As we hurtle forward into the digital, connected future, ever more objects are becoming targets for hackers and malicious software. Where once hacks only affected computers, they now bring down everything from cars to power grids and thermostats to secretive nuclear enrichment programs. So how long until a hack doesn’t just cause a nuisance or…
Category: Cyber Espionage
Modern Crime: Inside a Russian Hacker Ring
A man with intense eyes crouches over a laptop in a darkened room, his face and hands hidden by a black ski mask and gloves. The scene is lit only by the computer screen’s eerie glow. Exaggerated portraits of malicious hackers just like this keep popping up in movies and TV, despite the best efforts…
Surveillance State: DIVA Software Designed to Spot Suspicous Behavior BEFORE it Happens
The program is called Deep Intermodal Video Analytics—or DIVA—and it seeks to locate shooters and terrorists before they strike. The intelligence community is working on amping up people-recognition power to spot, in live videos, shooters and potential terrorists before they have a chance to attack. Part of the problem with current video surveillance techniques is the difficulty…
Future Warfare: 21st Century DIY Insurgency
It started innocuously enough. The prime minister-for-life never missed the annual “Liberation Day” parade. With the drums and platoons thundering, nobody noticed as the quadcopter, barely larger than a sparrow, floated down toward the dais, its faint whirr drowned out by the industrial machinery rolling by in formation. It was at once a child’s birthday…
Surveillance State: Inside The NSA’s Real-Time Regional Gateway (RT-RG)
It is a very common trend to see “Counter-Terrorism” programs and technology that were once used to save American Military and Civilian lives in war get re-directed to spy on American citizens in Peace time. This is something to keep in mind with this program. -SF Relentless attacks on American military personnel at the height…
Surveillance State: Everything We Know About How the FBI Hacks People
RECENT HEADLINES WARN that the government now has greater authority to hack your computers, in and outside the US. Changes to federal criminal court procedures known as Rule 41 are to blame; they vastly expand how and whom the FBI can legally hack. But just like the NSA’s hacking operations, FBI hacking isn’t new. In…
Book Review: Playing to the Edge, American Intelligence in the Age of Terror
by Michael V. Hayden Penguin, 448 pp When Michael Hayden was a young air force officer in the 1980s, the military stationed him as an intelligence attaché in Bulgaria. There, the man who would rise to the top of the American intelligence community in the post–September 11 era lived under constant surveillance: he and his…
The Surveillance State: Twitter and Data Mining
Twitter has barred Dataminr, a service that analyzes tweets from across the globe to inform users about news events, from providing its information to US intelligence agencies, according to the Wall Street Journal. The social network has not confirmed that it cut the agencies off from the service, which claims to have informed clients about the…
The Surveillance State: Phone Database Security Called into Question
As if Illegal Mass Surveillance does not have enough downside, now it has also become a National Security risk??? -SF Federal officials fear that national security may have been jeopardized when the company building a sensitive phone-number database violated a federal requirement that only U.S. citizens work on the project. The database is significant because…
The Surveillance State: Spy Chief Might Reveal Number of “Accidentally Surveilled”” Americans
“U.S. Persons Caught INCIDENTALLY in Internet Surveillance…” HA!! Where have we heard that before? -SF Director of National Intelligence James Clapper said on Monday his office is considering options to obtain and publicly disclose an estimate of the number of U.S. persons caught incidentally in Internet surveillance intended for foreign targets. “We are looking at…