Archive for the 'Covert Operations' Category

Next Page »

Apple Says Recent Wikileaks CIA Docs Detail Old, Fixed iPhone and Mac Exploits

March 23rd, 2017

Great, I wonder what’s in the other 99% of the Vault 7 docs… Via: TechCrunch: We have preliminarily assessed the Wikileaks disclosures from this morning. Based on our initial analysis, the alleged iPhone vulnerability affected iPhone 3G only and was fixed in 2009 when iPhone 3GS was released. Additionally, our preliminary assessment shows the alleged […]

WikiLeaks Vault 7: CIA Firmware and Other Exploits on Apple iPhones and Mac Computers

March 23rd, 2017

Via: WikiLeaks: Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ […]

A Simple Command Allows the CIA to Commandeer 318 Models of Cisco Switches

March 21st, 2017

Via: Ars Technica: Cisco Systems said that more than 300 models of switches it sells contain a critical vulnerability that allows the CIA to use a simple command to remotely execute malicious code that takes full control of the devices. There currently is no fix. Cisco researchers said they discovered the vulnerability as they analyzed […]

How Police Departments Use Civil Forfeiture to Collect Billions

March 15th, 2017

Whenever you hear about tips to the police from confidential informants or “concerned citizens,” etc. keep this in mind: U.S. Communications Intelligence Secretly Shared with Law Enforcement for Use Against Americans in Criminal Investigations. So, mass surveillance and civil forfeiture: Is there a link? “It is the height of naivete to think that once collected […]

NSA Routinely Monitors Americans’ Communications Without Warrants

March 15th, 2017

Are They building electronic dossiers on as many of us as they can? I don’t know, but it sure looks that way. —Cryptogon, 2007: NSA, AT&T and the NarusInsight Intercept Suite In Open Thread: Trump Wiretap Claims, I wrote: Where is the uproar over the spook’s data center in Utah? Man, if you think that […]

FBI Undercover Stings Foil Terrorist Plots — That It Creates

March 12th, 2017

Via: Kansas City Star: Announcements of foiled terrorist plots make for lurid reading. Schemes to carry out a Presidents Day jihadist attack on a train station in Kansas City. Bomb a Sept. 11 memorial event. Blow up a 1,000-pound bomb at Fort Riley. Detonate a weapon of mass destruction at a Wichita airport — the […]

Vault 7: CIA Hacking Tools Revealed

March 7th, 2017

If you have an active U.S. Government security clearance, you probably shouldn’t click on this. Via: Wikileaks: Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency. The first full […]

Who Controls Your Computer? (And How to Make Sure It’s You)

March 7th, 2017

Good luck with that. My paranoia doesn’t even begin to scratch the surface of this thing. Keep going, keep pushing through, and the next thing you know, you’re falling through fractals of fuckedness that endlessly reveal more fuckedness the deeper you descend. Via: François-René Rideau: At least in theory, we therefore know how to build […]

Open Thread: Trump Wiretap Claims

March 6th, 2017

I haven’t posted anything about this because I have no idea what all the fuss is about. Where is the uproar over the spook’s data center in Utah? Man, if you think that place is only used to store information gleaned from taps on foreigners, I’ve got a bridge to sell you. Retroactive surveillance? Remember […]

Why Amazon’s Data Centers Are Hidden in Spy Country

March 2nd, 2017

Yeah, I guess you’d be nuts to think that Amazon built out infrastructure in this area to be in close proximity to CIA. That’s just a coincidence, as usual: The fact that northern Virginia is home to major intelligence operations and to major nodes of network infrastructure isn’t exactly a sign of government conspiracy so […]

Next Page »