Archive for the 'Covert Operations' Category

Next Page »

CIA Malware for All Versions of Windows

May 20th, 2017

Via: WikiLeaks: Today, May 19th 2017, WikiLeaks publishes documents from the “Athena” project of the CIA. “Athena” – like the related “Hera” system – provides remote beacon and loader capabilities on target computers running the Microsoft Windows operating system (from Windows XP to Windows 10). Once installed, the malware provides a beaconing capability (including configuration […]

U.S. Special Forces Expanding Shadow War in Africa

May 20th, 2017

Via: Vice: Six years ago, a deputy commanding general for U.S. Army Special Operations Command gave a conservative estimate of 116 missions being carried out at any one time by Navy SEALs, Army Green Berets, and other special operations forces across the globe. Today, according to U.S. military documents obtained by VICE News, special operators […]

Microsoft Releases WannaCry Patch for PCs Running Old Operating Systems

May 14th, 2017

I’m responsible for protecting some organizations from stuff like this. Here’s what I do: #1 If Windows is used, only operating systems currently supported by Microsoft are allowed. Even though I personally don’t use Macs, I encourage companies to use them and welcome those users who do use Macs. If you don’t know anything about […]

An NSA-Derived Ransomware Worm Is Shutting Down Computers Worldwide

May 12th, 2017

I don’t know what it’s going to take to convince people to stop using abandoned versions of Windows, but if this doesn’t do it, nothing will. Via: Ars Technica: A highly virulent new strain of self-replicating ransomware shut down computers all over the world, in part by appropriating a National Security Agency exploit that was […]

Unmanned U.S. Air Force Space Plane Lands After Secret, Two-Year Mission

May 7th, 2017

Via: Reuters: The U.S. military’s experimental X-37B space plane landed on Sunday at NASA’s Kennedy Space Center in Florida, completing a classified mission that lasted nearly two years, the Air Force said. The unmanned X-37B, which resembles a miniature space shuttle, touched down at 7:47 a.m. EDT (1147 GMT) on a runway formerly used for […]

NSA Blimp Spied in the United States

April 24th, 2017

Via: The Intercept: To residents of Maryland, catching an occasional glimpse of a huge white blimp floating in the sky is not unusual. For more than a decade, the military has used the state as a proving ground for new airships destined for Afghanistan or Iraq. But less known is that the test flights have […]

Japan Made Secret Deals with the NSA that Expanded Global Surveillance

April 24th, 2017

Via: The Intercept: The documents, published Monday in collaboration with Japanese news broadcaster NHK, reveal the complicated relationship the NSA has maintained with Japan over a period of more than six decades. Japan has allowed NSA to maintain at least three bases on its territory and contributed more than half a billion dollars to help […]

Leaked NSA Tools Compromising Vulnerable, Unpatched Windows Systems

April 23rd, 2017

Exposing SMB to the Internet on unpatched Windows machines… *shaking head while chortling deeply* NSA exploits or no NSA exploits, people who do this on purpose are idiots and better make their time. Via: Register: The NSA’s Equation Group hacking tools, leaked last Friday by the Shadow Brokers, have now been used to infect thousands […]

Five Eyes Meeting in New Zealand

April 20th, 2017

Via: New Zealand Herald: The highly secretive meeting being held in Queenstown this weekend is a gathering of intelligence and security agencies related to the Five Eyes spying network, the Herald understands. Among the people believed to be attending are Federal Bureau of Investigation (FBI) director James Comey and Central Intelligence Agency (CIA) director Mike […]

Top Obama Adviser Used NSA Intercepts to Learn Names of Trump Associates

April 4th, 2017

Via: Bloomberg: White House lawyers last month learned that the former national security adviser Susan Rice requested the identities of U.S. persons in raw intelligence reports on dozens of occasions that connect to the Donald Trump transition and campaign, according to U.S. officials familiar with the matter. The pattern of Rice’s requests was discovered in […]

Next Page »