Archive for the 'Covert Operations' Category
Popular Security Software Came Under Relentless NSA and GCHQ Attacks
June 22nd, 2015Via: First Look: The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden. The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web […]
Obama Lawyers Asked Secret Court to Ignore Public Court’s Decision on Spying
June 11th, 2015Via: Guardian: The Obama administration has asked a secret surveillance court to ignore a federal court that found bulk surveillance illegal and to once again grant the National Security Agency the power to collect the phone records of millions of Americans for six months. The legal request, filed nearly four hours after Barack Obama vowed […]
Prime Minister of New Zealand on Mobile Phones: “You can use it as a listening device, whether it is on or not”
June 10th, 2015Via: New Zealand Herald: Prime Minister John Key gets rid of his mobile phone every few months for security reasons. Mr Key has also revealed that he would never take his phone into sensitive meetings – whether it was turned on or not – for fear that it could be turned into a listening device […]
The Upcoming ISIS Dirty Bomb…
June 10th, 2015In other news: Israel Built, Exploded ‘Dirty Bombs’ Via: Independent: The Isis militant group has seized enough radioactive material from government facilities to suggest it has the capacity to build a large and devastating “dirty” bomb, according to Australian intelligence reports. Isis declared its ambition to develop weapons of mass destruction in the most recent […]
Mass Snooping Fake Mobile Towers Uncovered in UK
June 10th, 2015Via: BBC: Fake mobile towers that scoop up data from passing phones are routinely being used in London, an investigation by Sky News suggests. Working with German security company GMSK Cryptophone, it claims to have uncovered direct evidence, the first in the UK, of at least 20 instances of the use of these cell site […]
NSA Secretly Expands Internet Spying at U.S. Border
June 4th, 2015Via: New York Times: Without public notice or debate, the Obama administration has expanded the National Security Agency’s warrantless surveillance of Americans’ international Internet traffic to search for evidence of malicious computer hacking, according to classified N.S.A. documents.
FBI Behind Mysterious Surveillance Aircraft Over U.S. Cities
June 2nd, 2015Via: AP: The FBI is operating a small air force with scores of low-flying planes across the country carrying video and, at times, cellphone surveillance technology — all hidden behind fictitious companies that are fronts for the government, The Associated Press has learned. The planes’ surveillance equipment is generally used without a judge’s approval, and […]
Pentagon Report Predicted West’s Support for Islamist Rebels Would Create ISIS
May 27th, 2015Try not to die of shock. Via: Medium: A declassified secret US government document obtained by the conservative public interest law firm, Judicial Watch, shows that Western governments deliberately allied with al-Qaeda and other Islamist extremist groups to topple Syrian dictator Bashir al-Assad. The document reveals that in coordination with the Gulf states and Turkey, […]
Leaked Report Profiles Military, Police Members of Outlaw Motorcycle Gangs
May 23rd, 2015Via: First Look: Nuclear power plant technicians, senior military officers, FBI contractors and an employee of “a highly-secretive Department of Defense agency” with a Top Secret clearance. Those are just a few of the more than 100 people with sensitive military and government connections that law enforcement is tracking because they are linked to “outlaw […]
Apple and Google Just Attended a Confidential Spy Summit in a Remote English Mansion
May 23rd, 2015Via: First Look: At an 18th-century mansion in England’s countryside last week, current and former spy chiefs from seven countries faced off with representatives from tech giants Apple and Google to discuss government surveillance in the aftermath of Edward Snowden’s leaks. The three-day conference, which took place behind closed doors and under strict rules about […]
