can increase our national security. And we use them for very specific purposes only tailored to our perceived threats. I think that they’re used very carefully. They need to be protected in such a way that we don’t leak them out and so that bad people can get them. That has happened, unfortunately, in the past.

But one level even deeper. When we do use those vulnerabilities to develop exploits for the purpose of national security for the classified work that we do, we sometimes find evidence of bad behavior. Sometimes it allows us to attribute bad actions. Other times it allows us to privately call — and we’re doing this on a regular basis, and we’re doing it better and in a more routine fashion as this administration advances — we’re able to call targets that aren’t subject to big rollouts. We’re able to call companies, and we’re able to say to them, “We believe that you’ve been hacked. You need to take immediate action.” It works well; we need to get better at doing that. And I think that allows us to save a lot of time and money.

So that process is an equities balancing process. I think we’ve got it right. And I know the United States is, by far, head and shoulders above any other country in the world.

Ma’am.

Q Two things. One, on a matter of policy, is this administration’s policy that an attack on a U.S. company constitutes an attack on the U.S. government? How did you get to that conclusion that it’s — you’re clearly holding the state of North Korea responsible here. So can you explain that policy?

And then on digital currency, I believe — I know you said not much money was raised off this, you don’t think — but that seems to be sort of an open space since that does appear to be how the hackers were seeking any compensation.

MR. BOSSERT: Right.

Q What are you doing on that?

MR. BOSSERT: Yeah, so any cryptocurrency might be difficult to track, so it’s both a good and a positive innovation, but also a concern, as we hope it doesn’t end up being used for illicit behavior.

In this particular case, our assumption on them not raising a lot of money comes from our belief that the hackers hit targets that then reported to us what they did about it. The targets seem to have reported to us, by and large, that they mostly didn’t pay. Some seemed to have tried to pay and then quickly reported to others online and through other media that they weren’t getting their computers unlocked, and so the others stopped paying. Does that make sense?

So we were able to track the behavior of the targets in that case.

Q But without that report, you would not have necessarily had visibility into how this cryptocurrency was being used or manipulated?

MR. BOSSERT: Yeah, I’m going to reserve judgment on that. It is a difficulty that, as a general matter, I’m not sure how we would have tracked a cryptocurrency into this particular country. So I’ll have to get back on that.

But I will say that your last question is open — it’s not about holding a country accountable; it’s about simple culpability. We’ve determined who was behind the attack and we’re saying it. It’s pretty straightforward. It’s all I’ve learned about cybersecurity, I learned in kindergarten.

We’re going to hold them accountable, and we’re going to say it. And we’re going to shame them for it. And when we need to increase our collective defenses, we’re going to cooperate and we’re going to try to trust each other more. And I think companies are demonstrating that trust. I think this President is inspiring that kind of trust. I think he’s bringing them together in a way that’s got them feeling like we’re on their side. And I think it’s going to improve our security.

Q Is that why, in this case, you’re saying an attack on U.S. companies constitutes an attack on the U.S. government?

MR. BOSSERT: I’m not saying that.

Q That’s not the policy? And you’re not moving in that direction to make that policy?

MR. BOSSERT: That’s not the policy right now, no.

Q How do you expect North Korea to respond after —

MR. BOSSERT: I’m sorry, can you say it again?

Q Yes. How do you expect North Korea to respond after this announcement?

MR. BOSSERT: I hope that they decide to stop behaving badly online. I’m not naïve, and I think they’ll probably continue to deny and to continue to believe that they’re beyond repercussions and beyond consequences. But I think, at some point, they’re going to realize that this President and this country, and the allies that he’s rallied unanimously around this cause, will bring them to change their behavior.

And if they don’t, this President is going to act on behalf of the United States and its national security interests, and not the national security interests of another country. I think he’s been clear on that, and I’m glad he’s our President in that regard.

Q Can you say how the President initially interpreted these findings — how many times he was briefed? Was he receptive or did he have any doubts? And then, secondly, Senator Lindsey Graham says there’s a 30 percent chance that the President will act to strike North Korea. And if they test another nuclear weapon, that jumps to 70 percent. Do you dispute Graham’s claims?

MR. BOSSERT: Yeah, I have no ability to put a percentage on those outcomes. I’d hate to do so. It doesn’t seem productive for me to do so.

That said, the President is briefed regularly by the heads of his intelligence communities, and that’s how he received this information.

Sir.

Q So you talked about the 90 percent of times when you guys share information back with companies rather than exploit those vulnerabilities. Was this one of the 10 percent that you guys had held onto?

MR. BOSSERT: So I think there’s a case to be made for the tool that was used here being cobbled together from a number of different sources. But the vulnerability that was exploited — the exploit developed by the culpable party here — is the tool, the bad tool. But the underlying vulnerability in the software that they exploited predated and preexisted, I believe, our administration taking power.

And so I don’t know what they got and where they got it, but they certainly had a number of things cobbled together in a pretty complicated, intentional tool meant to cause harm that they didn’t entirely create themselves. And part of that allowed us to attribute their behavior and their culpability here because we were able to look at where they got different parts and tied them together, and how they did so. And when they tied them together, they used their tradecraft and revealed their hand.

Q I just want to follow up on that a little bit. One of the criticisms that came out in late May after this was that the NSA chose to hoard security holes in operating systems. That’s been criticized by Microsoft’s Brad Smith, even Vladimir Putin. Brad Smith writing, “This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem.” You’re talking about private industry needing to step in information sharing, but how much is the U.S. government, specifically the NSA, to blame for this?

MR. BOSSERT: No, not at all. And I think that, while the U.S. government needs to better protect its tools, and things that leak are very unfortunate and we need to apply security measures that prevent that from happening, I think Brad also now appreciates more and better what we hold on to and why we hold onto it. And, in part, he appreciates that more and better, because we made it a transparent process. It’s something that we addressed and changed under President Trump’s tenure. It’s something we’ve rolled out. And while you’re quoting people that have criticized us, I’ll tell you back that even the ACL, complimented us for how well that process rolled out.

Q But this isn’t some small player. This is Microsoft. I mean, you’re talking about —

MR. BOSSERT: Microsoft today — Brad Smith is standing with me on this. He’ll stand with me on television if you need him to. Brad is a good partner for this country. And Brad has come out in this particular case and joined us in this attribution. So I think Microsoft is a strong partner. I have absolutely no fear that there’s any wedge between us.

Q Okay, but you didn’t really answer the question fully, like what I’m trying to get at. You haven’t provided the assurance —

MR. BOSSERT: I believe I did, so let me back up and tell you why I thought I did, ma’am. I didn’t mean to give you short shrift. The reason I thought I answered it already is in part because Mr. Sanger’s question earlier touched on that process. So I’ll go back.

What Brad was talking about at that time, at the time that quote was made contemporaneous to that remark, was his belief that we were not adequately weighing the different equities in the process when we held onto tools, or vulnerabilities, that we discovered inside the government. Now he understands how that process works because we’ve made it transparent and we’ve opened it. At the time he made those comments, it was not an open and transparent process.

Q So we’re still holding onto tools?

MR. BOSSERT: As I said, we hold onto about 10 percent, give or take, of the vulnerabilities that we find for the purpose of national security exploitation.

Q So how does that make the private industry feel comfortable this can’t happen again if you’re still doing that and not providing 100 percent —

MR. BOSSERT: We don’t use them to attack anyone indiscriminately. We certainly didn’t attack 150 countries and hundreds of thousands of computers. The North Koreans took a vulnerability, modified it into a weapon, and deployed it recklessly — not the United States.

I’m going to wrap that —

Q Last question.

MR. BOSSERT: Can I go last question?

Q Yeah, just one more follow-up to what Margaret had asked you about cryptocurrency while we have you have here. You said it’s difficult to track. Sarah had told us a couple of weeks ago that you were monitoring it. What exactly is being monitored, and why are you monitoring it? What is the administration’s position on this seemingly booming industry?

MR. BOSSERT: Yeah, we don’t have a formal position on block-chain currencies and cryptocurrencies at this point. Block-chain technologies operate in a way that there’s, I guess, great hope and promise. They also have some — they also present some security risks and concern for us.

And so I think what Sarah meant to tell you is that I track and monitor this very closely from a security perspective, because among other things, I’m not only advising on cyber policy, but also on counterterrorism policy.

And so what we want to make sure is that block-chain cryptocurrencies aren’t being used to support illicit behaviors in ways that we can’t discover. But we have other people in the administration equally following it for the promise it provides economically and from a trade perspective. So we don’t have any negative or positive view on it right now, but we have to monitor it closely as this new technology is becoming quite, quite, I guess, expensive — lucrative.

Q Does it need regulation?

MR. BOSSERT: Not prepared to say that now. Thank you.

Q How many future trips to Puerto Rico — are you guys (inaudible)?

MR. BOSSERT: I’ll tell you what, I’ll give you a full briefing on Puerto Rico. I try to track it regularly. The administration is tracking it regularly. And as for current trips, the Secretary of Homeland Security is there today, Kirstjen Nielson, with the Secretary of Housing and Urban Development. Housing is a major challenge for us in Puerto Rico. The Governor is doing a great job, but he’s got a large problem here as we move forward with 55 percent of his housing population in informal housing.

Q Power too, obviously?

MR. BOSSERT: Power is making strong recovery. We’re up over, I think, 65 percent in terms of power restoration, which is 65 percent of the load capacity, which is a significant milestone. We’re hoping to get to 70 by the end of the year. So we’ll see how that tracks. Pretty close to what we set for ourselves in an aggressive target. But Puerto Rico is on my mind on a regular basis and the President’s as well. And he sent Kirstjen and Ben Carson down to see what’s happening.

Q Thank you.

MR. BOSSERT: Thank you. Thanks all.

END

9:43 A.M. EST

Δεν υπάρχουν σχόλια:

Δημοσίευση σχολίου

Tι είναι η ΕΦΗΜΕΡΙΔΑ «ΠΟΛΙΤΙΚΗ»..για όσους δεν γνωρίζουν.

Η «ΠΟΛΙΤΙΚΗ» γεννήθηκε το 2000,ως συνέχεια του Περιοδικού «ΑΧΑΡΝΕΩΝ Έργα». Δημιουργήθηκε από Επαγγελματίες Εκδότες με δεκαετίες στον τομέα της Διαφήμισης, των Εκδόσεων και των Δημοσίων Σχέσεων και αρχικά ήταν μια Υπερτοπική Εφημερίδα με κύριο αντικείμενο το Αυτοδιοικητικό Ρεπορτάζ.

Επί χρόνια, κυκλοφορούσε την έντυπη έκδοσή της σε ένα ικανότατο τιράζ (5000 καλαίσθητων φύλλων εβδομαδιαίως) και εντυπωσίαζε με την ποιότητα της εμφάνισης και το ουσιώδες, μαχητικό και έντιμο περιεχόμενο της. Η δύναμη της Πένας της Εφημερίδας, η Ειλικρίνεια, οι Ερευνές της που έφερναν πάντα ουσιαστικό αποτέλεσμα ενημέρωσης, την έφεραν πολύ γρήγορα πρώτη στην προτίμηση των αναγνωστών και γρήγορα εξελίχθηκε σε Εφημερίδα Γνώμης και όχι μόνον για την Περιφέρεια στην οποία κυκλοφορούσε.

=Επι είκοσι δύο (22) χρόνια, στήριζε και στηρίζει τον Απόδημο Ελληνισμό, χωρίς καμία-ούτε την παραμικρή- διακοπή

. =Επί είκοσι δυο ολόκληρα χρόνια, προέβαλε με αίσθηση καθήκοντος κάθε ξεχωριστό, έντιμο και υπεύθυνο Πολιτικό τόσο της Τοπικής όσο και της Κεντρικής Πολιτικής Σκηνής. Στις σελίδες της, θα βρείτε ακόμα και σήμερα μόνο άξιες και χρήσιμες Πολιτικές Προσωπικότητες αλλά και ενημέρωση από κάθε Κόμμα της Ελληνικής Βουλής. Η «ΠΟΛΙΤΙΚΗ» ουδέποτε διαχώρησε τους αναγνώστες της ανάλογα με τα πολιτικά τους πιστεύω. Επραττε και πράττει το καθήκον της, ενημερώνοντας όλους τους Ελληνες, ως όφειλε και οφείλει.

=Επί είκοσι δυο ολόκληρα χρόνια, δίνει βήμα στους αδέσμευτους, τους επιτυχημένους, τους γνώστες και θιασώτες της Αλήθειας. Στηρίζει τον Θεσμό της Ελληνικής Οικογένειας, την Παιδεία, την Ελληνική Ιστορία, προβάλλει με όλες της τις δυνάμεις τους Αδελφούς μας απανταχού της Γης, ενημερώνει για τα επιτεύγματα της Επιστήμης, της Επιχειρηματικότητας και πολλά άλλα που πολύ καλά γνωρίζουν οι Αναγνώστες της.

=Επί είκοσι δύο ολόκληρα χρόνια, ο απλός δημότης –πολίτης, φιλοξενήθηκε στις σελίδες της με μόνη προϋπόθεση την ειλικρινή και αντικειμενική γραφή και την ελεύθερη Γνώμη, η οποία ΟΥΔΕΠΟΤΕ λογοκρίθηκε.

Η ΕΦΗΜΕΡΙΔΑ «ΠΟΛΙΤΙΚΗ», στην σημερινή ηλεκτρονική έκδοσή της, είναι ένα βήμα Ισονομίας και Ισοπολιτείας, έννοιες απόλυτα επιθυμητές, ιδιαιτέρως στις ημέρες μας. Είναι ο δικτυακός τόπος της έκφρασης του πολίτη και της εποικοδομητικής κριτικής, μακριά από κάθε στήριξη αφού δεν τυγχάνει οικονομικής υποστήριξης από Δήμους, Κυβερνήσεις ή όποιους άλλους Δημόσιους ή Ιδιωτικούς Φορείς, δεν έχει χορηγούς, ή οποιασδήποτε μορφής υποστηρικτές. Τυγχάνει όμως του Διεθνούς σεβασμού αφού φιλοξενεί ενημέρωση από αρκετά ξένα Κράτη, πράγμα που της περιποιεί βεβαίως, μέγιστη τιμή.

Η ΕΦΗΜΕΡΙΔΑ «ΠΟΛΙΤΙΚΗ» διέγραψε μια αξιοζήλευτη πορεία και προχώρησε με μοναδική επιτυχία στην ηλεκτρονική παρουσία -με παγκόσμια εμβέλεια- της έκδοσης «ΑΘΥΒΟΛΕΣ 2003-2022», μια φιλόδοξη ΚΡΗΤΙΚΗ Πολιτιστική Παρουσία όχι μόνο για την Κρήτη, όχι μόνο για την Χώρα μας, αλλά όλη την Γη, όπου ζουν και αναπνέουν μοναδικά παιδιά της, οι Κρήτες και οι Κρήσσες της και ανθίζουν σαν λουλούδια τα Ήθη και τα Έθιμά της.

Η Εφημερίδα «ΠΟΛΙΤΙΚΗ» διεκδίκησε και κέρδισε την αποδοχή και τον σεβασμό που της ανήκει, με «εξετάσεις» εικοσιδύο ολόκληρων ετών, με συνεχείς αιματηρούς αγώνες κατά της τοπικής διαπλοκής, με αγώνα επιβίωσης σε πολύ δύσκολους καιρούς, με Εντιμότητα, αίσθηση Καθήκοντος και Ευθύνης.

Acharnon Gordium Bond

Acharnon Gordium Bond
Toπικό Μέσο Μαζικής ενημέρωσης ("θυγατρικό" της "ΠΟΛΙΤΙΚΗ"),ΜΙΑ ΚΡΑΥΓΗ ΠΡΟΣ ΤΗΝ ΕΛΛΗΝΙΚΗ ΔΙΚΑΙΟΣΥΝΗ 170.000 Ελλήνων Πολιτών. Είκοσι ολόκληρα χρόνια ζωής (2000-2021) και αγώνων στην καταγραφή και υπεράσπιση της Αλήθειας για τον πολύπαθο τόπο των Αχαρνών.

Η "ΑΚΤΙΝΟΓΡΑΦΙΑ" ΤΗΣ ΔΙΑΦΘΟΡΑΣ ΣΤΟΝ ΔΗΜΟ ΑΧΑΡΝΩΝ

AΡΘΡΑ «Αcharneon Gordium Bond» blog ΓΙΑ ΤΗΝ ΔΙΑΦΘΟΡΑ στον ΔήμοΑχαρνών

1)ΣΩΜΑ ΕΠΙΘΕΩΡΗΤΩΝ ΔΗΜΟΣΙΑΣ ΔΙΟΙΚΗΣΗΣ: «..ως προς τη λειτουργία του νέου Κοιμητηρίου Δήμου Αχαρνών»

https://politikinews.blogspot.gr/2018/02/blog-post_99.html

2)ΔΗΜΟΣ ΑΧΑΡΝΩΝ: "ΓΙΑΤΙ ΔΕΝ ΜΕΤΑΦΕΡΕΤΑΙ ΤΟ ΑΣΤΥΝΟΜΙΚΟ ΤΜΗΜΑ ΣΤΟ ΛΕΗΛΑΤΗΜΕΝΟ ΣΧΟΛΕΙΟ ΤΗΣ ΑΥΛΙΖΑΣ"; ρωτούν ξανά και ξανά οι δημότες Αχαρνών!ΓΙΑΤΙ ΑΡΑΓΕ;;;

https://politikinews.blogspot.gr/2018/03/blog-post.html

3)ΑΧΑΡΝΕΣ: ΑΙΤΙΟΛΟΓΙΑ ΑΚΥΡΩΣΗΣ ΕΝΤΑΛΜΑΤΟΣ2007 ΓΙΑ ΤΟΝ ΣΩΤΗΡΗ ΝΤΟΥΡΟ

https://politikinews.blogspot.gr/2018/03/2007.html

π.Δημάρχου κ. ΣΩΤΗΡΗ ΝΤΟΥΡΟΥ, προφίλ:

https://politikinews.blogspot.gr/2018/03/blog-post_27.html

ΔΗΜΟΣ ΑΧΑΡΝΩΝ Αcharnes Gordium Bond:απάντηση σε αναγνώστη: -«Γιατί δεν υπάρχουν Εφημερίδες σε μια τόσο μεγάλη πόλη;»

https://politikinews.blogspot.gr/2018/03/charnes-gordium-bond.html

Πως κατασκευάζονται "ένοχοι" ..σενάρια απίστευτα..

https://politikinews.blogspot.gr/2018/03/charnes-gordium-bond-1.html


Άγνωστη έως σήμερα η μοίρα των ΚΟΙΝΣΕΠ που ιδρύθηκαν απο το δίδυμο "ΝΤΟΥΡΟΣ ΚΡΗΜΝΙΑΝΙΩΤΗΣ"

https://politikinews.blogspot.gr/2018/03/acharnon-gordium-bond_84.html

"Acharnes Gordium Bond": απαντήσεις σε αναγνώστες

https://politikinews.blogspot.gr/2018/03/blog-post_49.html

"Acharnon Gordium Bond":επερχόμενο άρθρο με τίτλο "ΔΗΜΟΤΙΚΟΙ ΥΠΑΛΛΗΛΟΙ ΤΟΥ ΔΗΜΟΥ ΑΧΑΡΝΩΝ"

https://politikinews.blogspot.gr/2018/03/acharnon-gordium-bond_14.html

ΑΧΑΡΝΕΣ-Acharnes Gordium Bond:"Ο ΕΠΙΤΡΟΠΟΣ ΕΛΕΓΚΤΙΚΟΥ ΣΥΝΕΔΡΙΟΥ, ΕΙΝΑΙ ΑΤΕΓΚΤΟΣ.." γράφει η ΜΑΡΙΑ ΧΑΤΖΗΔΑΚΗ ΒΑΒΟΥΡΑΝAΚΗ σε ταλαίπωρο αναγνώστη

https://politikinews.blogspot.gr/2018/03/acharne-gordium-bond.html

ΑΧΑΡΝΕΣ-Acharneon Gordium Bond: απάντηση σε αναγνώστη για τον ΚΩΔΙΚΑ ΚΑΤΑΣΤΑΣΗΣ ΠΟΛΙΤΙΚΩΝ-ΔΙΟΙΚΗΤΙΚΩΝ ΥΠΑΛΛΗΛΩΝ και υπαλλήλων Ν.Π.Δ.Δ.

https://politikinews.blogspot.gr/2018/03/acharneon-gordium-bondq.html

ΑΧΑΡΝΕΣ-Acharnon Gordium Bond:Άγνωστη έως σήμερα η μοίρα των ΚΟΙΝΣΕΠ που ιδρύθηκαν απο το δίδυμο "ΝΤΟΥΡΟΣ ΚΡΗΜΝΙΑΝΙΩΤΗΣ"

https://politikinews.blogspot.gr/2018/03/acharnon-gordium-bond_84.html

ΜΑΡΙΑΣ ΧΑΤΖΗΔΑΚΗ ΒΑΒΟΥΡΑΝΑΚΗ Ανοιχτή Επιστολή προς τα μέλη του ΔΗΜΟΤΙΚΟΥ-Διοικητικού Συμβουλίου Αχαρνών με θέμα:"...ΣΧΕΤΙΚΑ ΜΕ ΤΗΝ ΔΙΟΙΚΗΣΗ ΤΟΥ ΔΗΜΟΥ ΑΧΑΡΝΩΝ από τον τ. Δήμαρχο κ. ΣΩΤΗΡΗ ΝΤΟΥΡΟ"

https://politikinews.blogspot.gr/2018/03/blog-post_80.html

Αcharnes Gordium Bond-Για την ΔΙΚΑΙΟΣΥΝΗ και την ΤΙΜΩΡΙΑ ΤΗΣ ΔΙΑΦΘΟΡΑΣ ΣΤΟΝ ΔΗΜΟ ΑΧΑΡΝΩΝ "Σενάριο 1ο: Γράφει η σεναριογράφος Μ.Χ.Β"

https://politikinews.blogspot.gr/2018/03/charnes-gordium-bond-1.html

ΜΑΡΙΑΣ ΧΑΤΖΗΔΑΚΗ ΒΑΒΟΥΡΑΝΑΚΗ ΑΡΘΡΟ ΣΤΟ BLOG THΣ:Η ΦΙΜΩΣΗ ΤΟΥ ΤΟΠΙΚΟΥ ΤΥΠΟΥ ΜΕΓΑΛΗ ΕΠΙΤΥΧΙΑ ΤΟΥ «ΣΥΣΤΗΜΑΤΟΣ» ΤΩΝ ΑΧΑΡΝΩΝ

https://politikinews.blogspot.gr/2018/03/acharneon-gordium-bond-blog.html

ΟΡΓΑΝΩΜΕΝΟ ΔΙΑΧΡΟΝΙΚΟ ΣΧΕΔΙΟ ΚΑΤΑΣΤΡΟΦΗΣ ΤΟΥ ΠΡΑΣΙΝΟΥ ΒΑΡΥΜΠΟΜΠΗΣ-ΠΑΡΝΗΘΑΣ ΑΠΟ ΠΑΣΙΓΝΩΣΤΟΥΣ ΕΓΚΛΗΜΑΤΙΕΣ ΓΗΣ

Το έχω γράψει πολλές φορές και θα το γράψω και τώρα που καίγεται η Βαρυμπόμπη. Το ήξερα, το περίμενα. Οι καταπατητές της περιοχής που δρούν εδώ και δεκάδες χρόνια ανενόχλητοι στην περιοχή της Βαρυμπόμπης δεν έχουν σταματημό, ΑΦΟΥ ΔΕΝ ΕΧΟΥΝ ΚΑΝΕΝΑ ΕΛΕΓΧΟ.

Θέλοντας να πουλήσουν ό,τι ακόμα προλάβουν και ιδιαίτερα «ΔΙΑ ΛΟΓΟΥ» χωρίς συμβόλαια και νόμιμες διαδικασίες, δεν θα αφήσουν ούτε ένα χλωρό φύλλο ούτε στην Βαρυμπόμπη ούτε στην Πάρνηθα. Αυτό που τους εμποδίζει είναι ο χαρακτηρισμός «δασικά» των εκτάσεων και αυτόν θα πολεμήσουν με τον δικό τους «μοναδικό» τρόπο. Οι «κωφοί» του τόπου, τα πουλημένα τομάρια που συναινούν δια της σιωπής τους, ή «μυξοκλαίνε» για τα καμένα δάση έχουν τεράστια ευθύνη. Κανείς δεν τους πιστεύει πια και η Πάρνηθα είναι ΚΑΤΑΔΙΚΑΣΜΕΝΗ αν δεν γίνει κάτι. Από ποιους; Μόνο στον Δένδια έχω αυτή την στιγμή εμπιστοσύνη, σε κανέναν άλλον. Όλα στον τόπο μου ΕΧΟΥΝ ΞΕΠΟΥΛΗΘΕΙ εδώ και 30 χρόνια. Αποχαιρετήστε για πάντα την Πάρνηθα ΑΝ Ο ΝΟΜΟΣ ΔΕΝ ΞΕΚΙΝΗΣΕΙ ΕΔΩ ΚΑΙ ΤΩΡΑ ΕΛΕΓΧΟ ΣΤΙΣ ΠΩΛΗΣΕΙΣ ΤΗΣ ΒΑΡΥΜΠΟΜΠΗΣ, ποιοι τις κάνουν, με ποιο τρόπο, ποιοι ενέχονται, τι περιουσίες έχουν αποκτήσει, πως πουλάνε, τι έχει απομείνει για να πωληθεί.

Και μόνο αν η ΔΙΚΑΙΟΣΥΝΗ κινηθεί ΑΜΕΣΩΣ. Αλλιώς, η Πάρνηθα είναι ήδη ΧΘΕΣ. Όπως και η Βαρυμπόμπη.

ΜΑΡΙΑ ΧΑΤΖΗΔΑΚΗ ΒΑΒΟΥΡΑΝΑΚΗ