Archive for the 'Covert Operations' Category
The Singapore Hotel Where Top Brass, Weapons Manufacturers and Spies Rub Shoulders
June 3rd, 2018Via: Reuters: For the region’s military officers, diplomats, weapons manufacturers and spies, there are few livelier places than the lobby of Singapore’s Shangri-La hotel around mid-year. Here, beneath pillared ceilings and chandeliers, they gather for an annual informal bash – called the Shangri-La Dialogue – organized by the London-based International Institute for Strategic Studies.
Microsoft Wins Lucrative Cloud Deal with Intelligence Community
May 27th, 2018Via: Bloomberg: Microsoft Corp. said it’s secured a lucrative cloud deal with the intelligence community that marks a rapid expansion by the software giant into a market led by Amazon.com Inc. The deal, which the company said Wednesday is worth hundreds of millions of dollars, allows 17 intelligence agencies and offices to use Microsoft’s Azure […]
Amazon Selling Face-Recognition Tech to Police
May 22nd, 2018Amazon, a large CIA contractor, is selling face-recognition tech to police. Via: AP: The American Civil Liberties Union and other privacy activists are asking Amazon to stop marketing a powerful facial recognition tool to police, saying law enforcement agencies could use the technology to “easily build a system to automate the identification and tracking of […]
Japan: Directorate for Signals Intelligence
May 21st, 2018Via: The Intercept: The directorate has a history that dates back to the 1950s; its role is to eavesdrop on communications. But its operations remain so highly classified that the Japanese government has disclosed little about its work – even the location of its headquarters. Most Japanese officials, except for a select few of the […]
DIA Report on Warp Drive, Extra Dimensions, Anti-Gravity
May 16th, 2018This seems to be associated with the Tom DeLonge/To the Stars PSYOP. At best, this is a limited hangout. Via: The Drive: The modern understanding of the Pentagon’s relationship with unexplained flying phenomena has become remarkably more pointed in the last six months since the Advanced Aviation Threat Identification Program was uncovered. Its disclosure came […]
EFAIL: Critical Flaw in PGP Implementations in Email Clients
May 16th, 2018Via: EFAIL: The EFAIL attacks exploit vulnerabilities in the OpenPGP and S/MIME standards to reveal the plaintext of encrypted emails. In a nutshell, EFAIL abuses active content of HTML emails, for example externally loaded images or styles, to exfiltrate plaintext through requested URLs.
The Strange Case of Christopher Snyder
May 9th, 2018Via: Heavy: A 41-year-old man who claimed to have a classified military past killed three people inside his neighbor’s house after a domestic dispute with his wife and then fatally shot himself during a standoff with police, authorities say. Christopher Wilson Snyder, of Brookeville, Maryland, was found dead inside his home Monday night, more than […]
CIA Emails to Journalists Don’t Have to be Released to Public, Judge Rules
May 3rd, 2018Via: McClatchy: The CIA can selectively divulge classified information to selected reporters in emails yet withhold that information from other journalists or members of the public when they seek the same information under the Freedom of Information Act, a federal judge in New York has ruled. … Judge Colleen McMahon of the Southern District of […]
Dark Journalist X-Series: Pine Gap
April 28th, 2018Dark Journalist is slowly and carefully weaving many strange threads together with his outstanding X-Series. I usually post this sort of material on the Cryptogon Backchannel, but I’m posting this to the main page because Pine Gap is a standard Cryptogon topic, in terms of the surveillance and communications aspects of the facility that we’re […]
Palantir Using War on Terror Tools to Track American Citizens
April 19th, 2018Via: Bloomberg: The LAPD uses Palantir’s Gotham product for Operation Laser, a program to identify and deter people likely to commit crimes. Information from rap sheets, parole reports, police interviews, and other sources is fed into the system to generate a list of people the department defines as chronic offenders, says Craig Uchida, whose consulting […]
