Archive for the 'Covert Operations' Category
Massive U.S. Military Social Media Spying Archive Left Wide Open in AWS S3 Buckets
November 18th, 2017Via: The Register: Three misconfigured AWS S3 buckets have been discovered wide open on the public internet containing “dozens of terabytes” of social media posts and similar pages – all scraped from around the world by the US military to identify and profile persons of interest. The archives were found by UpGuard’s veteran security-breach hunter […]
Hive: CIA Infrastructure to Control Its Malware
November 9th, 2017Via: Wikileaks: Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware. Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no […]
Nothing to Hide
October 29th, 2017Via: Vimeo: NOTHING TO HIDE (Oct. 2016) is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
DoD Plans Solar-Storm-Based National Blackout Drill During Antifa Protests In November
October 27th, 2017Via: ZeroHedge: According to The National Association for Amateur Radio (ARRL), elements of the US Department of Defense (DOD) will simulate a “communications interoperability” training exercise across the United States on November 04-06. The announcement released on October 24 has not been widely distributed to the media, because the drill is simulating a total grid […]
U.S. Widens Surveillance to Include ‘Homegrown Violent Extremists’
October 25th, 2017Mmm hmm. Via: Reuters: The U.S. government has broadened an interpretation of which citizens can be subject to physical or digital surveillance to include “homegrown violent extremists,” according to official documents seen by Reuters. The change last year to a Department of Defense manual on procedures governing its intelligence activities was made possible by a […]
Tech Firms Seek Washington’s Prized Asset: Top-Secret Clearances
October 23rd, 2017Via: Bloomberg: In doing so, companies such as Facebook Inc. are competing with defense contractors, financial firms and the U.S. government itself. Security clearances are a rare and valued commodity, whether at a bank trying to prevent hackers from stealing credit-card data and emptying accounts or at a manufacturer building parts for a stealth fighter […]
‘Why ProtonMail Is More Secure Than Gmail’
October 23rd, 2017Disclosure: I have no relationship with ProtonMail, besides being a user of the service. — While I wouldn’t assume that ProtonMail is as secure as they claim it to be, what is very clear is that far less of your personal information is going to leak from ProtonMail than it would from Gmail, which essentially […]
UK Spies Using Social Media Data for Mass Surveillance
October 18th, 2017Via: TechCrunch: Privacy rights group Privacy International says it has obtained evidence for the first time that UK spy agencies are collecting social media information on potentially millions of people. It has also obtained letters it says show the intelligence agencies’ oversight body had not been informed that UK intelligence agencies had shared bulk databases […]
Where in the World is Jesus Campos?
October 16th, 2017Private security is in front of his house. A reporter named Laura Loomer managed to get what amounted to a “no comment” from someone inside the Campos home. Leave comments on: Las Vegas: Worst Mass Shooting in U.S. History Via: Los Angeles Times: The story seemed straightforward: The unarmed security guard approached Stephen Paddock’s room […]
To The Stars Academy Financials
October 16th, 2017While I just scoffed at the offering and moved on, these guys looked into it a bit further. Via: UFO Seekers: Related: Tom Delonge Asking for People to Invest in His UFO PSYOP
