Archive for the 'Covert Operations' Category
Hillary Clinton’s Private Email Server Contained Information of Special Access Programs
January 20th, 2016Via: NBC: Emails from Hillary Clinton’s home server contained information classified at levels higher than previously known, including a level meant to protect some of the most sensitive U.S. intelligence, according to a document obtained by NBC News. In a letter to lawmakers, the intelligence community’s internal watchdog says some of Clinton’s emails contained information […]
U.S. Intelligence Director’s Personal E-Mail, Phone Hacked
January 13th, 2016Via: Ars Technica: The same individual or group claiming to be behind a recent breach of the personal e-mail account of CIA Director John Brennan now claims to be behind the hijacking of the accounts of Director of National Intelligence James Clapper. The Office of the Director of National Intelligence confirmed to Motherboard that Clapper […]
Microsoft Keeping Disk Encryption Keys for Those Signing Into Windows 10 Using Microsoft Accounts
December 29th, 2015Via: The Intercept: One of the excellent features of new Windows devices is that disk encryption is built-in and turned on by default, protecting your data in case your device is lost or stolen. But what is less well-known is that, if you are like most users and login to Windows 10 using your Microsoft […]
Probable Government Backdoors Found on Juniper Firewalls
December 19th, 2015Via: Wired: On Thursday, tech giant Juniper Networks revealed in a startling announcement that it had found “unauthorized” code embedded in an operating system running on some of its firewalls. The code, which appears to have been in multiple versions of the company’s ScreenOS software going back to at least August 2012, would have allowed […]
The Secret Surveillance Catalogue
December 18th, 2015Via: The Intercept: Concerned about the militarization of law enforcement, a source within the intelligence community has provided The Intercept with a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies. Some of the devices are already in use by federal law enforcement and local […]
ISIS Twitter Accounts Run from British Government IP Addresses
December 15th, 2015Maybe honeypots. Maybe not. In other news, ISIS Armed with U.S. Weapons. Via: Russia Today: At least three Islamic State (IS, formerly ISIS) supporters’ social media accounts are run from IP addresses linked to the British government’s Department for Work and Pensions (DWP), a group of hackers has claimed. The group of teenage computer experts, […]
U.S. Drone Whistleblowers Have Their Bank Accounts Frozen
December 7th, 2015Via: Hang the Bankers: The U.S. Government failed to deter them through threats of criminal prosecution, and clumsy attempts to intimidate their families. Now four former Air Force drone operators-turned-whistleblowers have had their credit cards and bank accounts frozen, according to human rights attorney Jesselyn Radack. “My drone operators went public this week and now […]
Russia Says It Has Proof Turkey Involved in Islamic State Oil Trade
December 2nd, 2015Via: Reuters: Russia’s defense ministry said on Wednesday it had proof that Turkish President Tayyip Erdogan and his family were benefiting from the illegal smuggling of oil from Islamic State-held territory in Syria and Iraq. Moscow and Ankara have been locked in a war of words since last week when a Turkish air force jet […]
The Secret Message Hidden in Every HTTP/2 Connection
November 30th, 2015Via: jgc: If you spy on an HTTP/2 connection starting up you’ll notice that it sends an almost-but-not-quite valid HTTP request at the very start of the connection… Written a little more clearly that’s: PRI * HTTP2.0 SM The HTTP verb is PRI and the body contains just SM. Put them together and you get… […]
British Government Compensates Women Who Spent Years in Fake Relationships with Undercover Cops
November 25th, 2015Via: Guardian: Back then, the public knew little about a covert operation that had been running since 1968. Only a limited number of senior police officers knew about it. Kennedy was one of more than 100 undercover officers who, over the previous four decades, had transformed themselves into fake campaigners for years at a time, […]
