Archive for the 'Covert Operations' Category

Next Page »

Brutal Kangaroo: CIA Malware for Air Gapped Systems

June 24th, 2017

Via: WikiLeaks: Today, June 22nd 2017, WikiLeaks publishes documents from the Brutal Kangaroo project of the CIA. Brutal Kangaroo is a tool suite for Microsoft Windows that targets closed networks by air gap jumping using thumbdrives. Brutal Kangaroo components create a custom covert network within the target closed network and providing functionality for executing surveys, […]

Advanced CIA Firmware Has Been Infecting Wi-Fi Routers for Years

June 15th, 2017

Via: Ars Technica: Home routers from 10 manufacturers, including Linksys, DLink, and Belkin, can be turned into covert listening posts that allow the Central Intelligence Agency to monitor and manipulate incoming and outgoing traffic and infect connected devices. That’s according to secret documents posted Thursday by WikiLeaks. CherryBlossom, as the implant is code-named, can be […]

Booz Allen Hamilton: Federal Civil and Criminal Probe in Connection with Its Finances

June 15th, 2017

Via: NBC: Shares of Booz Allen Hamilton sank as much as 13 percent in after-hours trading after the government services firm revealed in a regulatory filing it was the subject of a federal civil and criminal probe in connection with its finances. Last year, the company derived 97 percent of its revenue from U.S. government […]

Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election

June 6th, 2017

Via: The Intercept: Russian military intelligence executed a cyberattack on at least one U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials just days before last November’s presidential election, according to a highly classified intelligence report obtained by The Intercept. The top-secret National Security Agency document, which was provided […]

Zbigniew Brzezinski Dies at 89

May 26th, 2017

Via: Bloomberg: Zbigniew Brzezinski, who as national security adviser to President Jimmy Carter advocated a hard line toward the Soviet Union and helped develop the unsuccessful military mission to rescue American hostages in Iran, has died. He was 89.

How Facebook’s Tentacles Reach Further Than You Think

May 26th, 2017

Via: BBC: Facebook’s collection of data makes it one of the most influential organisations in the world. Share Lab wanted to look “under the bonnet” at the tech giant’s algorithms and connections to better understand the social structure and power relations within the company. … “If Facebook were a country, it would be bigger than […]

CIA Malware for All Versions of Windows

May 20th, 2017

Via: WikiLeaks: Today, May 19th 2017, WikiLeaks publishes documents from the “Athena” project of the CIA. “Athena” – like the related “Hera” system – provides remote beacon and loader capabilities on target computers running the Microsoft Windows operating system (from Windows XP to Windows 10). Once installed, the malware provides a beaconing capability (including configuration […]

U.S. Special Forces Expanding Shadow War in Africa

May 20th, 2017

Via: Vice: Six years ago, a deputy commanding general for U.S. Army Special Operations Command gave a conservative estimate of 116 missions being carried out at any one time by Navy SEALs, Army Green Berets, and other special operations forces across the globe. Today, according to U.S. military documents obtained by VICE News, special operators […]

Microsoft Releases WannaCry Patch for PCs Running Old Operating Systems

May 14th, 2017

I’m responsible for protecting some organizations from stuff like this. Here’s what I do: #1 If Windows is used, only operating systems currently supported by Microsoft are allowed. Even though I personally don’t use Macs, I encourage companies to use them and welcome those users who do use Macs. If you don’t know anything about […]

An NSA-Derived Ransomware Worm Is Shutting Down Computers Worldwide

May 12th, 2017

I don’t know what it’s going to take to convince people to stop using abandoned versions of Windows, but if this doesn’t do it, nothing will. Via: Ars Technica: A highly virulent new strain of self-replicating ransomware shut down computers all over the world, in part by appropriating a National Security Agency exploit that was […]

Next Page »