Archive for the 'Covert Operations' Category

« Previous PageNext Page »

‘Apple’s Silence in China Sets a Dangerous Precedent’

July 31st, 2017

Dangerous precedent? I think it’s more of a dangerous precedent du jour. Apple blocks apps for the Chinese regime. Yes, that’s bad. But Cisco built China’s god damned Great Firewall in the first place! In mentioning Apple’s, “Dangerous Precedent,” this New York Times article doesn’t mention Cisco at all. I’m definitely not defending Apple—their manufacturing […]

Genetically-Modified Cyborg Dragonfly Drone

July 10th, 2017

Via: Popular Mechanics: DragonflEye was created by genetically modifying regular dragonflies with “steering neurons” in the insect’s spinal cord, which are light sensitive. Tiny, fiber-optic-like structures in the dragonfly’s eyes send pulses of light to their brains, functionally controlling where the insect flies via remote control. The dragonfly also carries a miniature “backpack” with sensors […]

U.S. Military and Intelligence Agencies Involved in Over 1,800 Movies and TV Shows

July 5th, 2017

A few of you might remember, The American Culture Bomb from just over a decade ago… Via: Medium: We have recently acquired 4,000 new pages of documents from the Pentagon and CIA through the Freedom of Information Act. For us, these documents were the final nail in the coffin. These documents for the first time […]

Brutal Kangaroo: CIA Malware for Air Gapped Systems

June 24th, 2017

Via: WikiLeaks: Today, June 22nd 2017, WikiLeaks publishes documents from the Brutal Kangaroo project of the CIA. Brutal Kangaroo is a tool suite for Microsoft Windows that targets closed networks by air gap jumping using thumbdrives. Brutal Kangaroo components create a custom covert network within the target closed network and providing functionality for executing surveys, […]

Advanced CIA Firmware Has Been Infecting Wi-Fi Routers for Years

June 15th, 2017

Via: Ars Technica: Home routers from 10 manufacturers, including Linksys, DLink, and Belkin, can be turned into covert listening posts that allow the Central Intelligence Agency to monitor and manipulate incoming and outgoing traffic and infect connected devices. That’s according to secret documents posted Thursday by WikiLeaks. CherryBlossom, as the implant is code-named, can be […]

Booz Allen Hamilton: Federal Civil and Criminal Probe in Connection with Its Finances

June 15th, 2017

Via: NBC: Shares of Booz Allen Hamilton sank as much as 13 percent in after-hours trading after the government services firm revealed in a regulatory filing it was the subject of a federal civil and criminal probe in connection with its finances. Last year, the company derived 97 percent of its revenue from U.S. government […]

Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election

June 6th, 2017

Via: The Intercept: Russian military intelligence executed a cyberattack on at least one U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials just days before last November’s presidential election, according to a highly classified intelligence report obtained by The Intercept. The top-secret National Security Agency document, which was provided […]

Zbigniew Brzezinski Dies at 89

May 26th, 2017

Via: Bloomberg: Zbigniew Brzezinski, who as national security adviser to President Jimmy Carter advocated a hard line toward the Soviet Union and helped develop the unsuccessful military mission to rescue American hostages in Iran, has died. He was 89.

How Facebook’s Tentacles Reach Further Than You Think

May 26th, 2017

Via: BBC: Facebook’s collection of data makes it one of the most influential organisations in the world. Share Lab wanted to look “under the bonnet” at the tech giant’s algorithms and connections to better understand the social structure and power relations within the company. … “If Facebook were a country, it would be bigger than […]

CIA Malware for All Versions of Windows

May 20th, 2017

Via: WikiLeaks: Today, May 19th 2017, WikiLeaks publishes documents from the “Athena” project of the CIA. “Athena” – like the related “Hera” system – provides remote beacon and loader capabilities on target computers running the Microsoft Windows operating system (from Windows XP to Windows 10). Once installed, the malware provides a beaconing capability (including configuration […]

« Previous PageNext Page »