Bill Boone's Avatar

Bill Boone

@whboone.bsky.social

Dad, Dem, golfer, wine, chocolate

141 Followers  |  78 Following  |  23 Posts  |  Joined: 09.02.2024  |  2.3907

Latest posts by whboone.bsky.social on Bluesky

Although I’m quite upset with the Dems capitulation, it’s still TIME TO RELEASE THE EPSTEIN FILES!!!!

10.11.2025 10:49 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Prime example of white privilege in plain sight.

Black kids get called adults to justify blame, while white adults get called β€œkids” to excuse their hate. They’re not boys and girls, they’re grown-ass men and women, and the receipts are in writing.

20.10.2025 02:03 β€” πŸ‘ 20416    πŸ” 7292    πŸ’¬ 1259    πŸ“Œ 463
Preview
a rainbow colored shooting star with the words the mo you know above it ALT: a rainbow colored shooting star with the words the mo you know above it

I don’t know who needs to hear this, but civil protests are not riots

12.06.2025 01:42 β€” πŸ‘ 1091    πŸ” 149    πŸ’¬ 14    πŸ“Œ 0

Why are we using words like autogenocide to oppose the bill? You think the lay person understands this? For some reason we on the left like to sound really smart but it just makes us look pretentious and out of touch

22.05.2025 13:05 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
A whistleblower's disclosure details how DOGE may have taken sensitive labor data

A whistleblower's disclosure details how DOGE may have taken sensitive labor data

The IT team met to discuss insider threats - namely, the DOGE engineers, whose activities it had little insight into or control over. "We had no idea what they did," he explained. Those conversations are reflected in his official disclosure.
They eventually launched a formal breach investigation, according to the disclosure, and prepared a request for assistance from the Cybersecurity and Infrastructure Security Agency (CISA). However, those efforts were disrupted without an explanation, Berulis said. That was deeply troubling to Berulis, who felt he needed help to try to get to the bottom of what happened and determine what new vulnerabilities might be exploited as a result.
In the days after Berulis and his colleagues prepared a request for CISAs help investigating the breach, Berulis found a printed letter in an envelope taped to his door, which included threatening language, sensitive personal information and overhead pictures of him walking his dog, according to the cover letter attached to his official disclosure. It's unclear who sent it, but the letter made specific reference to his decision to report the breach. Law enforcement is investigating the letter.

The IT team met to discuss insider threats - namely, the DOGE engineers, whose activities it had little insight into or control over. "We had no idea what they did," he explained. Those conversations are reflected in his official disclosure. They eventually launched a formal breach investigation, according to the disclosure, and prepared a request for assistance from the Cybersecurity and Infrastructure Security Agency (CISA). However, those efforts were disrupted without an explanation, Berulis said. That was deeply troubling to Berulis, who felt he needed help to try to get to the bottom of what happened and determine what new vulnerabilities might be exploited as a result. In the days after Berulis and his colleagues prepared a request for CISAs help investigating the breach, Berulis found a printed letter in an envelope taped to his door, which included threatening language, sensitive personal information and overhead pictures of him walking his dog, according to the cover letter attached to his official disclosure. It's unclear who sent it, but the letter made specific reference to his decision to report the breach. Law enforcement is investigating the letter.

While investigating the data taken from the agency, Berulis tried to determine its ultimate destination. But whoever had exfiltrated it had disguised its destination too, according to the disclosure.
DOGE staffers had permission to access the system, but removing data is another matter.
Berulis says someone appeared to be doing something called DNS tunneling to prevent the data exfiltration from being detected. He came to that conclusion, outlined in his disclosure, after he saw a traffic spike in DNS requests parallel to the data being exfiltrated, a spike 1,000 times the normal number of requests.
When someone uses this kind of technique, they set up a domain name that pings the target system with questions or queries. But they configure the compromised server so that it answers those DNS queries by sending out packets of data, allowing the attacker to steal information that has been broken down into smaller chunks.
"We've seen Russian threat actors do things like this on
U.S. government systems," said one threat intelligence researcher who requested anonymity because they weren't authorized to speak publicly by their employer.
That analyst, who has extensive experience hunting nation-state-sponsored hackers, reviewed the whistleblower's technical claims.

While investigating the data taken from the agency, Berulis tried to determine its ultimate destination. But whoever had exfiltrated it had disguised its destination too, according to the disclosure. DOGE staffers had permission to access the system, but removing data is another matter. Berulis says someone appeared to be doing something called DNS tunneling to prevent the data exfiltration from being detected. He came to that conclusion, outlined in his disclosure, after he saw a traffic spike in DNS requests parallel to the data being exfiltrated, a spike 1,000 times the normal number of requests. When someone uses this kind of technique, they set up a domain name that pings the target system with questions or queries. But they configure the compromised server so that it answers those DNS queries by sending out packets of data, allowing the attacker to steal information that has been broken down into smaller chunks. "We've seen Russian threat actors do things like this on U.S. government systems," said one threat intelligence researcher who requested anonymity because they weren't authorized to speak publicly by their employer. That analyst, who has extensive experience hunting nation-state-sponsored hackers, reviewed the whistleblower's technical claims.

Within minutes after DOGE accessed the NLRB's systems, someone with an IP address in Russia started trying to log in, according to Berulis' disclosure. The attempts were "near real-time," according to the disclosure. Those attempts were blocked, but they were especially alarming. Whoever was attempting to log in was using one of the newly created DOGE accounts - and the person had the correct username and password, according to Berulis. While it's possible the user was disguising their location, it's highly unlikely they'd appear to be coming from Russia if they wanted to avoid suspicion, cybersecurity experts interviewed by NPR explained.
On their own, a few failed login attempts from a Russian IP address aren't a smoking gun, those cybersecurity experts interviewed by NPR said. But given the overall picture of activity, it's a concerning sign that foreign adversaries may already be searching for ways into government systems that DOGE engineers may have left exposed.
"When you move fast and break stuff, the opportunity to ride the coattails of authorized access is ridiculously easy to achieve," said Handorf. What he means is that if DOGE engineers left access points to the network open, it would be very easy for spies or criminals to break in and steal data behind DOGE.
He said he could also see foreign adversaries trying to recruit or pay DOGE team members for access to sensitive data. "It would not surprise me if DOGE is accidentally compromised."

Within minutes after DOGE accessed the NLRB's systems, someone with an IP address in Russia started trying to log in, according to Berulis' disclosure. The attempts were "near real-time," according to the disclosure. Those attempts were blocked, but they were especially alarming. Whoever was attempting to log in was using one of the newly created DOGE accounts - and the person had the correct username and password, according to Berulis. While it's possible the user was disguising their location, it's highly unlikely they'd appear to be coming from Russia if they wanted to avoid suspicion, cybersecurity experts interviewed by NPR explained. On their own, a few failed login attempts from a Russian IP address aren't a smoking gun, those cybersecurity experts interviewed by NPR said. But given the overall picture of activity, it's a concerning sign that foreign adversaries may already be searching for ways into government systems that DOGE engineers may have left exposed. "When you move fast and break stuff, the opportunity to ride the coattails of authorized access is ridiculously easy to achieve," said Handorf. What he means is that if DOGE engineers left access points to the network open, it would be very easy for spies or criminals to break in and steal data behind DOGE. He said he could also see foreign adversaries trying to recruit or pay DOGE team members for access to sensitive data. "It would not surprise me if DOGE is accidentally compromised."

Musk’s DOGE involved in what appears to be a foreign espionage operation and data theft. They also have death threatened US federal whistleblowers and disabled security systems, deliberately allowing Russian IPs to access sensitive US federal government systems.

www.npr.org/2025/04/15/n...

16.04.2025 10:29 β€” πŸ‘ 4826    πŸ” 2625    πŸ’¬ 226    πŸ“Œ 252

Take on the school that educates the best lawyers in the country and see what happens. The fund raising machine has already kicked into gear. My guess is a billion will be raised fairly quickly

17.04.2025 02:16 β€” πŸ‘ 6    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

We had the reporter on tonight; @maddow has the whistleblower

16.04.2025 01:28 β€” πŸ‘ 24943    πŸ” 8724    πŸ’¬ 846    πŸ“Œ 451

That’s a crackpot statement. There are so many incorrect economic assumptions in there. Starting with being surprised we have trade deficits even when the USD appreciates. That’s exactly when it happens more. The stronger the USD becomes, the cheaper imports become.

08.04.2025 12:36 β€” πŸ‘ 6    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0

But I guess if you smeared shit all over the Capitol, you were victimized

01.04.2025 15:04 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Sounds fun

29.03.2025 20:43 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Trump Accidentally Wrecks His Own Tariff Spin in Leaked Call Stunner In a call with auto CEOs, the president warned them against raising prices. Isn’t that an admission that his argument for tariffs is bogus?

Trump is privately warning CEOs of automakers not to hike prices when his tariffs hit. This blows up Trump's lies about the tariffs, because it shows he knows they'll push up costs in the US, and knows "other countries" don't pay them!

New piece from me:
newrepublic.com/article/1933...

29.03.2025 10:56 β€” πŸ‘ 3481    πŸ” 1420    πŸ’¬ 196    πŸ“Œ 147
Preview
SignalGate Is Bad; But OPSEC Isn’t Even the Worst Part Of It I haven’t had time to comment on the Jeff Goldberg story about...

As I explain here, security isn't even the biggest part of the Signal Scandal. This is to keep actions secret from the US government. It's how to do crimes, bribes and more. talkingpointsmemo.com/edblog/signa...

25.03.2025 16:07 β€” πŸ‘ 5252    πŸ” 1771    πŸ’¬ 130    πŸ“Œ 127

His skin is dark enough. We can deport him back to Cuba with no due process, right?

25.03.2025 18:55 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Democrats have to be willing to shut down the government in order to remove Elon and DOGE

13.03.2025 02:23 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Twitter is down again.

10.03.2025 16:40 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Down goes Twitter! Down goes Twitter!

10.03.2025 16:17 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

And you had Judas (in pretend world)

01.03.2025 07:45 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

You’re living my nightmare

20.02.2025 05:25 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Use force you belong there

06.02.2025 22:43 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

@kaylan.bsky.social Got your back

05.02.2025 13:37 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

He’d take too much pleasure in that.

04.02.2025 21:08 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

β€œShe told me she was not an agent of Russia and seemed very sincere β€œ

04.02.2025 03:46 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Musk associates given unfettered access to private data of government employees The Musk-connected political hires include two recent high school graduates

1. BREAKING

Several of Elon Musk’s associates installed at the Office of Personnel Management (OPM) β€” including two recent high school graduates β€” have received unprecedented access to federal human resources databases containing sensitive personal information for millions of federal employees.

03.02.2025 13:28 β€” πŸ‘ 5928    πŸ” 2874    πŸ’¬ 306    πŸ“Œ 416

It was a test balloon and the press secretary was gaslighting us. They’ll keep trying everything

29.01.2025 17:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Totally agree. Use the Mitch playbook and grind this shit to a halt. Put sand in the gears. Know how to take advantage of every rule

29.01.2025 16:55 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I don’t think that is what happened. I think the Chinese just sent him a large bribe and the fall is him cashing it out. We’ll see an upswing when the next bribe is taken.

20.01.2025 08:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

But hurricanes hitting the south were the democrats weather machine πŸ˜‚πŸ˜‚πŸ˜‚

14.01.2025 01:52 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Wish I could cancel again

13.01.2025 06:56 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

No real interesting NFL games except Lions-Vikes

04.01.2025 06:17 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Awesome. Wailea area, Kaanapali area or other?

01.01.2025 17:13 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0

@whboone is following 13 prominent accounts