Archive for the 'Covert Operations' Category
Experts Unmask ‘Regin’ Trojan as NSA Tool
January 27th, 2015Via: Spiegel: Just weeks ago, SPIEGEL published the source code of an NSA malware program known internally as QWERTY. Now, experts have found that it is none other than the notorious trojan Regin, used in dozens of cyber attacks around the world.
How the CIA Made Google
January 27th, 2015This is a really good one. Via: Medium: Google styles itself as a friendly, funky, user-friendly tech firm that rose to prominence through a combination of skill, luck, and genuine innovation. This is true. But it is a mere fragment of the story. In reality, Google is a smokescreen behind which lurks the US military-industrial […]
Snowden: iPhone Includes Surveillance App
January 24th, 2015Shocker. Via: Sputnik News: Former US National Security Agency (NSA) contractor Edward Snowden never uses an iPhone as this device has software able to collect personal information regarding its owner, the whistleblower’s lawyer said Monday. “Edward never uses an IPhone, he’s got a simple phone… The iPhone has special software that can activate itself without […]
Flashback 2009: Drug Money Saved Banks in Global Crisis
January 22nd, 2015Via: Guardian: Drugs money worth billions of dollars kept the financial system afloat at the height of the global crisis, the United Nations’ drugs and crime tsar has told the Observer. Antonio Maria Costa, head of the UN Office on Drugs and Crime, said he has seen evidence that the proceeds of organised crime were […]
The Birth of D Weapons
January 17th, 2015Via: Spiegel: According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially […]
Leaked Palantir Doc Reveals Uses, Specific Functions and Key Clients
January 12th, 2015Via: TechCrunch: Palantir’s data analysis solution targets three industries: government, the finance sector and legal research. Each of these industries must wrestle with massive sets of data. To do this, Palantir’s toolsets are aimed at massive data caches, allowing litigators and the police to make connections otherwise invisible. For example, a firm hired by the […]
Who Is Watching You?
December 29th, 2014Via: Medium: We are living in a Dragnet Nation?—?a world of indiscriminate tracking where institutions are stockpiling data about individuals at an unprecedented pace. The rise of indiscriminate tracking is powered by the same forces that have brought us the technology we love so much?—?powerful computing on our desktops, laptops, tablets, and smartphones. Before computers […]
NSA Reports It May Have Broken Laws With Decade of Spying on U.S. Citizens
December 25th, 2014Oh sure, it’s just a few bad apples, combined with people making mistakes plus some coincidences. Nothing to see here. Maintain Christmas stupor. Situation normal. Via: Bloomberg: The National Security Agency today released reports on intelligence collection that may have violated the law or U.S. policy over more than a decade, including unauthorized surveillance of […]
CIA Travel Advice to Operatives
December 21st, 2014Via: Wikileaks: The highlighted box titled “The Importance of Maintaining Cover––No Matter What” at the end of the document provides an example of an occasion when a CIA officer was selected for secondary screening at an EU airport. During the screening his baggage was swiped and traces of explosives found. The officer “gave the cover […]
Major Flaws in Mobile Communications Routing System
December 19th, 2014Bugs or features? Via: Washington Post: German researchers have discovered security flaws that could let hackers, spies and criminals listen to private phone calls and intercept text messages on a potentially massive scale – even when cellular networks are using the most advanced encryption now available. The flaws, to be reported at a hacker conference […]
