Every move you make. Every click you take. Every game you play. Every place you stay. They’ll be watching you. It’s time to come to terms with the fact that regardless of how “off the grid” or “careful” or “Gray” you THINK you are online, you have been made. An extensive online profile exist…
Category: Communications
Examining Terrorist Tactics: The Jihadist Comms Toolkit
A new report documents how extremist groups’ use of secure digital tools software has evolved. “I don’t think that there are too many [makers of encrypted communication tools who] can say that bad guys don’t use their stuff, accurately,” NSA deputy director Richard Ledgett said during the recent Defense One Tech Summit, describing ISIS’ use…
Espionage Files: How Putin Weaponized Wiki-Leaks
Evidence suggests that a Russian intelligence group was the source of the most recent Wikileaks intel dump, which was aimed to influence the U.S. election. Close your eyes and imagine that a hacking group backed by Russian President Vladimir Putin broke into the email system of a major U.S. political party. The group stole thousands…
How The Media Covers Up Muslim and #BlackLivesMatter Terrorism
I seem to remember saying something exactly like this? Thanks Daniel for a great article. -SF Daniel Greenfield, a Shillman Journalism Fellow at the Freedom Center, is a New York writer focusing on radical Islam. No sooner are the bloodstains and bits of human flesh hosed off the concrete from the latest Muslim or #BlackLivesMatter…
Surveillance State: Police CANNOT Track Your Cell Phone Without A Warrant Now
In a first, a Manhattan federal judge presiding over a narcotics case has decided that drug evidence obtained through cell phone surveillance technology called “Stingray” won’t be admissible in court. StingRay (also known as “Hailstorm” or “TriggerFish”) is an “IMSI catcher“ basically acts like a cell phone tower, and sends out signals which force cell…
OPSEC Tradecraft: Modern Clandestine Groups Face New Challenges
There were no mobile phones or recording devices allowed at this bizarre encounter. The digital era is perceived as posing new threats to the security of terror groups in Ireland in terms of their being tracked and covertly recorded. Source: The Guardian Bottom Line Up Front Compartmentation via unlinking Strict anti forensic practices to mitigate…
Surveillance State: Secret Rules Make it Easy for the FBI to Spy on Journalist
SECRET FBI RULES allow agents to obtain journalists’ phone records with approval from two internal officials — far less oversight than under normal judicial procedures. The classified rules, obtained by The Intercept and dating from 2013, govern the FBI’s use of national security letters, which allow the bureau to obtain information about journalists’ calls without going to a…
Deconstructing Terrorism: World-Check Terrorism Database Exposed
A financial crime database used by banks has been “leaked” on to the net. World-Check Risk Screening contains details about people and organisations suspected of being involved in terrorism, organised crime and money laundering, among other offences. Access is supposed to be restricted under European privacy laws. The database’s creator, Thomson Reuters, has confirmed an…
Surveillance State: Biometrics Coming To A Bank Near You Very Soon
The banking password may be about to expire — forever. Some of the nation’s largest banks, acknowledging that traditional passwords are either too cumbersome or no longer secure, are increasingly using fingerprints, facial scans and other types of biometrics to safeguard accounts. Millions of customers at Bank of America, JPMorgan Chase and Wells Fargo routinely…
Surveillance State: The F.B.I.’s Growing Surveillance Gap
There are more homegrown jihadists than the feds can actually watch. And not everyone likes what the FBI is doing instead. A day after Omar Mateen killed 49 and wounded 53 in an Orlando nightclub, purportedly under the banner of the Islamic State or other terrorist groups, the FBI announced that it had repeatedly scrutinized…