Top related persons:
Top related locs:
Top related orgs:

Search resuls for: "Cyber Operations"


25 mentions found


The U.S. government has formally endorsed former President Donald Trump’s claim that Iran hacked his campaign. “We have observed increasingly aggressive Iranian activity during this election cycle, specifically involving influence operations targeting the American public and cyber operations targeting Presidential campaigns,” the agencies said in the statement. “This includes the recently reported activities to compromise former President Trump’s campaign, which the IC [intelligence community] attributes to Iran,” the statement continued. “The IC is confident that the Iranians have through social engineering and other efforts sought access to individuals with direct access to the Presidential campaigns of both political parties. A spokesperson for the campaign claimed the documents were part of an Iranian “hack-and-leak” operation to hurt Trump’s election chances.
Persons: Donald Trump’s, Trump’s, Harris, Joe Biden, Kamala Harris ’, ” Iran’s, , Trump Organizations: FBI, Infrastructure Security Agency, National Intelligence, Presidential, Google, Biden, Democratic, U.S, Politico, The New York Times, Washington, Trump Locations: Iran, U.S, Russia, United States, Islamic Republic, Iranian, Florida
Researchers identified websites that they attributed to the Iranian operation, aimed at voters on the political left and right. The group behind the sites, according to Microsoft, is part of a larger Iranian operation, active since 2020, that operates more than a dozen other fake news sites targeting English-, French-, Spanish- and Arabic-speaking audiences. But researchers say the sites could be used closer to the election. Iran has neither the intention nor plans to launch cyber attacks. The U.S. presidential election is an internal matter in which Iran does not interfere."
Persons: Donald Trump, Kamala Harris Organizations: Microsoft, International League for Women's, Analysis Center, Islamic Revolutionary Guard Corps, Iran's United Nations, Associated Press, U.S, Trump Locations: Iran, Russia, China, Savannah, U.S
CNN —A cyberattack on a contractor to England’s National Health Service has forced several major hospitals in London to cancel operations, blood tests and appointments and send patients elsewhere. King’s College Hospital, Guy’s and St Thomas’ have all been affected, as have numerous primary care providers in the UK capital, a spokesperson for the National Health Service (NHS) said Tuesday. The hospitals and providers affected are all partnered with Synnovis, a company that provides lab services to the NHS. Mark Dollar, the CEO of Synnovis, said the company was “incredibly sorry for the inconvenience and upset this is causing to patients, service users and anyone else affected. We are doing our best to minimize the impact and will stay in touch with local NHS services to keep people up to date with developments.”
Persons: Thomas ’, Oliver Dowson, Thomas ’ –, , , Vanessa Welham, Ciaran Martin, ” Martin, Mark Dollar Organizations: CNN, National Health Service, King’s College Hospital, Synnovis, NHS, Royal, Guy’s, Gracefield, Cyber Security, Cyber Operations Locations: London, Guy’s, Royal Brompton, Streatham
US government agencies are already banned from using Kaspersky Lab software but action to prevent private companies from using the software would be unprecedented. It’s the latest US government effort to use its vast regulatory powers to prevent Americans from using popular technology that US officials consider a national security risk. A Kaspersky Lab spokesperson did not respond to questions about a potential prohibition or about how big the company’s market share is in the US. Commerce Department officials have to carefully consider how practical any such regulation would be for the department to enforce and for users to comply with. But the expected move from the Biden administration would go a step further by using Commerce Department authorities to prevent private companies from using Kaspersky Lab software.
Persons: CNN —, Biden, Joe Biden, Donald Trump, Kaspersky, Trump, , ” Henry Young, Young, Eugene Kaspersky, ” Kaspersky, hasn’t, Harold Martin, ” CNN’s Zachary Cohen, Phil Mattingly, Evan Perez Organizations: CNN, Commerce Department, Kaspersky, Commerce, Trump, Emergency Economic, Street, Companies “, Business Software Alliance, Department, McAfee, Symantec, Lab, , Russian Ministry of Defense, West, National Security Agency, Politico, NSA, Wall Street Locations: Russian, America, Commerce, Moscow, Russia, Israel, Eugene, Ukraine
BeeBright | Getty ImagesLONDON — The U.S. and U.K. on Monday accused hackers linked to the Chinese state of being behind "malicious" cyber campaigns targeting political figures, in moves expected to stoke tensions with Beijing. The British government also alleged that China-affiliated hackers were behind an attack that saw the data of millions of voters accessed. "I can confirm today that Chinese state-affiliated actors were responsible for two malicious cyber campaigns targeting our democratic institutions and parliamentarians," British Deputy Prime Minister Oliver Dowden said in a speech to Parliament on Monday. "We want now to be as open as possible with the House and the British public," Dowden said. U.S. hits out at ChinaSeparately, the U.S. Justice Department unsealed an indictment Monday accusing Chinese state-linked hackers of being behind cyber campaigns targeting U.S. businesses, government officials and politicians.
Persons: Oliver Dowden, Dowden, Ni Gaobin, Weng Ming, Cheng Feng, Peng Yaowen, Xiong Wang, Zhao Guangzong, Merrick B, Garland Organizations: Getty, stoke, Electoral, Electoral Commission, Embassy, Google, APT31, U.S . Justice Department, DOJ Locations: U.S, Beijing, China, Britain, APT31 ., United States
CNN —The FBI and its international allies disrupted a network of over 1,000 hacked internet routers that Russia’s military intelligence agency was using for cyber espionage operations against the United States and its European allies, FBI Director Christopher Wray said Thursday. The US has new intelligence on Russian military capabilities related to its efforts to deploy a nuclear anti-satellite system in space, CNN reported Wednesday. Wray’s announcement is the latest move by the FBI to use court orders to try to stifle complex hacking operations from Russian spy agencies. US intelligence agencies also use hacking operations to try to thwart Russia, China and other rival governments. But unlike the FBI’s court-authorized work, details of those US cyber operations rarely, if ever, are made public.
Persons: Christopher Wray, ” Wray, Wray, “ we’ve, Weeks, Russia’s Organizations: CNN, FBI, Munich Security Conference, Justice Department, Russian Embassy, US, Locations: United States, Russian, Washington , DC, Munich, Russia, China, Beijing, Ukraine, “ Russia
But the blog does offer insight into how U.S. geopolitical rivals have been using large-language models to expand their ability to more effectively breach networks and conduct influence operations. But criminals and offensive hackers use it as well, and the introduction of large-language models led by OpenAI's ChatGPT upped that game of cat-and-mouse. — Iran's Revolutionary Guard has used large-language models to assist in social engineering, in troubleshooting software errors, and even in studying how intruders might evade detection in a compromised network. “Of course bad actors are using large-language models — that decision was made when Pandora’s Box was opened," said Amit Yoran, CEO of the cybersecurity firm Tenable. Some cybersecurity professionals complain about Microsoft's creation and hawking of tools to address vulnerabilities in large-language models when it might more responsibly focus on making them more secure.
Persons: , OpenAI, , OpenAI's ChatGPT, Malaysia —, Amit Yoran, Gary McGraw, Edward Amoroso Organizations: BOSTON, — Microsoft, Microsoft, Korean, Guard, Cybersecurity, Infrastructure Security Agency, Google, Meta, Berryville Institute of Machine Learning, NYU, T Locations: Iran, North Korea, Russia, China, Redmond, Washington, OpenAI, Russian, Ukraine, France, Malaysia
The report would be the most detailed disclosure yet by the US government of the hackers’ stealthy techniques, one aimed at helping private owners of critical infrastructure spot the Chinese hackers in their networks. The hackers’ presence in critical US networks has sparked a monthslong effort by US national security officials to kick the hackers out. The report, which US officials are set to release this week, makes clear that the Chinese hackers’ activity began much earlier than previously known, with the hackers scoping and accessing IT systems years ago. The Beijing-backed hackers have been probing systems that control heating, cooling and water, access that, if exploited, could allow them to manipulate those systems and cause “significant infrastructure failures,” the report says. Canada’s cybersecurity agency “assesses that the direct threat to Canada’s critical infrastructure” from the Chinese hackers “is likely lower” than that to US infrastructure, but that Canada would still likely still be affected by a disruption to US infrastructure due to “cross-border integration,” the document says.
Persons: Christopher Wray, Canada’s, Organizations: CNN, FBI, US, Embassy, National Security Agency, Cybersecurity, Infrastructure Security Agency Locations: Beijing, China, Taiwan, Washington ,, Guam, Australia, Canada, New Zealand, United Kingdom, Pacific
The war in Ukraine has proven a need to rethink air superiority, the top US Air Force officer said. "Air superiority still matters — it may be for shorter periods of time because it's just unaffordable to do it for longer periods of time." For air operations, air supremacy means "the opposing force is incapable of effective interference," according to the Air Force, while air superiority means the military can conduct operations without significant "prohibitive interference" from air and missile threats. AdvertisementA Mig-29 fighter of the Ukrainian air force is seen on a mission in Ukraine's war-hit east Wednesday, Aug. 2, 2023. He emphasized that if this method is executed in short bursts, an air force can be "very effective" during that timeframe.
Persons: David Allvin, , Allvin, it's, Keith James Organizations: US Air Force, Service, Air Force, AP, Staff, Pentagon Locations: Ukraine, Russia, Moscow, China, Iran, Iraq, Syria, Yemen, Pacific
FBI Director Christopher Wray said Tuesday that the bureau is working “around the clock” to “identify and disrupt” potential attacks by individuals inspired by the Hamas attacks on October 7. “Given the steady drumbeat of calls for attacks by foreign terrorist organizations since October 7th, we’re working around the clock to identify and disrupt potential attacks by those inspired by Hamas’s horrific terrorist attacks in Israel,” Wray said in his opening remarks before the Senate Judiciary Committee at a hearing Tuesday. His comments echo previous warnings of threats to the United States. He made similar remarks to other congressional committees. The law enables the US government to obtain intelligence by targeting non-Americans overseas who are using US-based communications services.
Persons: Christopher Wray, , we’re, ” Wray, , Wray, we’ve Organizations: FBI, Foreign Intelligence Locations: Israel, United States
The State Department relies on its Diplomatic Security Service to protect diplomats around the world. To protect those diplomats, the State Department relies on a little-known but highly capable agency — the Diplomatic Security Service. US State DepartmentAs the State Department's law-enforcement and security arm, the Diplomatic Security Service has been protecting US diplomats at home and abroad since 1916. "Through the council, the State Department can exchange information in real-time with hundreds of private businesses, faith-based organizations, and other US entities," a State Department spokesperson told Insider. Diplomatic Security ServiceFollowing a string of high-profile cyberattacks against government agencies and private businesses, US national-security officials are increasingly focused on cybersecurity.
Persons: , Anatolii Organizations: Diplomatic Security Service, DSS, Service, UN, Assembly, US State Department As, State, State Department, Mobile Security, Mobile, Foreign Affairs Security Training Center, US Department of State Regional, US, Overseas Security Advisory Council, Publishing, Getty, Operations Command, Foreign Affairs Counter, APEC, Diplomatic Security, State Department's, Department of Homeland Security, Management, Budget Locations: Ukraine, China, Taiwan, State, Virginia, Kyiv, Russia, San Francisco
So far, suspected Iranian hackers appear to have had minimal impact on their publicly claimed targets in Israel in the last month. But Portnoy said those hackers have been relatively quiet in the latest Israel-Hamas war (Israeli airstrikes have decimated internet infrastructure in Gaza.) “There is a gap between their [cyber] capabilities and their rhetoric,” the official told CNN, referring to Iran-backed hackers. “Even the successful, real cyberattacks are probably not going to be about the actual attack,” John Hultquist, Mandiant’s chief analyst, told CNN. This campaign is “maybe the most sophisticated we have seen from Iran on a technological level,” Sergey Shykevich, threat intelligence group manager at Check Point, told CNN.
Persons: , , Gaby Portnoy, ” Portnoy, Portnoy, , Christopher Wray, ” Wray, ” Eric Goldstein, CrowdStrike, ” John Hultquist, “ It’s, Solomon, Israel, Adam Meyers, CrowdStrike’s, ” Meyers, Sergey Shykevich Organizations: CNN, Israel National Cyber Directorate, Lebanese, Hezbollah, Palo Alto Networks, Hamas, Infrastructure Security Agency, FBI, Boston Children’s Hospital, ” CNN, Iranian, United Nations, , Islamic Revolutionary Guard Corps Locations: Iran, Israel, Saudi Arabia, East, Iranian, Syria, Iraq, Tehran, , Palo, Gaza, Palestine, China, Russia
CNN —Russian military hackers have been targeting Ukrainian soldiers’ mobile devices in a bid to steal sensitive battlefield information that could aid the Kremlin’s war on Ukraine, the US and its allies warned Thursday. The news shows how the struggle to control sensitive military data in cyberspace has been a key front in Russia’s full-scale war on Ukraine. The Ukrainian government has encouraged a loose band of thousands of volunteer hackers to launch attacks on Russian assets in Ukraine and on Russian soil. Some analysts and US officials have attributed the relatively limited impact of Russian hacking – at least compared with the outsize expectation of Russian cyber prowess – during the war to the same disorganization that has plagued Russian kinetic operations. But the true scope and impacts of Russian cyber operations in Ukraine is very difficult to pin down in the fog of war, where both sides have incentive to exaggerate their successes.
Persons: Elon Musk’s, , , John Hultquist, Hultquist, ” Paul Chichester, idly, Paul Nakasone Organizations: CNN, Google, Russian Embassy, Cyber Security, Pentagon, Command Locations: Russian, Ukraine, Australia, Canada, New Zealand, United Kingdom, Russia’s, Washington ,, Russia, Ukrainian
North Korean leader Kim Jong Un and Russia's Defense Minister Sergei Shoigu visit an exhibition of armed equipment on the occasion of the 70th anniversary of the Korean War armistice in this image released by North Korea's Korean Central News Agency on July 27, 2023. The fact North Korean hackers may have obtained information about the Zircon does not mean they would immediately have that same capability, said Markus Schiller, a Europe-based missile expert who has researched foreign aid to North Korea's missile programme. Last month, North Korea test-launched the Hwasong-18, the first of its ICBMs to use solid propellants. "North Korea announced that it was doing the same thing in late 2021. If NPO Mash had one useful thing for them, that would be top of my list," he added.
Persons: Kim Jong, Sergei Shoigu, ScarCruft, Lazarus, Tom Hegel, SentinelOne, Hegel, Obama, Nicholas Weaver, Matt Tait, Weaver, Vladimir Putin, Markus Schiller, Schiller, Jeffrey Lewis, James Martin, James Pearson, Christopher Bing, Chris Sanders, Alistair Bell Organizations: Russia's, North, Korean Central News Agency, KCNA, REUTERS, NPO Mashinostroyeniya, Pyongyang LONDON, Reuters, North Korean, United Nations, Soviet Union, NPO, Intercontinental Ballistic Missile, Mash, James, James Martin Center, Nonproliferation Studies, Korea, Thomson Locations: Pyongyang, WASHINGTON, Russian, Reutov, Moscow, Russia, Washington, New York, North Korea, Soviet, United States, Crimea, Korean, Europe, London
Helsinki, Finland CNN —More than 500 days after Russia launched its invasion of Ukraine, the war loomed over President Joe Biden’s weeklong, three-stop trip to Europe. Drama over Ukraine’s membershipUkraine was the top agenda item for NATO leaders in Vilnius, and the discussion of a pathway for the war-torn country to join the alliance prompted division among leaders. After meeting with Zelensky for more than an hour, Biden told reporters that he was able to reassure his Ukrainian counterpart. The former president raised the prospect of withdrawing from the alliance multiple times in 2018, The New York Times reported. I don’t think NATO’s ever been stronger,” Biden said during his meeting with Finland’s President Sauli Niinistö
Persons: Finland CNN —, Joe Biden’s weeklong, reasserting, Biden, Jens Stoltenberg, Ulf Kristersson, Recep Tayyip Erdoğan Monday, Erdoğan, , Volodymyr Zelensky, Zelensky, Donald Trump’s, Trump’s, , ” Biden, Trump, Rishi Sunak, King Charles III, Putin, , Stoltenberg, Wang Wenbin, Biden “, “ I’ve, Sauli Niinistö Organizations: Finland CNN, Russia, NATO, Zelensky, Vilnius University, Nordic, Senate, The New York Times, Foreign Affairs, Foreign Ministry, Microsoft, House, Lithuania, State, Government Locations: Helsinki, Finland, Russia, Ukraine, Europe, Washington, Turkey, Sweden, Ankara, Vilnius, London, Finnish, China, Beijing, Asia, Indonesia, Hiroshima
"The PRC's malicious hybrid and cyber operations and its confrontational rhetoric and disinformation target Allies and harm Alliance security." NATO Secretary General Jens Stoltenberg told reporters at the summit that while China was not a NATO "adversary", it was increasingly challenging the rules-based international order with its "coercive behaviour." "Any act that jeopardises China's legitimate rights and interests will be met with a resolute response," it said. In the communique, NATO also said China sought to control key technological and industrial sectors, critical infrastructure, and strategic materials and supply chains, and that Beijing also used its economic leverage to create strategic dependencies and enhance its influence. Reporting by Liz Lee and Ryan Woo; Editing by Tom Hogue and Michael PerryOur Standards: The Thomson Reuters Trust Principles.
Persons: Jens Stoltenberg, Fumio Kishida, Yoon Suk Yeol, Kishida, Liz Lee, Ryan Woo, Tom Hogue, Michael Perry Organizations: NATO, Alliance, South, Thomson Locations: BEIJING, Beijing, China, Asia, Pacific, Lithuanian, Vilnius, People's Republic of China, NATO, Ukraine, Taiwan, East Asia, Japan, Tokyo
Henriette Borgund knows attackers can find weaknesses in the defences of a big renewables power company - she's found them herself. She joined Norway's Hydro (NHY.OL) as an "ethical hacker" last April, bringing years of experience in military cyberdefence to bear at a time of war in Europe and chaos in energy markets. They're nervously monitoring a hybrid war where physical energy infrastructure has already been targeted, from the Nord Stream gas pipelines to the Kakhovka dam. It said Russia had tried to destroy digital networks and cause power cuts, and that missile attacks on facilities were often accompanied by cyberattacks. "Companies in the energy space, their core business is producing energy, not cybersecurity," said Jalal Bouhdada, CEO of cybersecurity firm Applied Risk, a division of DNV.
Persons: Nora Buli, Henriette Borgund, she's, shoring, Michael Ebner, cyberattacks, didn't, Swantje Westpfahl, James Forrest, Cem Gocgoren, Stephan Gerling, Mathias Boeswetter, Leonhard Birnbaum, Jalal Bouhdada, Nina Chestney, Christoph Steitz, America Hernandez, Paris Pavel Polityuk, Guy Faulconbridge, Pravin Organizations: REUTERS, Norway's Hydro, Reuters, Hydro's Oslo, Hydro, Ukraine, cyberattacks, Germany's Institute for Security, TRITON, Triton, Svenska, ICS CERT, University of Tulsa, E.ON, " Companies, Pravin Char, Thomson Locations: Norwegian, Fosen, Norway, Ukraine, OSLO, LONDON, FRANKFURT, Europe, Nord, Russia, Ukrainian, Moscow, United States, Russian, Capgemini, Saudi, Swedish, DNV, Oslo, London, Frankfurt, Paris, Kiev
Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency, testifies before a House Homeland Security Subcommittee, at the Rayburn House Office Building in Washington, D.C., April 28, 2022. China's cyber-espionage and sabotage capacities are an "epoch-defining threat," the top U.S. cybersecurity official said, warning that in the event of open warfare "aggressive cyber operations" would threaten critical U.S. transportation infrastructure "to induce societal panic." "We, as an American people, need to understand not just cyber resilience but the imperative of operational resilience and the importance of societal resilience," the CISA director said. Chinese cyber infiltration and espionage have been an ongoing concern for American companies. A disruption of critical pipelines, communications infrastructure, or transportation services could cripple the U.S. economy in the case of conflict.
Persons: Jen Organizations: Infrastructure Security Agency, Homeland Security, Washington , D.C, China's, Infrastructure Security, Aspen Institute, Microsoft, U.S, Corporate, U.S ., Colonial Pipeline Locations: Rayburn, Washington ,, U.S, China, Asia, East
WASHINGTON, June 12 (Reuters) - Chinese hackers are all but certain to disrupt American critical infrastructure, such as pipelines and railways, in the event of a conflict with the United States, a senior U.S. cybersecurity official said Monday. In comments made during an appearance at the Aspen Institute in Washington, Cybersecurity and Infrastructure Security Agency Director Jen Easterly said Beijing was making major investments in the capability to sabotage U.S. infrastructure. She cautioned that Americans needed to be prepared for the likelihood that Beijing's hackers would dodge their defenses and cause damage in the physical world. The Chinese Embassy in Washington did not immediately respond to a request seeking a reaction to the warning. Reporting by Raphael Satter; Editing by Bill BerkrotOur Standards: The Thomson Reuters Trust Principles.
Persons: Jen, Raphael Satter, Bill Berkrot Organizations: Aspen Institute, Infrastructure Security, Embassy, U.S, Thomson Locations: United States, U.S, Washington, Cybersecurity, Beijing
"In an increasingly volatile and interconnected world, to be a truly responsible cyber power, nations must be able to contest and compete with adversaries in cyberspace," GCHQ director Jeremy Fleming said. The statement was published alongside a 28-page paper designed "to illustrate aspects of how the UK is being a responsible cyber power". The paper accompanying the statement did not say which disinformation-spreading states British hackers had worked to counter. It noted, however, that "countries such as Russia and Iran routinely carry out cyber operations of different kinds in order to spread disinformation". Indeed the intent is sometimes that adversaries do not realise that the effects they are experiencing are the result of a cyber operation," GCHQ said.
WASHINGTON, March 15 (Reuters) - Russian hackers appear to be preparing a renewed wave of cyber attacks against Ukraine, including a "ransomware-style" threat to organizations serving Ukraine's supply lines, a research report by Microsoft (MSFT.O) said on Wednesday. The report, authored by the tech giant’s cyber security research and analysis team, outlines a series of new discoveries about how Russian hackers have operated during the Ukraine conflict and what may come next. “Since January 2023, Microsoft has observed Russian cyber threat activity adjusting to boost destructive and intelligence gathering capacity on Ukraine and its partners’ civilian and military assets,” the report reads. Experts say the tactic of combining physical military operations with cyber techniques mirrors prior Russian activity. These developments have been paired with a growth in more stealthy Russian cyber operations designed to directly compromise organizations in countries allied to Ukraine, according to the report.
[1/2] The seal of the Central Intelligence Agency is shown at the entrance of the CIA headquarters in McLean, Virginia, U.S., September 24, 2022. REUTERS/Evelyn HocksteinWASHINGTON, March 8 (Reuters) - The U.S. Central Intelligence Agency’s future will be defined by America's ongoing technology race with China, agency director William Burns said on Wednesday during a Senate hearing. Burns’ remarks followed the release of the Annual Threat Assessment of the U.S. Intelligence Community, which pointed to China as the biggest national security threat facing America. “It's also the main determinant of our future as an intelligence service as well.”The CIA director was speaking during Congress’s so-called Worldwide Threats hearing, also featuring other heads of the U.S. intelligence community, including National Security Agency Director Gen. Paul Nakasone, National Intelligence Director Avril Haines, Defense Intelligence Agency director Lt. Gen. Scott Berrier and Federal Bureau of Investigation Director Christopher Wray. Gen. Nakasone, the NSA director, testified China's cyber operations have grown more aggressive recently.
WASHINGTON, Dec 19 (Reuters) - The U.S. military's Cyber Command hunted down foreign adversaries overseas ahead of this year's mid-term elections, taking down their infrastructure before they could strike, the head of U.S. Cyber Command said. "We understood how foreign adversaries utilize infrastructure throughout the world, we had that mapped pretty well, and we wanted to make sure that we took it down at key times." Nakasone's language suggests Cyber Command carried out both offensive and defensive cyber operations. He declined to identify which adversaries were targeted but acknowledged he saw the same kinds of foreign adversaries as he had in the past. "This is the idea of understanding your foreign adversaries and operating outside the United States," he said.
The FBI has warned that an Iranian government-tied hacker group that tried to interfere in the 2020 election is currently active and a threat to the U.S. The group, which federal agencies say operates from an Iranian cybersecurity company called Emennet Pasargad, is engaged in “ongoing” operations to hack and leak material, and may target American organizations, the FBI said Thursday in an industry warning. In October 2020, the FBI announced that Iran was behind the most significant foreign attempt to influence that year’s U.S. elections. Democrats registered to vote in Florida, which makes voter information publicly accessible, received intimidating emails in the weeks before the election, instructing them to become Republicans. It was not clear what organization the FBI was referring to, and the agency did not immediately respond to requests for comment.
New York Congressional candidate Mike Itkis hopes to being sexual rights to the front of politics. Itkis released a sex tape with a list of his political reasons for doing so. New York Congressional candidate Mike Itkis wants to share his point of view: Sexual rights need to be explicitly defined and protected. Itkis' sex tape is not the first to penetrate the New York political sphere. Pornhub, Itkis, Sage, Nadler, and Zumbluskas did not immediately respond to Insider's request for comment.
Total: 25