Re: Libertarian Economic Logic (chart attached)

2019-09-16 Thread grarpamp
https://www.youtube.com/results?search_query=taxation+is+theft

https://mises.org/books-library


US or Europe

2019-09-16 Thread Yush Bhardwaj
Yesterday I had a debate that US is Worst or Europe when it comes to
monitoring and tracking.

For tracking Europe is best but when it comes to monitoring, noone can beat
US because government spies on their citizens as well.

Anyone give me any resources where I can read or know more about it.

I was told to watch Snowden movie, except that anything any of you know?


Libertarian Economic Logic (chart attached)

2019-09-16 Thread Razer
This... Just this.
Rr
Sent from my Androgyne dee-vice with K-9 Mail

Milton's steganography

2019-09-16 Thread jim bell
Scholar discovers a hidden message in Milton's 'Paradise Lost' 
https://mol.im/a/7468455 via http://dailym.ai/android



Re: "Russia carried out a 'stunning' breach of FBI communications system"

2019-09-16 Thread Razer
Hahaha! So the Russians suck in all the US embassy's rf comms. Man bites dog.! 
Whodathunkit?

On September 16, 2019 4:22:04 PM PDT, coderman  wrote:
>‐‐‐ Original Message ‐‐‐
>On Monday, September 16, 2019 10:57 PM, Razer  wrote:
>...
>
>> "*sigh* As an old spook watcher and ComSec fan, this article
>indicates to me that some kind of shakeup in Russian collection inside
>the U.S. may have happened. But that is all. The authors of this
>article present as ignorant fools with no background knowledge or
>competency of any kind in intelligence studies and related technical
>basics. They simply repeat whatever Big Lie propaganda our spooks feed
>them, because that's what their publisher pays them to do.
>
>related, already being corrected:
>
>https://www.nbcnews.com/politics/national-security/russian-spies-u-s-collected-encrypted-fbi-radio-traffic-huge-n1055001
>
>Russian spies in the U.S. collected encrypted FBI radio traffic in huge
>operation, but did they crack it?
>
>There may not have cracked the codes, but Russian agents gained insight
>into the activities of secret FBI teams tracking Russian operatives in
>the U.S.
>Sept. 16, 2019, 7:54 PM UTC
>By Ken Dilanian and Tom Winter
>
>WASHINGTON — Russian spies in the U.S. conducted a massive operation to
>track and collect encrypted FBI radio traffic, but there is no evidence
>they ever cracked the codes and obtained the contents of the
>communications, two former senior FBI officials tell NBC News.
>
>Nonetheless, the [Russian
>intelligence](https://www.nbcnews.com/news/us-news/possible-ex-russian-spy-cia-living-washington-area-n1051741)
>success, [first reported by Yahoo
>News](https://news.yahoo.com/exclusive-russia-carried-out-a-stunning-breach-of-fbi-communications-system-escalating-the-spy-game-on-us-soil-090024212.html),
>provided Vladimir Putin's government unprecedented insights into the
>activities of secret FBI surveillance teams tracking Russian operatives
>in the U.S., the former officials said. The breach occurred sometime
>around 2010, and was well understood by 2012, the former officials
>said.
>
>Much of the message traffic [the
>Russians](https://www.nbcnews.com/politics/national-security/mueller-report-shows-trump-campaign-left-itself-wide-open-russians-n997716)
>collected was processed in two Russian diplomatic facilities that the
>Obama administration closed in 2016, citing Russia's interference in
>the presidential election.
>
>"We knew that they were on to us in terms of radio traffic," one former
>senior official told NBC News. "They had a huge effort they threw at
>it. But we never saw content."
>
>Yahoo News cited former officials who said the Russians had access to
>"likely the actual substance of FBI communications," but the two former
>officials told NBC News they did not believe that to be true. The two
>former senior officials said they had seen nothing to suggest Russia
>successfully decoded encrypted U.S. government communications. Rather,
>the Russians were able to detect and locate secret FBI radio
>transmissions, they said.
>
>"What they saw was traffic around certain meetings with people who were
>talking to them," one former official said.
>
>In some cases, the insights the Russians gleaned from the location and
>movements of FBI surveillance teams led them to stop meeting with
>sources in the U.S. the former official said.
>
>The former official added that the FBI and CIA learned of the Russian
>success through some espionage successes of their own, which he
>declined to detail.
>
>The Russian operation came at a time when the U.S. was developing its
>own capability to identify covert Russian communications. From March
>through May of 2010, FBI agents in New York were able to detect
>specialized encrypted communications sent from the laptop of a Russian
>spy, [Anna
>Chapman](https://www.nbcnews.com/news/world/spy-who-spurned-me-anna-chapman-refuses-discuss-snowden-proposal-flna8C11292219),
>to a minivan driven by a Russian government official, according to her
>indictment.
>
>Chapman was arrested along with nine other Russians, who were accused
>of acting as a network of sleeper agents sent to live in the U.S. under
>non-official cover. They were deported to Russia in a spy swap.
>
>It was long known that the Russians were using their diplomatic
>compounds in Maryland and New York as listening posts, which is why the
>Obama administration seized them in December 2016, officials said. But
>the CIA and FBI also learned that wives of Russian diplomats were
>working in the facilities to process FBI radio traffic, said the former
>senior official, who had direct knowledge of the matter.
>
>The news of the Russian success comes after revelations that the CIA's
>method of communicating with its informants had been compromised.
>
>NBC News and other organizations reported in 2018 that a secret FBI–CIA
>task force investigating the case of[an American CIA officer spying for

Re: Jim Bell says: "I got stuck in prison for 13 years and Pamela Anderson didn't visit me ONCE!!!"

2019-09-16 Thread jamesd

On 2019-09-12 22:01, John Newman wrote:

I think we can all agree Google is evil, Juan and Razer
despise one another, but most importantly - "cuck" is
a fucking asinine insult. Maybe you meant fuck?


A cuck is someone who is cuckolded, and accepts it, rather than killing 
her or at least ditching her.


To be a man, have to own your women.  It is an accusation of unmanliness.


Re: "Russia carried out a 'stunning' breach of FBI communications system"

2019-09-16 Thread coderman
‐‐‐ Original Message ‐‐‐
On Monday, September 16, 2019 10:57 PM, Razer  wrote:
...

> "*sigh* As an old spook watcher and ComSec fan, this article indicates to me 
> that some kind of shakeup in Russian collection inside the U.S. may have 
> happened. But that is all. The authors of this article present as ignorant 
> fools with no background knowledge or competency of any kind in intelligence 
> studies and related technical basics. They simply repeat whatever Big Lie 
> propaganda our spooks feed them, because that's what their publisher pays 
> them to do.

related, already being corrected:

https://www.nbcnews.com/politics/national-security/russian-spies-u-s-collected-encrypted-fbi-radio-traffic-huge-n1055001

Russian spies in the U.S. collected encrypted FBI radio traffic in huge 
operation, but did they crack it?

There may not have cracked the codes, but Russian agents gained insight into 
the activities of secret FBI teams tracking Russian operatives in the U.S.
Sept. 16, 2019, 7:54 PM UTC
By Ken Dilanian and Tom Winter

WASHINGTON — Russian spies in the U.S. conducted a massive operation to track 
and collect encrypted FBI radio traffic, but there is no evidence they ever 
cracked the codes and obtained the contents of the communications, two former 
senior FBI officials tell NBC News.

Nonetheless, the [Russian 
intelligence](https://www.nbcnews.com/news/us-news/possible-ex-russian-spy-cia-living-washington-area-n1051741)
 success, [first reported by Yahoo 
News](https://news.yahoo.com/exclusive-russia-carried-out-a-stunning-breach-of-fbi-communications-system-escalating-the-spy-game-on-us-soil-090024212.html),
 provided Vladimir Putin's government unprecedented insights into the 
activities of secret FBI surveillance teams tracking Russian operatives in the 
U.S., the former officials said. The breach occurred sometime around 2010, and 
was well understood by 2012, the former officials said.

Much of the message traffic [the 
Russians](https://www.nbcnews.com/politics/national-security/mueller-report-shows-trump-campaign-left-itself-wide-open-russians-n997716)
 collected was processed in two Russian diplomatic facilities that the Obama 
administration closed in 2016, citing Russia's interference in the presidential 
election.

"We knew that they were on to us in terms of radio traffic," one former senior 
official told NBC News. "They had a huge effort they threw at it. But we never 
saw content."

Yahoo News cited former officials who said the Russians had access to "likely 
the actual substance of FBI communications," but the two former officials told 
NBC News they did not believe that to be true. The two former senior officials 
said they had seen nothing to suggest Russia successfully decoded encrypted 
U.S. government communications. Rather, the Russians were able to detect and 
locate secret FBI radio transmissions, they said.

"What they saw was traffic around certain meetings with people who were talking 
to them," one former official said.

In some cases, the insights the Russians gleaned from the location and 
movements of FBI surveillance teams led them to stop meeting with sources in 
the U.S. the former official said.

The former official added that the FBI and CIA learned of the Russian success 
through some espionage successes of their own, which he declined to detail.

The Russian operation came at a time when the U.S. was developing its own 
capability to identify covert Russian communications. From March through May of 
2010, FBI agents in New York were able to detect specialized encrypted 
communications sent from the laptop of a Russian spy, [Anna 
Chapman](https://www.nbcnews.com/news/world/spy-who-spurned-me-anna-chapman-refuses-discuss-snowden-proposal-flna8C11292219),
 to a minivan driven by a Russian government official, according to her 
indictment.

Chapman was arrested along with nine other Russians, who were accused of acting 
as a network of sleeper agents sent to live in the U.S. under non-official 
cover. They were deported to Russia in a spy swap.

It was long known that the Russians were using their diplomatic compounds in 
Maryland and New York as listening posts, which is why the Obama administration 
seized them in December 2016, officials said. But the CIA and FBI also learned 
that wives of Russian diplomats were working in the facilities to process FBI 
radio traffic, said the former senior official, who had direct knowledge of the 
matter.

The news of the Russian success comes after revelations that the CIA's method 
of communicating with its informants had been compromised.

NBC News and other organizations reported in 2018 that a secret FBI–CIA task 
force investigating the case of[an American CIA officer spying for 
China](https://www.nbcnews.com/news/china/cia-china-turncoat-lee-may-have-compromised-u-s-spies-n839316)
 concluded that the Chinese government penetrated the CIA's method of 
clandestine communication with its spies, using that 

Re: Troll Factory game teaches you how fake news is spread & why

2019-09-16 Thread rooty
HI LOLWUT

 Original Message 
On Sep 16, 2019, 1:58 PM, lolwut wrote:

> This is not the correct definition of "trolling". Trolling is a form of 
> online pranking; it is starting arguments, derailing conversations, and 
> making people angry for the troll's own amusement. What is simulated in that 
> little game is more like paid political provocation, which is done for money 
> or politics, but not for the person's own amusement.
>
> There is nothing inherently wrong with the game itself, but they should 
> change the name from "Troll Factory" to something else, and remove all 
> references to "trolling" if they want to keep from looking like ignorant 
> dolts.
>
> -Original Message-
> From: cypherpunks [mailto:cypherpunks-boun...@lists.cpunks.org] On Behalf Of 
> grarpamp
> Sent: Sunday, 15 September, 2019 12:19 AM
> To: cypherpu...@cpunks.org
> Subject: Troll Factory game teaches you how fake news is spread & why
>
> -- Forwarded message --
> From: Jarno Mikael Koponen 
>
> We have here at Yle developed an online game Troll Factory that turns people 
> into professional online trolls in order to help them learn about information 
> wars. You can play the game here: https://trollfactory.yle.fi/
>
> TechCrunch just wrote about the game: This game uses troll tactics to teach 
> critical thinking 
> https://techcrunch.com/2019/09/13/this-game-uses-troll-tactics-to-teach-critical-thinking/
>
> And: https://twitter.com/ilparone/status/1172491208821788673?s=20
>
> Feel free to share! And would love to hear your thoughts! -Jarno M.
>
> Jarno M. Koponen
> Head of AI & Personalization, Yle News Lab
> E: jarno.kopo...@yle.fi
> W: [+358401290074](tel:+358401290074)
> L: https://fi.linkedin.com/in/jarnokoponen
> T: https://twitter.com/ilparone

Git/Mtn for FreeBSD, PGP WoT Sigs, Merkel Hash Tree Based

2019-09-16 Thread grarpamp
For consideration...

SVN really may not offer much in the way of native
internal self authenticating repo to cryptographic levels
of security against bitrot, transit corruption and repo ops,
external physical editing, have much signing options, etc.
Similar to blockchain and ZFS hash merkle-ization,
signing the repo init and later points tags commits,
along with full verification toolset, is useful function.

https://www.monotone.ca/
https://en.wikipedia.org/wiki/Monotone_(software)
https://git-scm.com/
https://en.wikipedia.org/wiki/Git

Maintaining the kernel's web of trust
https://lwn.net/Articles/798230/

Distributing kernel developer PGP keys via pgpkeys.git
https://lkml.org/lkml/2019/8/30/597

Signing patch flow
https://lwn.net/Articles/737093/

Compromised security happens
https://lwn.net/Articles/464233/

https://security.stackexchange.com/questions/67920/how-safe-are-signed-git-tags-only-as-safe-as-sha-1-or-somehow-safer
https://stackoverflow.com/questions/28792784/why-does-git-use-a-cryptographic-hash-function
http://fossil-scm.org/index.html/doc/trunk/www/hashpolicy.wiki
https://ericsink.com/vcbe/html/cryptographic_hashes.html
https://svn.haxx.se/dev/archive-2015-06/0052.shtml
http://git.661346.n2.nabble.com/Verifying-the-whole-repository-td1368311.html
https://shattered.io/
https://www.youtube.com/watch?v=G8wQ88d85s4
https://en.wikipedia.org/wiki/Data_degradation
https://git-scm.com/docs/git-fsck
https://marc.info/?l=git=118143549107708
https://en.wikipedia.org/wiki/Comparison_of_version-control_software
https://en.wikipedia.org/wiki/Deterministic_compilation
https://www.monotone.ca/monotone.html#Trust-Evaluation-Hooks

How does one know their entire copy of repo obtained on
DVD, "mirror", or elsewhere cryptographically
matches the authoritative repo... that any commits
were actually signed off on... or that any reproducible
builds are even reproducing the main repo... etc...
cannot be done without secure crypto infrastructure at
the very core.

"User also knows that even if someone should break into the shared
hosting server and tamper with the database, they won’t be able to
inject malicious code into the project, because all revisions are signed
by the team members, and he has set his Trust Evaluation Hooks so
he doesn’t trust the server key for signing revisions.
In monotone, the important trust consideration is on the signed content,
rather than on the replication path by which that content arrived in your
database."


Note also CVS, which some BSD's still use (ahem: Open, Net),
is even worse than SVN with zero protection
at all in any component regarding this subject.

It really time to migrate repo tech to year 2020.


Re: Russia breached FBI

2019-09-16 Thread Razer



On September 16, 2019 1:38:20 PM PDT, John Young  wrote:
>Rolf Mowatt-Larssen, former head of counterintelligence at the 
>Department of Energy and a former CIA officer who first served in 
>Moscow in the 1980s. "The Russians do everything in the U.S. that we 
>did in Moscow."
>
>

When you're a hammer everything's a nail.

Rr
Sent from my Android device with K-9 Mail. Don't excuse my brevity.


Re: "Russia carried out a 'stunning' breach of FBI communications system"

2019-09-16 Thread Razer
Quoting list member Steve Kinney elsewhere.

I second this analysis:

"*sigh*  As an old spook watcher and ComSec fan, this article indicates to me 
that some kind of shakeup in Russian collection inside the U.S. may have 
happened.  But that is all.  The authors of this article present as ignorant 
fools with no background knowledge or competency of any kind in intelligence 
studies and related technical basics.  They simply repeat whatever Big Lie 
propaganda our spooks feed them, because that's what their publisher pays them 
to do. 

Note the irrelevant and unrelated "Russian Meddling" propaganda narrative 
referenced again and again in the article...

Even if the 'new' information presented is all factual, we learn nothing new at 
all.  

Wikileaks co-founder John Young quotes Rolf Mowatt-Larssen, former head of 
counterintelligence at the Department of Energy and a former CIA officer who 
first served in Moscow in the 1980s: 
"The Russians do everything in the U.S. that we did in Moscow."  



On September 16, 2019 1:21:03 PM PDT, grarpamp  wrote:
>On 9/16/19, Razer  wrote:
>> Know your disinformation sources:
>
>And that the article says you've been witheld from and lied
>to and massively taxed for these games since mid 2000.
>And that it's always about their spies, the "enemy",
>not the exact same immoral shit your own country
>is doing to everyone else around the world.
>
>Nobody cares both sides broke shitty closed source
>Motorola radio crypto long ago, or deployed SDR stingray
>against already public a5/2 cell breaks, or tapped
>internet cables in the neighborhood, or lasered some
>voice off windows, sprinkled USB's in grocery stores,
>sent email attachments, or moled each other out.
>
>The games just keep going decade after decade after
>decade... tit for tat, no real win, no real loss.
>
>Except to you... your privacy, your rights, your money,
>your freedom to freely walk the earth as fellow humans
>without all the needless artificial bullshit of government
>rulers on top of you. And in fact your life as you let them
>start their wars over "spying" and "trade".
>
>Next time try talking with a random... russkie, gringo, chink,
>raghead, spic, shithole, whoever it is each govt tries to ingrain
>other as such as enemy... off the streets of the internet. You'll
>find that once you get past the fake programming of government,
>religion, TV, that they're a general friend, a human, and that you
>have a common enemy over you.

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.

RE: Troll Factory game teaches you how fake news is spread & why

2019-09-16 Thread lolwut
This is not the correct definition of "trolling". Trolling is a form of online 
pranking; it is starting arguments, derailing conversations, and making people 
angry for the troll's own amusement. What is simulated in that little game is 
more like paid political provocation, which is done for money or politics, but 
not for the person's own amusement.

There is nothing inherently wrong with the game itself, but they should change 
the name from "Troll Factory" to something else, and remove all references to 
"trolling" if they want to keep from looking like ignorant dolts.

-Original Message-
From: cypherpunks [mailto:cypherpunks-boun...@lists.cpunks.org] On Behalf Of 
grarpamp
Sent: Sunday, 15 September, 2019 12:19 AM
To: cypherpu...@cpunks.org
Subject: Troll Factory game teaches you how fake news is spread & why

-- Forwarded message --
From: Jarno Mikael Koponen 

We have here at Yle developed an online game Troll Factory that turns people 
into professional online trolls in order to help them learn about information 
wars. You can play the game here: https://trollfactory.yle.fi/

TechCrunch just wrote about the game: This game uses troll tactics to teach 
critical thinking 
https://techcrunch.com/2019/09/13/this-game-uses-troll-tactics-to-teach-critical-thinking/

And: https://twitter.com/ilparone/status/1172491208821788673?s=20

Feel free to share! And would love to hear your thoughts! -Jarno M.

Jarno M. Koponen
Head of AI & Personalization, Yle News Lab
E: jarno.kopo...@yle.fi
W: +358401290074
L: https://fi.linkedin.com/in/jarnokoponen
T: https://twitter.com/ilparone



Re: Russia breached FBI

2019-09-16 Thread John Young
Rolf Mowatt-Larssen, former head of counterintelligence at the 
Department of Energy and a former CIA officer who first served in 
Moscow in the 1980s. "The Russians do everything in the U.S. that we 
did in Moscow."



At 04:31 PM 9/16/2019, you wrote:


Exclusive: Russia breached top-secret FBI communications system
https://news.yahoo.com/exclusive-russia-carried-out-a-stunning-breach-of-fbi-communications-system-escalating-the-spy-game-on-us-soil-090024212.html





Russia breached FBI

2019-09-16 Thread jim bell
Exclusive: Russia breached top-secret FBI communications system
https://news.yahoo.com/exclusive-russia-carried-out-a-stunning-breach-of-fbi-communications-system-escalating-the-spy-game-on-us-soil-090024212.html



Re: "Russia carried out a 'stunning' breach of FBI communications system"

2019-09-16 Thread grarpamp
On 9/16/19, Razer  wrote:
> Know your disinformation sources:

And that the article says you've been witheld from and lied
to and massively taxed for these games since mid 2000.
And that it's always about their spies, the "enemy",
not the exact same immoral shit your own country
is doing to everyone else around the world.

Nobody cares both sides broke shitty closed source
Motorola radio crypto long ago, or deployed SDR stingray
against already public a5/2 cell breaks, or tapped
internet cables in the neighborhood, or lasered some
voice off windows, sprinkled USB's in grocery stores,
sent email attachments, or moled each other out.

The games just keep going decade after decade after
decade... tit for tat, no real win, no real loss.

Except to you... your privacy, your rights, your money,
your freedom to freely walk the earth as fellow humans
without all the needless artificial bullshit of government
rulers on top of you. And in fact your life as you let them
start their wars over "spying" and "trade".

Next time try talking with a random... russkie, gringo, chink,
raghead, spic, shithole, whoever it is each govt tries to ingrain
other as such as enemy... off the streets of the internet. You'll
find that once you get past the fake programming of government,
religion, TV, that they're a general friend, a human, and that you
have a common enemy over you.


"Russia carried out a 'stunning' breach of FBI communications system"

2019-09-16 Thread coderman
https://news.yahoo.com/exclusive-russia-carried-out-a-stunning-breach-of-fbi-communications-system-escalating-the-spy-game-on-us-soil-090024212.html

Exclusive: Russia carried out a 'stunning' breach of FBI communications system, 
escalating the spy game on U.S. soil

Zach Dorfman, Jenna McLaughlin and Sean D. NaylorReporters, Yahoo 
News•September 16, 2019

On Dec. 29, 2016, the Obama administration announced that it was giving nearly 
three dozen Russian diplomats just 72 hours to leave the United States and was 
seizing two rural East Coast estates owned by the Russian government. As the 
Russians burned papers and scrambled to pack their bags, the Kremlin protested 
the treatment of its diplomats, and denied that those compounds — sometimes 
known as the “dachas” — were anything more than vacation spots for their 
personnel.

The Obama administration’s public rationale for the expulsions and closures — 
the harshest U.S. diplomatic reprisals taken against Russia in several decades 
— was to retaliate for Russian meddling in the 2016 presidential election. But 
there was another critical, and secret, reason why those locations and 
diplomats were targeted.

Both compounds, and at least some of the expelled diplomats, played key roles 
in a brazen Russian counterintelligence operation that stretched from the Bay 
Area to the heart of the nation’s capital, according to former U.S. officials. 
The operation, which targeted FBI communications, hampered the bureau’s ability 
to track Russian spies on U.S. soil at a time of increasing tension with 
Moscow, forced the FBI and CIA to cease contact with some of their Russian 
assets, and prompted tighter security procedures at key U.S. national security 
facilities in the Washington area and elsewhere, according to former U.S. 
officials. It even raised concerns among some U.S. officials about a Russian 
mole within the U.S. intelligence community.

“It was a very broad effort to try and penetrate our most sensitive 
operations,” said a former senior CIA official.

American officials discovered that the Russians had dramatically improved their 
ability to decrypt certain types of secure communications and had successfully 
tracked devices used by elite FBI surveillance teams. Officials also feared 
that the Russians may have devised other ways to monitor U.S. intelligence 
communications, including hacking into computers not connected to the internet. 
Senior FBI and CIA officials briefed congressional leaders on these issues as 
part of a wide-ranging examination on Capitol Hill of U.S. counterintelligence 
vulnerabilities.

These compromises, the full gravity of which became clear to U.S. officials in 
2012, gave Russian spies in American cities including Washington, New York and 
San Francisco key insights into the location of undercover FBI surveillance 
teams, and likely the actual substance of FBI communications, according to 
former officials. They provided the Russians opportunities to potentially shake 
off FBI surveillance and communicate with sensitive human sources, check on 
remote recording devices and even gather intelligence on their FBI pursuers, 
the former officials said.

“When we found out about this, the light bulb went on — that this could be why 
we haven’t seen [certain types of] activity” from known Russian spies in the 
United States, said a former senior intelligence official.

The compromise of FBI systems occurred not long after the White House’s 2010 
decision to arrest and expose a group of “illegals” – Russian operatives 
embedded in American society under deep non-official cover – and reflected a 
resurgence of Russian espionage. Just a few months after the illegals pleaded 
guilty in July 2010, the FBI opened a new investigation into a group of New 
York-based undercover Russian intelligence officers. These Russian spies, the 
FBI discovered, were attempting to recruit a ring of U.S. assets — including 
Carter Page, an American businessman who would later act as an unpaid foreign 
policy adviser to Donald Trump’s 2016 presidential campaign.

The breaches also spoke to larger challenges faced by U.S. intelligence 
agencies in guarding the nation’s secrets, an issue highlighted by recent 
revelations, first published by CNN, that the CIA was forced to extract a key 
Russian asset and bring him to the U.S. in 2017. The asset was reportedly 
critical to the U.S. intelligence community’s conclusion that Russian President 
Vladimir Putin had personally directed the interference in the 2016 
presidential election in support of Donald Trump.

Yahoo spoke about these previously unreported technical breaches and the larger 
government debates surrounding U.S. policies toward Russia with more than 50 
current and former intelligence and national security officials, most of whom 
requested anonymity to discuss sensitive operations and internal discussions. 
While the officials expressed a variety of views on what went wrong with