Archive for the 'Covert Operations' Category

« Previous PageNext Page »

Yes, Mildred, Your Cell Phone Is Used to Track Your Position on the Ground

August 24th, 2014

Keep in mind, what they’re talking about here is just the mobile network information. Most phones have GPS radios built in now, so I’d assume that the position data is accurate to within a couple of meters when the observers are the Five Eyes states. What I don’t know is how often they activate the […]

Foley Video with Briton Was… Staged?

August 24th, 2014

The Foley CPR Doll theory has been circulating right from the start. It’s interesting that we now have an anonymous forensics company issuing what amounts to a limited hangout to deal with the CPR doll theory. In other words, staged, yes, but still murder. Via: Telegraph: The video of James Foley’s execution may have been […]

Hagel: Threat Posed by U.S. Funded and Armed Terrorist Organization ‘Beyond Anything We’ve Seen’

August 21st, 2014

Mmm hmm. Via: Reuters: The sophistication, wealth and military might of Islamic State militants represent a major threat to the United States that may surpass that once posed by al Qaeda, U.S. military leaders said on Thursday. “They are an imminent threat to every interest we have, whether it’s in Iraq or anywhere else,” Defense […]

And Now… Former CIA Officer: ‘A Lot of Communication’ Between ISIS, Mexican Cartels

August 21st, 2014

U.S. Intelligence Connections to Mexican Cartels – Check U.S. Funded and Armed “ISIS” – Check Southern Border of U.S. Left Wide Open On Purpose – Check Back on 20 June, I wrote the following about the border mess: So what you have here is some sort of scam designed to get Americans to accept a […]

NSA BIOS Backdoor a.k.a. God Mode

August 18th, 2014

Via: Infosec Institute: This article is the first part of a series on NSA BIOS backdoor internals. Before we begin, I’d like to point out why these malwares are classified as “god mode.” First, most of the malware uses an internal (NSA) codename in the realms of “gods,” such as DEITYBOUNCE, GODSURGE, etc. Second, these […]

James Risen Calls Obama ‘Greatest Enemy of Press Freedom in a Generation’

August 17th, 2014

Via: Guardian: The New York Times reporter James Risen, who faces jail over his refusal to reveal a source and testify against a former CIA agent accused of leaking secrets, has called President Barack Obama “the greatest enemy of press freedom in a generation”. Speaking to his colleague Maureen Dowd, Risen accused the president of […]

Central American Gangs: Made in America

August 16th, 2014

Via: Guardian: Central America didn’t always have a gang epidemic. That was exported there by us. And the current immigration crisis is as much a United States legacy as it has become a local tragedy – a consequence of US-financed civil wars from the 1980s that sparked the first migration wave, and of US policies […]

MonsterMind: NSA’s Cyberwar Bot

August 13th, 2014

Via: Wired: Edward Snowden has made us painfully aware of the government’s sweeping surveillance programs over the last year. But a new program, currently being developed at the NSA, suggests that surveillance may fuel the government’s cyber defense capabilities, too. The NSA whistleblower says the agency is developing a cyber defense system that would instantly […]

The New NSA-Funded Code Rolls All Programming Languages Into One

August 11th, 2014

Ah yes, NSA as computer security philanthropist… Via: Vice: Hey, web developer dudes and dudettes: What’s your favorite programming language? Is it CSS? Is it JavaScript? Is it PHP, HTML5, or something else? Why choose? A new programming language developed by researchers at Carnegie Mellon University is all of those and more—one of the world’s […]

Gamma FinFisher Hacked: 40 GB of Internal Documents and Source Code of Government Malware Published

August 6th, 2014

Via: Netzpolitik (Google Cache Version): A hacker claims to have hacked a network of the surveillance technology company Gamma International and has published 40 gigabytes of internal data. A Twitter account has published release notes, price lists – and source code. Malware researchers and human rights activists welcome the publication, Gamma itself refuses to comment. […]

« Previous PageNext Page »