Obviously, the people running this US Government are not really trying to win a war in Iraq, Syria, Iran or anywhere else, Because they would have done that by now with all of the might in our country's US military. That they deploy the US military forces politically so the leader can just keep using to never really win with at all.
The same police action Harry Truman used to hold off the North Koreans military aggression back in the 1950s
No, the people running our country's Government now are only marking time until they themselves are out of office retired and returning to wine, food, and music of the good life.
That a lot of the people working in this country's military are only pawns to the chest game that the Washington DC Country Club elitist keep playing like that. And that the fourth estate (media) has also distorted that institution into a television Show for only the appearance sake.
Using our population like lemmings to keep walking around where they want to go.
Sites across the internet suffer outage after cyberattack
Sites across the internet had problems on Friday morning following a cyberattack on a major internet management company.
On Friday morning, Dyn — a company that hosts domain name systems — announced it has been the subject of a cyberattack that caused major problems for numerous websites. People reported issues with Twitter, Spotify, SoundCloud, Vox Media sites, Airbnb and numerous other sites.
Dyn said at 9:20 a.m. ET that it resolved an attack that began at 7 a.m. ET Friday. But at 11:52 a.m. ET, the company said an attack had resumed.
Shortly after Dyn announced it was experiencing another attack, people reported more problems accessing Twitter and other sites.
Domain name systems (DNS) are essentially the GPS of the internet, taking the text URLs you type into a browser and figuring out where those websites’ data is located on the back end. So when you type mashable.com in a browser, it shows you both the real Mashable and can quickly and easily locate the nearest server that hosts the site’s data.
Dyn said after the attack began at 7 a.m. the company "began monitoring and mitigating a DDoS attack against our Dyn Managed DNS infrastructure. Some customers may experience increased DNS query latency and delayed zone propagation during this time. Updates will be posted as information becomes available."
DDoS stands for "distributed denial of service" and is a common tactic used by hackers to take down internet-connected servers. In a DDoS attack, malicious users build a network of computers that then send massive amounts of traffic to particular servers with the goal of denying the use of those servers to other users, according to Cisco.
The source of the attack Friday was not immediately clear.
"Hackers have no rules. One of the problems we have is that they move much faster than cyber-defenders. A DDoS attack can be launched in literally seconds, or under an hour if it's coordinated by a larger group," Steven Morgan, founder of the research firm Cybersecurity Ventures, told Mashable. "Right now, we're in the phase of figuring out where did this come from."
This cyberattack comes at a time of heightened tension, with the US claiming it will retaliate against Russia after accusing the country of orchestrating hacks of the Democratic National Committee.
The White House is aware of the attacks, and the Department of Homeland Security is taking a close look at the "malicious activity," a CBS News reporter said on Twitter.
“The internet continues to rely on protocols and infrastructure designed before cyber security was an issue. DDoS, especially with the rise of insecure IOT devices, will continue to plague our organizations," Ben Johnson, a chief security strategist for Carbon Black, told Mashable. "Sadly, what we are seeing is only the beginning in terms of large scale botnets and disproportionate damage done.”
The attack Friday mainly affected the eastern United States, Dyn said.
Hacker News first noted the "massive Dyn DNS outage." The site said that if sites reported as down are working for some users, those users' machines have likely cached the DNS response for those sites.---------