Big Brother Goes Digital: The Feds’ Race to Integrate Mobile IDs in America The push to develop digital ID and expand its use in the US is receiving a boost as the country’s National Institute of Standards and Technology (NIST) is launching a new project. NIST’s National Cybersecurity Center of Excellence (NCCoE) has teamed up with…
Category: Cyber Espionage
The Surveillance State: Surveillance Capitalism
H/T: WRSA Surveillance Capitalism and PsyWar Surveillance capitalism is a novel economic system that has emerged in the digital era. It is characterized by the unilateral claim of private human experience as free raw material for translation into behavioral data. In this version of capitalism, predicting and influencing behavior (political and economic) rather than producing…
Cyber-Warfare: Crowdstrike Responsible for Global Microsoft IT Outage
IT outages reported across globe as airlines, airports, banks and media companies experience disruptions Crowdstrike, the U.S. cybersecurity company, has admitted to being responsible for the error and are working to correct it.
4GW: The U.S. is unprepared for attacks on critical infrastructure
H/T Montana The U.S. is unprepared for attacks on critical infrastructure Like Cyber Polygon, RAND’s ‘Inverted Rook’ wargame warns of catastrophic cyber attacks leading to societal breakdown: perspective The United States is unprepared for attacks on critical infrastructure, according to a wargame simulated by the RAND Corporation. Prepared for the head of the…
The Surveillance State: France Introduces AI-Powered Mass Surveillance
France Introduces AI-Powered Mass Surveillance With the Excuse of Keeping People Safe So, Globo Homo is currently in the process of installing Skynet to keep us “Safe” If you are Gen-X and grew up in the 80’s, I don’t have to tell you what comes next.
Surveillance State 101: How to Find an Apple AirTag Hidden in Your Car
How to Find an Apple AirTag Hidden in Your Car Apple AirTags are useful devices for locating commonly misplaced items like keys and wallets, but they can also be hijacked for more sinister purposes, such as tracking your whereabouts without your knowledge or consent. For a rogue AirTag to reveal meaningful surveillance information to…
The Surveillance State: Slouching Toward Global Digital I.D.’s
Via: NC Renegade Retailers Starting To Require ID To Shop In Their Stores? I generally don’t post videos, because they take time to watch and I would prefer to read a story rather than have it spoken to me, but I made an exception here. Read the comments below the video as well….
AI Generated CCTV Footage Non-Admissible?
Sign of Sporky Times to Come?
Municipal Water Authority of Aliquippa hacked by Iranian-backed cyber group As we move forward toward what is sure to be a Sporky New Year, remember the basics of Fourth Generation Warfare, with the most fundamental being Cyber-Attacks. If this is a pre-cursor of what is to come, expect more attacks like these on banking…
Cyber-Crime 101: How Hacker’s Launder Their Stolen Loot
Hackers Use Online Casinos to Gamble Mountains of Cash They Steal from Victims I find it fascinating that despite how complex things become in the cyber-world, the fundamentals of crime remain the same. Criminals will always have to launder their ill-gotten gains somehow and casino’s, especially online casinos, provide the best way to do…