Archive for the 'Covert Operations' Category
‘Apple’s Silence in China Sets a Dangerous Precedent’
July 31st, 2017Dangerous precedent? I think it’s more of a dangerous precedent du jour. Apple blocks apps for the Chinese regime. Yes, that’s bad. But Cisco built China’s god damned Great Firewall in the first place! In mentioning Apple’s, “Dangerous Precedent,” this New York Times article doesn’t mention Cisco at all. I’m definitely not defending Apple—their manufacturing […]
Genetically-Modified Cyborg Dragonfly Drone
July 10th, 2017Via: Popular Mechanics: DragonflEye was created by genetically modifying regular dragonflies with “steering neurons” in the insect’s spinal cord, which are light sensitive. Tiny, fiber-optic-like structures in the dragonfly’s eyes send pulses of light to their brains, functionally controlling where the insect flies via remote control. The dragonfly also carries a miniature “backpack” with sensors […]
U.S. Military and Intelligence Agencies Involved in Over 1,800 Movies and TV Shows
July 5th, 2017A few of you might remember, The American Culture Bomb from just over a decade ago… Via: Medium: We have recently acquired 4,000 new pages of documents from the Pentagon and CIA through the Freedom of Information Act. For us, these documents were the final nail in the coffin. These documents for the first time […]
Brutal Kangaroo: CIA Malware for Air Gapped Systems
June 24th, 2017Via: WikiLeaks: Today, June 22nd 2017, WikiLeaks publishes documents from the Brutal Kangaroo project of the CIA. Brutal Kangaroo is a tool suite for Microsoft Windows that targets closed networks by air gap jumping using thumbdrives. Brutal Kangaroo components create a custom covert network within the target closed network and providing functionality for executing surveys, […]
Advanced CIA Firmware Has Been Infecting Wi-Fi Routers for Years
June 15th, 2017Via: Ars Technica: Home routers from 10 manufacturers, including Linksys, DLink, and Belkin, can be turned into covert listening posts that allow the Central Intelligence Agency to monitor and manipulate incoming and outgoing traffic and infect connected devices. That’s according to secret documents posted Thursday by WikiLeaks. CherryBlossom, as the implant is code-named, can be […]
Booz Allen Hamilton: Federal Civil and Criminal Probe in Connection with Its Finances
June 15th, 2017Via: NBC: Shares of Booz Allen Hamilton sank as much as 13 percent in after-hours trading after the government services firm revealed in a regulatory filing it was the subject of a federal civil and criminal probe in connection with its finances. Last year, the company derived 97 percent of its revenue from U.S. government […]
Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election
June 6th, 2017Via: The Intercept: Russian military intelligence executed a cyberattack on at least one U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials just days before last November’s presidential election, according to a highly classified intelligence report obtained by The Intercept. The top-secret National Security Agency document, which was provided […]
Zbigniew Brzezinski Dies at 89
May 26th, 2017Via: Bloomberg: Zbigniew Brzezinski, who as national security adviser to President Jimmy Carter advocated a hard line toward the Soviet Union and helped develop the unsuccessful military mission to rescue American hostages in Iran, has died. He was 89.
How Facebook’s Tentacles Reach Further Than You Think
May 26th, 2017Via: BBC: Facebook’s collection of data makes it one of the most influential organisations in the world. Share Lab wanted to look “under the bonnet” at the tech giant’s algorithms and connections to better understand the social structure and power relations within the company. … “If Facebook were a country, it would be bigger than […]
CIA Malware for All Versions of Windows
May 20th, 2017Via: WikiLeaks: Today, May 19th 2017, WikiLeaks publishes documents from the “Athena” project of the CIA. “Athena” – like the related “Hera” system – provides remote beacon and loader capabilities on target computers running the Microsoft Windows operating system (from Windows XP to Windows 10). Once installed, the malware provides a beaconing capability (including configuration […]
