{"id":45319,"date":"2022-02-16T16:41:25","date_gmt":"2022-02-16T16:41:25","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33115\/Right-Wingers-Try-To-Spin-DNS-Traffic-Logged-As-Intercepting-Emails.html"},"modified":"2022-02-16T16:41:25","modified_gmt":"2022-02-16T16:41:25","slug":"right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/","title":{"rendered":"Right Wingers Try To Spin DNS Traffic Logged As Intercepting Emails"},"content":{"rendered":"<div readability=\"32\">\n<div><picture class=\"responsive-image lazyloader--lazy lazyloader--lowres\"><source media=\"(min-width: 1000px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/620bff223d9558009dfecdff\/lede\/1644959026262-gettyimages-1364881985.jpeg?crop=1xw:0.8011xh;0xw,0.025xh&amp;resize=20:*\"><source media=\"(min-width: 700px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/620bff223d9558009dfecdff\/lede\/1644959026262-gettyimages-1364881985.jpeg?crop=1xw:0.8011xh;0xw,0.025xh&amp;resize=20:*\"><source media=\"(min-width: 0px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/620bff223d9558009dfecdff\/lede\/1644959026262-gettyimages-1364881985.jpeg?crop=1xw:0.8011xh;0xw,0.025xh&amp;resize=20:*\"><img class=\"responsive-image__img\" alt=\"GettyImages-1364881985\"><\/picture><\/div>\n<p>Image:&nbsp;Mario Tama\/Getty Images<\/p>\n<\/div>\n<div data-component=\"BodyComponentRenderer\" readability=\"73.066967383761\">\n<div class=\"topic-callout\" readability=\"7.2888888888889\">\n<div class=\"topic-callout__img\"><a href=\"https:\/\/www.vice.com\/en\/topic\/cyber\"><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*\" alt=\"Screen Shot 2021-02-24 at 3\"><\/a><\/div>\n<p>Hacking. Disinformation. Surveillance. CYBER is Motherboard&#8217;s podcast and reporting on the dark underbelly of the internet.<\/p>\n<\/div>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"25.323943661972\"><\/p>\n<p>Right-wing media outlets like <a href=\"https:\/\/www.foxnews.com\/politics\/clinton-campaign-paid-infiltrate-trump-tower-white-house-servers\" target=\"_blank\" rel=\"noopener\">Fox News<\/a> and the <a href=\"https:\/\/www.washingtonexaminer.com\/news\/justice\/tech-executive-fires-back-at-john-durham\" target=\"_blank\" rel=\"noopener\">Washington Examiner<\/a> are pushing a narrative that the Hillary Clinton campaign tried to \u201cinfiltrate\u201d and hack Donald Trump and his presidential campaign in 2016.&nbsp;<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30.477108433735\"><\/p>\n<p>Trump <a href=\"https:\/\/www.newsweek.com\/trump-suggests-clinton-operatives-deserve-death-spying-operation-1678773\" target=\"_blank\" rel=\"noopener\">has picked up on this, saying<\/a> the people responsible for this deserve to be punished by death. Fox News host <a href=\"https:\/\/twitter.com\/acyn\/status\/1493392516791504897\" target=\"_blank\" rel=\"noopener\">Tucker Carlson<\/a> seized on the story in his show Tuesday night as a way to prove that Trump was right all along in his claims that Hillary Clinton was spying on his campaign, and that Rodney Joffe, an executive at tech company Neustar, intercepted internet traffic including emails and text messages.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"35\"><\/p>\n<p>This is all being called the &#8220;Durham Filing&#8221; by right-leaning news outlets and politicians, and is, like many other scandals in this saga, being decried as the biggest political scandal of all time that the left-wing media is ignoring in an attempt to bury the truth. Taking these arguments in good faith, this narrative is still based on a misunderstanding of how the tech involved in this alleged scandal actually works, according to cybersecurity experts.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34.465909090909\"><\/p>\n<p>On Sunday, Fox News published an article citing a court filing in a case against former Clinton campaign lawyer Michael Sussmann, which is part of the investigation by John Durham, a special counsel appointed by Trump to investigate the inquiry into Russia\u2019s interference in the 2016 election. Sussman told the CIA in 2017 that there was internet traffic data that suggested people using Russian-made smartphones were connecting to networks at Trump Tower and the White House, as well as data that showed suspicious links between Trump Tower networks and Russian bank Alfa Bank. Sussman apparently got that internet traffic data from Neustar, a cybersecurity company, <a href=\"https:\/\/www.nytimes.com\/2022\/02\/14\/us\/politics\/durham-sussmann-trump-russia.html\" target=\"_blank\" rel=\"noopener\">according to the <\/a><em><a href=\"https:\/\/www.nytimes.com\/2022\/02\/14\/us\/politics\/durham-sussmann-trump-russia.html\" target=\"_blank\" rel=\"noopener\">New York Times<\/a><\/em>.&nbsp;<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>Fox News cited this as evidence that Clinton\u2019s campaign tried to \u201cinfiltrate\u201d the Trump campaign, even though that word is not actually in the court filing, and was used by Kash Patel in his interview with Fox News, the former chief of staff to the acting United States secretary of defense in the Trump administration.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>Moreover, according to cybersecurity experts, the internet data in question isn\u2019t as nefarious as right-wing media outlets are purporting it to be. Tucker Carlson claimed that &#8220;the filing says that Joffe and his computer scientists intercepted internet traffic, that is emails or presumably text messages&#8221; from the Trump campaign. But the data was not &#8220;emails&#8221; nor &#8220;text messages.&#8221;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"25.714285714286\"><\/p>\n<p>&#8220;The data is DNS lookup information that Neustar collected as part of a contract it had with the White House, <a href=\"https:\/\/www.nytimes.com\/2022\/02\/14\/us\/politics\/durham-sussmann-trump-russia.html\" target=\"_blank\" rel=\"noopener\">according to the <\/a><em><a href=\"https:\/\/www.nytimes.com\/2022\/02\/14\/us\/politics\/durham-sussmann-trump-russia.html\" target=\"_blank\" rel=\"noopener\">New York Times<\/a><\/em>. And Neustar claimed it collected it to monitor for data breaches.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>DNS lookups are records that show that a certain IP address connected to another IP address on the internet; they don\u2019t contain anything more sensitive, like the content of the communication.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"37.385761589404\"><\/p>\n<p>\u201cNeustar can\u2019t see the contents of any other Internet traffic, like web pages, emails, or Zoom calls. They can only see the DNS lookups, they can only see requests for names and where they came from. Imagine your company is a Neustar client, and you attempted to visit ExpertSexChange.com. They\u2019ll see this fact,\u201d <a href=\"https:\/\/www.vice.com\/en\/article\/k78d3x\/this-hacker-took-control-of-his-professors-computer-after-missing-a-deadline\">Rob Graham<\/a>, a cybersecurity expert, <a href=\"https:\/\/cybersect.substack.com\/p\/did-rogue-techies-spy-on-the-president\" target=\"_blank\" rel=\"noopener\">wrote in a blog<\/a> discussing the controversial story. \u201cIt\u2019s a privacy and security concern, but not necessarily a big one. What these companies can see into your activities is minor compared to the big cybersecurity protections they provide.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>Nicholas Weaver, a senior researcher at the International Computer Science Institute at UC Berkeley, told Motherboard in an email that \u201cthe data was almost certainly from one of the general-purpose DNS security feeds, you don&#8217;t \u2018infiltrate\u2019 any particular servers to get it and it includes a gazillion institutions.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>This type of data is used to monitor networks for cybersecurity threats and not something more nefarious, which is something Durham\u2019s people should know, \u201cand the propagandists at Fox News also know they are being deliberately deceptive.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"19.105882352941\"><\/p>\n<p><em><strong>Subscribe to our cybersecurity podcast,&nbsp;<a href=\"https:\/\/itunes.apple.com\/gb\/podcast\/cyber\/id1441708044?mt=2\" target=\"_blank\" rel=\"noopener\">CYBER<\/a>. Subscribe to&nbsp;<a href=\"https:\/\/www.twitch.tv\/motherboardtv\" target=\"_blank\" rel=\"noopener\">our new Twitch channel<\/a>.<\/strong><\/em><\/p>\n<p><\/span><\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33115\/Right-Wingers-Try-To-Spin-DNS-Traffic-Logged-As-Intercepting-Emails.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":45320,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9865],"class_list":["post-45319","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentemailusarussiadnsspyware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Right Wingers Try To Spin DNS Traffic Logged As Intercepting Emails 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Right Wingers Try To Spin DNS Traffic Logged As Intercepting Emails 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-16T16:41:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Right Wingers Try To Spin DNS Traffic Logged As Intercepting Emails\",\"datePublished\":\"2022-02-16T16:41:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/\"},\"wordCount\":718,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails.jpg\",\"keywords\":[\"headline,government,email,usa,russia,dns,spyware\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/\",\"name\":\"Right Wingers Try To Spin DNS Traffic Logged As Intercepting Emails 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails.jpg\",\"datePublished\":\"2022-02-16T16:41:25+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails.jpg\",\"width\":240,\"height\":238},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,email,usa,russia,dns,spyware\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentemailusarussiadnsspyware\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Right Wingers Try To Spin DNS Traffic Logged As Intercepting Emails\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Right Wingers Try To Spin DNS Traffic Logged As Intercepting Emails 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/","og_locale":"en_US","og_type":"article","og_title":"Right Wingers Try To Spin DNS Traffic Logged As Intercepting Emails 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-02-16T16:41:25+00:00","og_image":[{"url":"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Right Wingers Try To Spin DNS Traffic Logged As Intercepting Emails","datePublished":"2022-02-16T16:41:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/"},"wordCount":718,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails.jpg","keywords":["headline,government,email,usa,russia,dns,spyware"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/","url":"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/","name":"Right Wingers Try To Spin DNS Traffic Logged As Intercepting Emails 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails.jpg","datePublished":"2022-02-16T16:41:25+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails.jpg","width":240,"height":238},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/right-wingers-try-to-spin-dns-traffic-logged-as-intercepting-emails\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,email,usa,russia,dns,spyware","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentemailusarussiadnsspyware\/"},{"@type":"ListItem","position":3,"name":"Right Wingers Try To Spin DNS Traffic Logged As Intercepting Emails"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45319"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45319\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/45320"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}