In January, the CEO of American Superconductor publicly detailed how traditional economic espionage methods carried out by a small Chinese firm resulted in over a billion dollars in loss to his company. Since at least 2011, much attention has been given to the rampant cyber espionage threat against U.S. firms, ultimately pushing U.S. businesses to…
Category: Cyber-Security
Surveillance State: Push To Expand FBI Surveillance Authority Threatens U.S. Email Privacy Bill
Not sure if you guys have been paying attention to the clowns in the Senate lately, in typical backdoor fashion (kind of like the secret night time session where they passed CISA 74 to 21) they are attempting to pass legislation that if it goes through, Online Privacy will truly be an afterthought in the…
Surveillance State: New Israeli Facial Imaging Claims to Be Able to ID Terrorist and Pedophiles?
I know we joke a lot about national security technology becoming more and more like “Minority Report”, but folks, this is already been purchased by DHS. This is Happening. -SF “Faception” Technology can match an individual with various personality traits and types with a high level of accuracy A Tel-Aviv based start-up company says it…
Surveillance State: The FBI’s Secret Biometric Database
FBI wants to keep secret who’s stored in its massive biometric database The FBI said it would retain the data to “aid in establishing patterns of activity” to help discover new criminals when they arise. The FBI is proposing keeping information that it stores as part of a massive biometric database private — even to…
Surveillance State: Smart Policing
Power Loves the Dark Police Nationwide Are Secretly Exploiting Intrusive Technologies With the Feds’ Complicity By Matthew Harwood and Jay Stanley Can’t you see the writing on the touchscreen? A techno-utopia is upon us. We’ve gone from smartphones at the turn of the twenty-first century to smart fridges and smart cars. The revolutionary changes to…
Cyber-Security Threat Update: Don’t Get Juice-Jacked
You are racing through the airport. The low power light is blinking red. You are desperate to plug into any outlet you can find. Watch out. You could get juice jacked. Guess what? In every smart phone—no matter what the model—power and data flow through the same USB port and power cable. That creates a potential attack…
Surveillance State: Inside The NSA’s Real-Time Regional Gateway (RT-RG)
It is a very common trend to see “Counter-Terrorism” programs and technology that were once used to save American Military and Civilian lives in war get re-directed to spy on American citizens in Peace time. This is something to keep in mind with this program. -SF Relentless attacks on American military personnel at the height…
Surveillance State: Everything We Know About How the FBI Hacks People
RECENT HEADLINES WARN that the government now has greater authority to hack your computers, in and outside the US. Changes to federal criminal court procedures known as Rule 41 are to blame; they vastly expand how and whom the FBI can legally hack. But just like the NSA’s hacking operations, FBI hacking isn’t new. In…
Book Review: Playing to the Edge, American Intelligence in the Age of Terror
by Michael V. Hayden Penguin, 448 pp When Michael Hayden was a young air force officer in the 1980s, the military stationed him as an intelligence attaché in Bulgaria. There, the man who would rise to the top of the American intelligence community in the post–September 11 era lived under constant surveillance: he and his…
The Surveillance State: Twitter and Data Mining
Twitter has barred Dataminr, a service that analyzes tweets from across the globe to inform users about news events, from providing its information to US intelligence agencies, according to the Wall Street Journal. The social network has not confirmed that it cut the agencies off from the service, which claims to have informed clients about the…