Archive for the 'Covert Operations' Category

« Previous PageNext Page »

‘Pokémon Go’: Government Surveillance App?

July 14th, 2016

For commentary on this, I’d mainly offer my 2012 piece: Ingress: Google’s Strange New Game Flash forward to 2016 and Pokémon Go offers the same soft control, but now with mass appeal. You might be thinking, mass appeal? What? With 10-year-olds? It turns out that in the swipetarded zombie apocalypse, “Pokémon Go tops Twitter’s daily […]

U.S. Officials Refuse to Comment on Reports That CIA Weapons for Syria “Rebels” Stolen Again

July 13th, 2016

I don’t know who this is or when it happened, but it’s at the U.S. State Department. If you look in the background, the screen says state.gov. In any event, this is definitely one for your Not The Onion file folder. Via: WTFRLY:

How “Fansmitter” Malware Can Steal Data from Air-Gapped Computers

June 30th, 2016

Via: MIT Technology Review: Changing a computer’s fan speed produces an audio signal that can be hijacked to steal data, say computer security experts who have tested the technique. … Fansmitters are simple in principle. Almost all computers use fans to cool the main CPU and the graphics card, and to pump air through the […]

Fast and Furious: Gun Used in Paris Terrorist Attacks Came from Phoenix

June 30th, 2016

Via: Judicial Watch: One of the guns used in the November 13, 2015 Paris terrorist attacks came from Phoenix, Arizona where the Obama administration allowed criminals to buy thousands of weapons illegally in a deadly and futile “gun-walking” operation known as “Fast and Furious.” A Report of Investigation (ROI) filed by a case agent in […]

While Brazil Was Eradicating Zika Mosquitoes, America Made Them Into Weapons

June 24th, 2016

Via: Atlas Obscura: In the 1950s, while in South America military-like brigades were hunting down Aedes aegypti, in the United States, the Army was falling in love with the same mosquito. At Fort Detrick, the military’s biological weapons base in Maryland, in great secret, Army scientists were considering how fleas, grasshoppers, and mosquitoes might be […]

GCHQ Spy Programme with Secret Link to Scottish Police

June 12th, 2016

Via: The National: SECRET reports leaked by US whistleblower Edward Snowden have revealed how UK mass surveillance of phone and internet activity was accessed by Scottish police forces. The documents confirm that a little-known policing body called the Scottish Recording Centre (SRC) was given access to information logs that include millions of communications data, including […]

Orlando: Mass Shooting at Nightclub

June 12th, 2016

Judge Napolitano: “Nobody Died Until 05:13 in the Morning” — Gun Store Owner: We Called FBI Before Orlando Shooting Via: CBS: The co-owner of a Florida gun store says his employees contacted law enforcement before the Orlando shooting after gunman Omar Mateen attempted to purchase body armor and ammunition. Robbie Abell, co-owner of Lotus Gunworks, […]

Shocker: MPs’ Private Emails Are Routinely Accessed by GCHQ

June 4th, 2016

Via: Computer Weekly: GCHQ and the US National Security Agency (NSA) have access to intercepted emails sent and received by all members of the UK Parliament and peers, including with their constituents, a Computer Weekly investigation has established.

The Rise of the Meta-Criminal

June 2nd, 2016

Via: Jon Rappoport: Trevor Timm of the Electronic Freedom Frontier dug up a very interesting nugget. It was embedded in the heralded December 2013 White House task force report on spying and snooping. Under Recommendations, #31, section 2, he found this: “Governments should not use their offensive cyber capabilities to change the amounts held in […]

Article In Saudi Daily: U.S. Planned, Carried Out 9/11 Attacks – But Blames Others For Them

May 24th, 2016

Via: The Middle East Media Research Institute: …what happened in the [Twin] Towers was a purely American action, planned and carried out within the U.S. Proof of this is the sequence of continuous explosions that dramatically ripped through both buildings… Expert structural engineers demolished them with explosives, while the planes crashing [into them] only gave […]

« Previous PageNext Page »