<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=utf-8"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:Helvetica;
panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
p
{mso-style-priority:99;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
p.story-body-text, li.story-body-text, div.story-body-text
{mso-style-name:story-body-text;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
span.EmailStyle19
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:#1F497D;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple><div class=WordSection1><p class=MsoNormal><b><i><span style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'>“cyberpower proved the perfect weapon: cheap, hard to see coming, hard to trace.” - </span></i></b><span style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'> from the article<o:p></o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'><o:p> </o:p></span></p><div><div style='border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in 0in 0in'><p class=MsoNormal><b><span style='font-size:11.0pt;font-family:"Calibri",sans-serif'>From:</span></b><span style='font-size:11.0pt;font-family:"Calibri",sans-serif'> kictanet [mailto:kictanet-bounces+awatila=yahoo.co.uk@lists.kictanet.or.ke] <b>On Behalf Of </b>Ali Hussein via kictanet<br><b>Sent:</b> Wednesday, December 14, 2016 7:43 AM<br><b>To:</b> awatila@yahoo.co.uk<br><b>Cc:</b> Ali Hussein <ali@hussein.me.ke><br><b>Subject:</b> [kictanet] The Perfect Weapon: How Russian Cyberpower Invaded the U.S. - The New York Times<o:p></o:p></span></p></div></div><p class=MsoNormal><o:p> </o:p></p><div><div><p class=story-body-text style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:45.0pt'>WASHINGTON — When Special Agent Adrian Hawkins of the Federal Bureau of Investigation called the Democratic National Committee in September 2015 to pass along some troubling news about its computer network, he was transferred, naturally, to the help desk.<o:p></o:p></p><p class=story-body-text style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:12.0pt;margin-left:45.0pt;line-height:1.625rem;max-width: none'>His message was brief, if alarming. At least one computer system belonging to the D.N.C. had been compromised by hackers federal investigators had named “the <a href="https://labsblog.f-secure.com/2015/09/17/the-dukes-7-years-of-russian-cyber-espionage/">Dukes</a>,” a cyberespionage team linked to the Russian government.<o:p></o:p></p><p class=MsoNormal><a href="http://www.nytimes.com/2016/12/13/us/politics/russia-hack-election-dnc.html?emc=edit_ta_20161213&nlid=65658228&ref=cta&_r=0">http://www.nytimes.com/2016/12/13/us/politics/russia-hack-election-dnc.html?emc=edit_ta_20161213&nlid=65658228&ref=cta&_r=0</a><o:p></o:p></p></div><div><p class=MsoNormal><br>If this can happen to Americans how prepared are we? <o:p></o:p></p></div><div id=AppleMailSignature><p class=MsoNormal><o:p> </o:p></p><div><p class=MsoNormal><b>Ali Hussein</b><o:p></o:p></p></div><div><p class=MsoNormal><b>Principal</b><o:p></o:p></p></div><div><p class=MsoNormal><b>Hussein & Associates</b><o:p></o:p></p></div><div><p class=MsoNormal><span style='font-size:13.5pt;font-family:"Helvetica",sans-serif'>+254 0713 601113 <o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-size:13.5pt;font-family:"Helvetica",sans-serif'><o:p> </o:p></span></p></div><div><p style='margin:0in;margin-bottom:.0001pt'>Twitter: @AliHKassim<o:p></o:p></p><p style='margin:0in;margin-bottom:.0001pt'>Skype: abu-jomo<o:p></o:p></p><p style='margin:0in;margin-bottom:.0001pt'>LinkedIn: <a href="http://ke.linkedin.com/in/alihkassim" target="_blank">http://ke.linkedin.com/in/alihkassim</a><o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p></div><div><p class=MsoNormal><br><br><o:p></o:p></p></div><div><p class=MsoNormal>"Discovery consists in seeing what everyone else has seen and thinking what no one else has thought". ~ Albert Szent-Györgyi<o:p></o:p></p></div><div><p class=MsoNormal><br><br><o:p></o:p></p></div><p class=MsoNormal>Sent from my iPad<o:p></o:p></p></div></div></div></body></html>