VA will soon mark 100,000 veterans cured of hepatitis C. This is exciting news and puts VA on track to eliminate hepatitis C in all eligible veterans enrolled in VA care who are willing and able to be treated.
Building on this success, VA takes on another important issue during Hepatitis Awareness Month: making sure all veterans experiencing homelessness are vaccinated for hepatitis A.
Recently, there have been multiple large outbreaks of hepatitis A among people who are homeless and people who use injection drugs across the U.S. Currently, there is a large outbreak in Tennessee and Kentucky that has affected well over 5,000 people across the two states with 60 deaths reported thus far.
Given that individuals experiencing homelessness may also be at increased risk of exposure to hepatitis B, VA recommends vaccination for those with risk factors against both hepatitis A and B, as appropriate.
3D illustration of the Liver.
During Hepatitis Awareness Month, the HIV, Hepatitis, and Related Conditions Programs, the Homeless Programs, and the National Center for Health Promotion and Disease Prevention are collaborating to raise awareness on this issue.
We are collaborating with leadership and frontline providers to ensure all identified veterans who are homeless, non-immune and unvaccinated for hepatitis A and those at risk of HBV exposure are offered vaccination, as appropriate, at their next VA appointment.
Veterans who are interested in either hepatitis A or B vaccination may ask their VA provider for more information.
Hepatitis Testing Day (May 19) is a great reminder to check in with your provider about hepatitis C testing and treatment as well.
In 2017, Puerto Ricans battled economic hardship and the lasting effects of Hurricane Maria at home as they celebrated 100 years of American citizenship. On March 2, 1917, the Jones-Shafroth Act was passed by Congress, making the island a U.S. territory and guaranteeing citizenship to all Puerto Ricans born after April 25, 1898. With citizenship came all the requirements of citizenship: serving on juries, paying taxes, and being drafted for military service.
Just in time for World War I.
Welcome to the party, pal.
It was just twenty years after the United States usurped the island’s Spanish rulers in the Spanish-American War and annexed Puerto Rico as a territory of the United States. By the end of the United States’ participation in World War I, the Selective Service Act would draft some 2.8 million men, sending an estimated 10,000 troops to France every day. The U.S. Army had come a long way from the third-rate militia it was before the war. To meet the requirements of becoming a great, global power, it needed the manpower of one.
American territories, which at the time included Alaska, Hawaii, Guam, Puerto Rico, and others, were exempt from the draft. The legislature of Puerto Rico immediately asked Congress to extend conscription to American territories – namely Puerto Rico. But this was purely at the request of the Puerto Ricans.
Puerto Rican Cpl. Ricardo LaFontaine in 1917.
In all, some 236,000 Puerto Ricans from the island signed up for selective service for a potential draft notice. Of those, 18,000 would go on to serve in the war. But they weren’t always welcome. African-American Puerto Ricans, like many minorities in the U.S., weren’t entirely welcome and ended up in segregated units. For those Puerto Ricans not of African descent, they would be assigned to some regular units in the U.S. military. Still, President Wilson, in the face of discouragement from the War Department, created a Puerto Rican Division.
A full 70 percent of those Puerto Ricans who signed up for service in World War I were rejected for no other reason than the War Department didn’t know what to do with them in a segregated Army. Despite this, there has long been a conspiracy theory that held Puerto Rico was only granted citizenship so they could fight in the war. If that were true, the U.S. would have sent a lot more Puerto Ricans than it did.
Even though he was 73 years old and serving as President of the United States at the time, Ronald Reagan received a letter from the Marine Corps asking him if he would like to enlist in 1984.
It may have been a clerical error or just a practical joke from the service to its commander-in-chief, or in the words of Reagan in his response, the result of “a lance corporal’s overactive imagination.” In any case, on Tuesday the U.S. Marine Corps Historical Company shared on its Facebook page the letter he sent back to then-Commandant Gen. Paul X. Kelley on May 31, 1984, and well, it’s classic.
“I regret that I must decline the attached invitation to enlist in the United States Marine Corps,” Reagan writes on official White House letterhead. “As proud as I am of the inference concerning my physical fitness, it might be better to continue as Commander-in-Chief. Besides, at the present time it would be rather difficult to spend ten weeks at Parris Island.”
With his trademark wit, Reagan noted the Democrats would probably appreciate it if he left The White House, but had to pass since his wife Nancy loved their current residence and Reagan himself was “totally satisfied with his job.”
“Would you consider a deferment until 1989?” Reagan wrote. (It’s worth noting that Reagan served stateside in the U.S. Army Air Force’s first motion picture unit during World War II).
When a Russian destroyer came close to colliding with a US Navy warship on June 7, 2019, Russian sailors were spotted sunbathing on the deck. A retired Russian admiral says there’s nothing weird about that.
Russian Admiral Valentin Selivanov, a military analyst who previously served as the chief of staff of the Russian Navy, told Russian media on June 10, 2019, that there’s nothing wrong with relaxing topside when you’re not at war. “There is a time for war, and a time for sunbathing,” the admiral explained.
On June 7, 2019, the US Navy accused the Russian destroyer Admiral Vinogradov of taking a run at the Ticonderoga-class cruiser USS Chancellorsville in the Philippine Sea. The two ships narrowly missed one another as the Russian destroyer came within 100 feet of the US warship.
Each side blamed the other for the incident; however, the US Navy released photos and videos to support its version of events.
(1/2) USS Chancellorsville Avoids Collision with Russian Destroyer Udaloy I DD 572
In one video, at least two Russian sailors were seen sunbathing shirtless on the helicopter pad. One sailor is sitting down, and pants aren’t immediately visible, although the video isn’t particularly clear.
“Our vessel is on the move in the open sea,” Selivanov told the Russian government’s Sputnik news agency, adding, “The seamen and officers have had lunch. They are on their after-lunch break, glad to be serving in the south. Sure, if one was sunbathing, then dozens were. And yes, you have to be undressed to sunbathe.”
The sunbathing Russian sailors has been interpreted a couple of different ways.
The New York Times noted the sailors and argued that this behavior could suggest that “the Russian vessel was not on high alert at the time and was not engaged in a planned provocation.”
The Russian statement on the incident claimed that the USS Chancellorsville put itself on a collision course with the Russian destroyer and the “crew was forced to conduct an emergency maneuver.”
The U.S. Navy cruiser USS Chancellorsville, right, is forced to maneuver to avoid collision from the approaching Russian destroyer Admiral Vinogradov.
(U.S. Navy photo)
Were the Russian warship seriously concerned about the possibility of a collision, there would have likely been an all-hands response. The lack of such a response and the presence of Russian sailors calmly sunbathing on the deck could signal that the Russian destroyer was not the reactive party in this incident.
It is difficult to know for certain what was going on aboard the Russian ship, but US naval experts have already cast doubt on Russia’s narrative, with one telling Business Insider that the USS Chancellorsville had the right of way and accusing the Russian warship of acting in a “dangerous” fashion.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
But all good things must come to an end, and Juno is no exception.
NASA planned to destroy the tennis-court-size robot by plunging it into Jupiter’s clouds sometime after July 2018. The rationale is similar to the Cassini probe’s recent demise: Jupiter’s icy moon Europa may be habitable to alien life, so carefully and deliberately ending the mission would prevent Juno from accidentally crashing into that moon. This would keep Europa’s ocean — which may have twice as much water as exists on Earth — from getting contaminated by any earthly microbes stuck to Juno.
However, the probe’s fiery end is now pushed back by at least three years to July 2021, according to NASA sources. Scientific work on the mission will continue through September 2022.
The extension is critical to one of Juno’s primary objectives. The probe has been mapping Jupiter as it orbits the gas giant with infrequent close passes called perijoves. Juno builds this map slice-by-slice using a suite of different instruments, including ones that record data about Jupiter’s gravitational field.
But due to lingering trouble with Juno’s propulsion system, by July 2018, the team will have completed only 14 of the 32 perijoves that it needs to finish mapping Jupiter.
Why Juno needs an extension to finish mapping Jupiter
(Scott Bolton / Southwest Research Institute)
Spending too much time in Jupiter’s powerful radiation field can damage sensitive electronics. As a result, Juno orbits the planet on a highly elliptical path that keeps the probe mostly out of harm’s way, yet regularly zooms it over the cloud tops for detailed observations.
When Juno arrived in July 2016, mission managers had the spacecraft orbit Jupiter once every 53.5 days. In October 2016, they planned to fire up the probe’s engines and speed Juno’s orbits to once every 14 days — until the team discovered some sticky valves in the engine’s plumbing. NASA ultimately decided to play it safe and not risk using the engines, delaying Juno’s mapping pace nearly four-fold.
“During a thorough review, we looked at multiple scenarios that would place Juno in a shorter-period orbit, but there was concern that another main engine burn could result in a less-than-desirable orbit,” Rick Nybakken, Juno’s project manager at NASA’s Jet Propulsion Laboratory, said in a 2017 press release. “The bottom line is a burn represented a risk to completion of Juno’s science objectives.”
One representative told Business Insider that the agency hasn’t “put anything out yet about that” when asked about the extension.
“NASA is close to being able to announce a decision on the possibility of continuing the Juno mission at Jupiter,” another representative said in an emailed statement. (NASA declined to provide additional information.)
Extending Juno’s flight will help the probe finish mapping Jupiter — a project that primarily focuses on the planet’s gravitational field. That data may reveal what is going on deep inside the giant yet mysterious world.
“It is very exciting for us to be able to complete the mission pretty much as it was originally proposed, except with longer orbits,” Frederic Allegrini, a staff scientist at Southwest Research Institute who works on the Juno mission, told Business Insider.
If Juno stays operational and productive over the next few years, NASA might again decide to keep flying the probe around Jupiter beyond July 2021.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
The first permanent deployment of F-35B Lightning II fighters outside the U.S. took place last week, and the location is probably no surprise.
According to a Marine Corps release, Marine Fighter Attack Squadron 121, or VMFA-121, has now become permanently based at Marine Corps Air Station Iwakuni.
A F-35B Lightning II with Marine Fighter Attack Squadron 121, lands at Marine Corps Air Station Iwakuni, Japan, Jan. 18, 2017. VMFA-121 conducted a permanent change of station to MCAS Iwakuni, from MCAS Yuma, Ariz., and now belongs to Marine Aircraft Group 12, 1st Marine Aircraft Wing, III Marine Expeditionary Force. The F-35B Lightning II is a fifth-generation fighter, which is the world’s first operational supersonic short takeoff and vertical landing aircraft. The F-35B brings strategic agility, operational flexibility and tactical supremacy to III MEF with a mission radius greater than that of the F/A-18 Hornet and AV-8B Harrier II in support of the U.S. – Japan alliance. (USMC photo)
According to F35.com, VMFA-121 consists of 16 F-35B fighters. In its previous iteration as VMFA(AW)-121, the squadron had 12 F/A-18D Hornet fighters, a number that was reduced to 10 as planes wore out, according to a BreakingDefense.com report from last April.
The deployment comes as tensions between the United States and the People’s Republic of China have increased over the South China Sea, a potentially volatile maritime flashpoint. China issued a warning after White House press secretary Shawn Spicer said, “So it’s a question of if those islands are in fact in international waters and not part of China proper, then yeah, we’re going to make sure that we defend international territories from being taken over by one country.”
Two F-35B Lightning II aircraft with Marine Fighter Attack Squadron 121, prepare to land at Marine Corps Air Station Iwakuni, Japan, Jan. 18, 2017. VMFA-121 conducted a permanent change of station to MCAS Iwakuni, from MCAS Yuma, Ariz., and now belongs to Marine Aircraft Group 12, 1st Marine Aircraft Wing, III Marine Expeditionary Force. The F-35B Lightning II is a fifth-generation fighter, which is the world’s first operational supersonic short takeoff and vertical landing aircraft. The F-35B brings strategic agility, operational flexibility and tactical supremacy to III MEF with a mission radius greater than that of the F/A-18 Hornet and AV-8B Harrier II in support of the U.S. – Japan alliance. (USMC photo)
Spicer had echoed comments made by Rex Tillerson, President Donald Trump’s nominee to serve as Secretary of State, during his Senate confirmation hearings. According to a FoxNews.com report, Tillerson said earlier this month, “You’re going to have to send China a clear signal that first, the island-building stops, and second, your access to those islands is also not going to be allowed.”
In recent months, the Arleigh Burke-class guided missile destroyer USS John S. McCain (DDG 56) carried out operations in the South China Sea. In December, China used a H-6 Badger to assert its claims as marked by the “nine-dash line.” There have also been close encounters between Chinese J-11 fighters and U.S. Navy P-8 maritime patrol aircraft and EP-3E electronic surveillance planes in recent years, according to a report by the Daily Caller.
Simply put, the 1529 Siege of Vienna did not go the way the Ottoman Empire hoped it would. Sultan Suleiman I, the Magnificent, was coming off a fresh string of victories in Europe and elsewhere when he decided that the road to an Ottoman Europe had to be paved through the legendary city of Vienna. He boasted that he would be having breakfast in Vienna’s cathedral within two weeks of the start of his siege.
When the day came and went, the Austrians sent the Sultan a letter, telling him his breakfast was getting cold.
When you drop sick taunts, you must then drop sick beats.
The Sultan had a reason to be cocky going into the Siege of Vienna. He had just brought down the Hungarians, the longtime first line of defense for European Christendom. Hungary lost its king and fell into a disastrous civil war which the Ottomans intervened in. The Habsburgs, who controlled half of Hungary and all of Austria at this time, weren’t having any of it and Hungary was split for a century after. For the time being, however, the Ottomans and their Hungarian allies were going head-to-head with Austrian Archduke Ferdinand I, pushing the Austrians all the way back to Vienna in less than a year.
But Europe’s Christian powers were not going to let Austria fall without a fight and so sent help to the besieged city. That help came in the form of German Landsknechts, Spanish Musketeers, and Italian Mercenaries. It was the furthest the Islamic armies had ever penetrated Europe’s heartland. But Suleiman would fail to take the city.
Look, if you want to have breakfast in church, most Christians will happily oblige you.
The torrential rains started almost immediately, meaning the Turkish armies had to abandon its powerful cannons, along with horses and camels who were unaccustomed to the amount of mud they had to trudge through. Even so, they still came with 300 cannons and outnumbered the defenders five-to-one. The allied troops inside the city held their own against the Turkish onslaught as the rain continued.
Sickness, rain, and wounds hounded the Ottoman armies until snowfall took the place of the rain. The Ottomans were forced to retreat, leaving 15,000 men killed in action behind.
The Sultan would never get his breakfast in the cathedral. No sultan would ever get breakfast in an Ottoman Vienna.
The Air Force Reserve Hurricane Hunters are continuing to monitor Hurricane Lane which is projected to hit the main Hawaiian Islands the afternoon of Aug. 23, 2018.
The 53rd Weather Reconnaissance Squadron, based out of Keesler Air Force Base, Mississippi, began flying into Hurricane Lane out of the Kalaeloa Airport Aug. 20, to collect weather data for the Central Pacific Hurricane Center to assist with their forecasts.
When the Hurricane Hunters began flying into Lane it was a category 4 storm that was predicted to weaken to a category 3 with the possibility of the storm changing course and moving south of the islands.
Due to information provided by the Hurricane Hunters, the Central Pacific Hurricane Center adjusted the forecast finding that the intensity had increased and the path moved to a northern route with a direct landfall to Hawaii possible in the coming days.
The center of circulation of a tropical storm can be seen as the WC-130J aircraft flies over the eye. The 53rd Weather Reconnaissance Squadron “Hurricane Hunters,” were heading back to Keesler Air Force Base in Biloxi, Miss, after penetrating the storm.
(U.S. Air Force photo by Staff Sgt. Valerie Smock)
The Pacific and Atlantic Oceans are data sparse environments due to the lack of radar and weather balloons in those areas, and satellite data can be incomplete. The data the Hurricane Hunters provide assists with the forecast accuracy as the 53rd WRS flies into the storm and directly measures the surface winds and pressure which assists with forecast movement and intensity models.
The Hurricane Hunters fly the storms to “fix” missions, which is where they determine the center of the storm, by using dropsondes, and the Stepped Frequency Microwave Radiometer, which is used to measure the wind speeds on the water surface, and then send the data collected to the National Hurricane Center to assist the forecasters in providing the projected paths of the storms.
While flying the storm on the evening of Aug. 20, 2018, Maj. Kimberly Spusta, 53rd WRS aerial reconnaissance weather officer, said the wind speeds had increased between the first pass through the eye of the storm to the second pass.
Hurricane Lane had strengthened to a category 5 storm the evening of Aug. 21, during a final fix by the Hurricane Hunters. This is the second time this year the 53rd WRS has deployed to Hawaii. They flew missions into Hurricane Hector at the beginning of August 2018.
Featured image: Tech. Sgt. Zachary Ziemann, 53rd Weather Reconnaissance Squadron loadmaster, checks the data from a dropsonde after it was released near the eye wall of Hurricane Lane Aug. 20, 2018. The 53rd WRS provides data vital to the National Hurricane Center to assist the forecasters in providing an updated model of the projected path of the storm.
Data breaches appear to be all the more common in recent years, with major firms across industries such as healthcare, social media, and finance falling victim to hackers. And such intrusions are becoming an increasingly costly problem for companies to fix; the cost of a data breach has risen by 12% over the past 5 years, according to data from IBM Security published in July 2019.
The circumstances behind a data breach will always vary depending on the situation. But there is a common thread that can be found across several recent hacks, including the Capital One breach from July 2019, according to Marc Rogers, a white-hat hacker and head of cybersecurity at Okta, an enterprise identity management firm.
For several companies that have been impacted by data breaches in recent years, the issue boils down to how these firms are managing the servers that are being used to store sensitive information, says Rogers.
“That’s probably the most common vector that I’m seeing across all of these breaches, is that companies don’t seem to know what data assets are out there,” Rogers said when speaking with Business Insider. “And consequently, there [are] a lot of insecure systems hanging on the internet that can be readily accessed.”
Take the Capital One breach as an example, which impacted 100 million people in the United States and six million people in Canada. Suspected hacker Paige A. Thompson is said to have obtained the sensitive information about Capital One customers and credit card applicants by exploiting a firewall misconfiguration in the company’s cloud infrastructure.
Security company Suprema, which operates a biometrics platform called Biostar 2, also fell victim to a hack that exposed the fingerprints of more than one million people as well as unencrypted usernames and passwords, The Guardian reported in August. That data breach can also be traced back to the way the compromised information was stored and managed, as the report said it was found on a publicly accessible database.
Boosting the security of the servers that store such information could dramatically cut down on the number of data breaches, according to Rogers.
“If we just got rid of that, I think you’d reduce the number of breaches we’re hearing about by at least half,” said Rogers.
At the same time, lawmakers are pressing for action to be taken in order to prevent a data breach like the one that impacted Capital One from happening again. United States senators Ron Wyden (D-Oregon) and Elizabeth Warren (D-Massachusetts) wrote a letter to the Federal Trade Commission in October 2019 calling for an investigation of Amazon over the Capital One leak, since the affected data was stored using Amazon Web Services. In the letter, Wyden and Warren accuse Amazon of failing to implement the same level of security in its cloud services as other tech firms like Microsoft and Google.
But experts have previously said that the responsibility to secure data should rest with the company itself, not the cloud-service provider.
“Step one in terms of mitigating these issues is [to] get out of this false sense of security that cloud users have, that Amazon will take care of it,” Ameesh Divatia, CEO and cofounder of data protection firm Baffle, previously told Business Insider.
Rogers says companies should start by getting an understanding of what data is out there by conducting a scan of their company’s public IP space and external assets. Doing so could help firms see if there’s any data out there that isn’t protected by a password, or is perhaps guarded by a default password that may not be strong.
“I’m getting used to hearing companies say ‘we had no idea that was out there,'” Rogers said. “Well somehow, these companies need to better track things.”
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
MARSOC — or Marine Special Operations Command — is one of our nation’s most elite fighting forces, as its members are ready to respond to any crisis, anywhere.
Their goal is to enhance the overall performance of every operator in any setting they may face. Depending on the mission, a MARSOC team or individual may find himself under attack and must negotiate any obstacle that presents itself.
While these Marines continuously train to keep their skills sharp, they take pride in being the best at all ends of the spectrum — including tactical driving.
Primarily dressed in civilian attire, these badasses train to take the average vehicle to its physical limits depending on the situation and location.
During a high-speed chase, the teams must learn how to drive their vehicles within close counters of one another.
These advanced drills also focus on the team’s survivability and to teach the passengers how to drive from a passenger seat in the event the driver is severely wounded or killed — giving the term “side-seat driver” a whole new meaning.
Each Marine who takes this course has already undergone several layers of filtering before joining MARSOC. The exclusive selection focuses on moral caliber and the individual’s ability to handle themselves in a stressful environment.
This aspect causes the MARSOC teams to build a unique brotherhood — a necessary trait for their line of work.
Check out the Marines‘ video below to witness this high-speed training for yourself.
An airman who braved enemy fire to save fellow troops during a river evacuation in Afghanistan in 2009 will receive a Silver Star for his bravery, a general said.
Airman First Class Benjamin Hutchins, a tactical air control party airman supporting the 82nd Airborne Division’s 4th Brigade Combat Team, was approved for the military’s third-highest valor award in April and will receive the honor during a ceremony Nov. 4 at Fort Bragg, North Carolina, an official said.
His heroic actions during a three-day period through Nov. 6, 2009, were recounted during a speech by Gen. Herbert “Hawk” Carlisle, the head of Air Combat Command, on Tuesday at the Air Force Association’s annual Air, Space Cyber Conference near Washington, D.C.
“This is an example of our airmen,” Carlisle said.
Hutchins and a team of soldiers were on the west bank of the Bala Murghab River looking for a supply airdrop, Carlisle said. One of the canisters fell off target into the swift-moving river, and two soldiers swam out to retrieve it.
But Taliban militants on the east side of the river were watching.
The soldiers were swept out by a “strong current they weren’t anticipating,” Carlisle said. “Airman Hutchins jumps into the river after [them] … but the Taliban start[ed] shooting at the last man in the water.”
Hutchins, swimming around the frigid waters for roughly an hour, evaded Taliban fire by skimming the surface “with [only] his nose and mouth” while diving back down to find the troops.
Additional soldiers with the 82nd Airborne soon came to the aid of all three men. But the Taliban began another firefight — with machine guns, sniper fire and rocket-propelled grenades — on the east bank the following day.
“They come out, and start running across an open field and take on the Taliban. They take out the rocket propeller, the machine gun. There’s still dealing with the snipers, but Hutchins, being a TACP, gets on the radio … calls in a [strike] from an MQ-1 Predator in a danger-close situation, but … it takes out the Taliban,” Carlisle said.
The award’s narrative, written by the airman’s former supervisor, Master Sgt. Donald Gansberger, describes the action in even more detail.
“Airman Hutchins moved under heavy and accurate rocket propelled grenade, machine gun and sniper fire across an open field with little to no cover or concealment,” it states. “While continuing to move forward, he managed to direct the sensors of overhead close air support while simultaneously providing accurate supporting fire with his M-4 rifle.”
“He killed one enemy armed with a rocket propelled grenade launcher, at close range, before the enemy could fire and wounded an additional enemy fighter all while providing targeting and controlling information to an overhead unmanned aerial vehicle that destroyed a second enemy fighting position with a Hellfire missile,” the document states.
“Airman Hutchins’ quick, decisive actions, tactical presence and calm demeanor enabled friendly forces to eventually overwhelm the enemy stronghold,” it states. “His actions forced the enemy fighters to break contact and relinquish critical ground to friendly forces which enabled the safety of the recovery efforts for the two missing Soldiers.”
In an ironic twist, Carlisle said, “they did eventually get their container back.”
The Air Force previously said Hutchins had been submitted for the Bronze Star Medal with Valor. However, the service later clarified Hutchins had instead been submitted for two Bronze Star medals for his actions, which instead were combined into one Silver Star award.
Hutchins medically retired from the Air Force in 2014 with injuries sustained as a result of enemy attack during a separate deployment in 2012, Air Combat Command told Military.com.
The Defense Department is reviewing more than 1,100 post-9/11 valor citations to determine if they warrant a higher award such as the Medal of Honor, officials announced in January.
In 2014, Defense Secretary Chuck Hagel ordered a review of all decorations and awards programs “to ensure that after 13 years of combat the awards system appropriately recognizes the service, sacrifices and action of our service members,” officials told USA Today at the time.
Russian television anchor Pavel Lobkov was in the studio getting ready for his show when jarring news flashed across his phone: Some of his most intimate messages had just been published to the web.
Days earlier, the veteran journalist had come out live on air as HIV-positive, a taboo-breaking revelation that drew responses from hundreds of Russians fighting their own lonely struggles with the virus. Now he’d been hacked.
“These were very personal messages,” Lobkov said in a recent interview, describing a frantic call to his lawyer in an abortive effort to stop the spread of nearly 300 pages of Facebook correspondence, including sexually explicit messages. Even two years later, he said, “it’s a very traumatic story.”
The Associated Press found that Lobkov was targeted by the hacking group known as Fancy Bear in March 2015, nine months before his messages were leaked. He was one of at least 200 journalists, publishers and bloggers targeted by the group as early as mid-2014 and as recently as a few months ago.
The AP identified journalists as the third-largest group on a hacking hit list obtained from cybersecurity firm Secureworks, after diplomatic personnel and U.S. Democrats. About 50 of the journalists worked at The New York Times. Another 50 were either foreign correspondents based in Moscow or Russian reporters like Lobkov who worked for independent news outlets. Others were prominent media figures in Ukraine, Moldova, the Baltics or Washington.
The list of journalists provides new evidence for the U.S. intelligence community’s conclusion that Fancy Bear acted on behalf of the Russian government when it intervened in the U.S. presidential election. Spy agencies say the hackers were working to help Republican Donald Trump. The Russian government has denied interfering in the American election.
Previous AP reporting has shown how Fancy Bear — which Secureworks nicknamed Iron Twilight — used phishing emails to try to compromise Russian opposition leaders, Ukrainian politicians and U.S. intelligence figures, along with Hillary Clinton campaign chairman John Podesta and more than 130 other Democrats.
Lobkov, 50, said he saw hacks like the one that turned his day upside-down in December 2015 as dress rehearsals for the email leaks that struck the Democrats in the United States the following year.
“I think the hackers in the service of the Fatherland were long getting their training on our lot before venturing outside.”
New Yorker writer Masha Gessen said it was also in 2015 — when Secureworks first detected attempts to break into her Gmail — that she began noticing people who seemed to materialize next to her in public places in New York and speak loudly in Russian into their phones, as if trying to be overheard. She said this only happened when she put appointments into the online calendar linked to her Google account.
Gessen, the author of a book about Russian President Vladimir Putin’s rise to power, said she saw the incidents as threats.
“It was really obvious,” she said. “It was a classic KGB intimidation tactic.”
Other U.S.-based journalists targeted include Josh Rogin, a Washington Post columnist, and Shane Harris, who was covering the intelligence community for The Daily Beast in 2015. Harris said he dodged the phishing attempt, forwarding the email to a source in the security industry who told him almost immediately that Fancy Bear was involved.
In Russia, the majority of journalists targeted by the hackers worked for independent news outlets like Novaya Gazeta or Vedomosti, though a few — such as Tina Kandelaki and Ksenia Sobchak — are more mainstream. Sobchak has even launched an improbable bid for the Russian presidency.
Investigative reporter Roman Shleynov noted that the Gmail hackers targeted was the one he used while working on the Panama Papers, the expose of international tax avoidance that implicated members of Putin’s inner circle.
Fancy Bear also pursued more than 30 media targets in Ukraine, including many journalists at the Kyiv Post and others who have reported from the front lines of the Russia-backed war in the country’s east.
Nataliya Gumenyuk, co-founder of Ukrainian internet news site Hromadske, said the hackers were hunting for compromising information.
“The idea was to discredit the independent Ukrainian voices,” she said.
The hackers also tried to break into the personal Gmail account of Ellen Barry, The New York Times’ former Moscow bureau chief.
Her newspaper appears to have been a favorite target. Fancy Bear sent phishing emails to roughly 50 of Barry’s colleagues at The Times in late 2014, according to two people familiar with the matter. They spoke on condition of anonymity to discuss confidential data.
The Times confirmed in a brief statement that its employees received the malicious messages, but the newspaper declined to comment further.
Some journalists saw their presence on the hackers’ hit list as vindication. Among them were CNN security analyst Michael Weiss and Brookings Institution visiting fellow Jamie Kirchick, who took the news as a badge of honor.
“I’m very proud to hear that,” Kirchick said.
The Committee to Protect Journalists said the wide net cast by Fancy Bear underscores efforts by governments worldwide to use hacking against journalists.
“It’s about gaining access to sources and intimidating those journalists,” said Courtney C. Radsch, the group’s advocacy director.
In Russia, the stakes are particularly high. The committee has counted 38 murders of journalists there since 1992.
Many journalists told the AP they knew they were under threat, explaining that they had added a second layer of password protection to their emails and only chatted over encrypted messaging apps like Telegram, WhatsApp or Signal.
Fancy Bear target Ekaterina Vinokurova, who works for regional media outlet Znak, said she routinely deletes her emails.
“I understand that my accounts may be hacked at any time,” she said in a telephone interview. “I’m ready for them.”
“I’VE SEEN WHAT THEY COULD DO”
It’s not just whom the hackers tried to spy on that points to the Russian government.
Maria Titizian, an Armenian journalist, immediately found significance in the date she was targeted: June 26, 2015.
“It was Electric Yerevan,” she said, referring to protests over rising energy bills that she reported on. The protests that rocked Armenia’s capital that summer were initially seen by some in Moscow as a threat to Russian influence.
Titizian said her outspoken criticism of the Kremlin’s “colonial attitude” toward Armenia could have made her a target.
Eliot Higgins, whose open source journalism site Bellingcat repeatedly crops up on the target list, said the phishing attempts seemed to begin “once we started really making strong statements about MH17,” the Malaysian airliner shot out of the sky over eastern Ukraine in 2014, killing 298 people. Bellingcat played a key role in marshaling the evidence that the plane was destroyed by a Russian missile — Moscow’s denials notwithstanding.
The clearest timing for a hacking attempt may have been that of Adrian Chen.
On June 2, 2015, Chen published a prescient expose of the Internet Research Agency, the Russian “troll factory” that won fresh infamy in October over revelations that it had manufactured make-believe Americans to pollute social media with toxic rhetoric.
Eight days after Chen published his big story, Fancy Bear tried to break into his account.
Chen, who has regularly written about the darker recesses of the internet, said having a lifetime of private messages exposed to the internet could be devastating.
“I’ve covered a lot of these leaks,” he said. “I’ve seen what they could do.”
The upcoming Army-Navy game is one that temporarily divides our usually-united U.S. military, if only for a few hours. The rivalry is 118 years old, is attended by sitting Presidents, and is older than the Air Force itself. But for the men who compete for the Commander-In-Chief’s Trophy, it can be even more daunting to head west and face the Air Force Academy Falcons.
There’s no way the Air Force will ever get as legendary a rivalry as the Army-Navy game. It’s one of the biggest games in sports. Even if it doesn’t change the rankings on any given year, it’s still got a huge fan base. The Air Force, despite being the better playing team for much of the past few decades, can’t compare to that kind of legacy.
What they can do, however, is spoil the parties at West Point and Annapolis.
Air Force’s 2014 starting QB Kale Pearson.
The trash talk
The Army-Navy game, while known for its mascot thefts and funny spirit videos, is also known for being overly polite. Not so at Navy-Air Force. Midshipmen hold a Falcon Roast pep rally during the week before the Air Force game, burning a wooden falcon in effigy.
As for an interesting game, everyone knows the service academies aren’t playing for the BCS National Championship, so the winner doesn’t get more than bragging rights and the Commander-In-Chief’s Trophy. But for fans watching a game, scoring is important. No one wants to sit through a Navy 0-7 win over Army, even Midshipmen. Moreover, there’s no better ending to a game than a squeaker.
The average margin of victory in an Army-Navy Game over the last 15 years is almost 16 and a half points. For Air Force vs. Navy, that number drops to a two score game. And despite Army’s recent uptick in the quality of their game, Air Force and Navy always field much more impressive and more explosive teams.
Despite all of these facts, the Air Force Academy Falcons will never quite measure up to the ancient rivalry that is the Army-Navy Game. The Air Force-Navy game happens on the first Saturday in October, followed by the Army-Air Force game on the first Saturday in November.
The 2018 Army-Navy Game will be on Dec. 8, 2018 at noon Eastern, presented by USAA, and live from Philadelphia.