AI Can Recognize Your Face Even If You’re Pixelated (click on above link to be re-directed to source page) With the Surveillance State growing by leaps and bounds and a camera on every street corner and passing vehicle, understanding how much Artificial Intelligence can push this invasive technology into overdrive is very important for the…
Category: Cyber-Skills
Cyber-Warfare Update: iPhone Weaknesses Made Apparent by Israeli “Digital Arms” Company
Apple boosts iPhone security after Israeli spyware reveals startling weaknesses (click on above link to be re-directed to source page) Leave it to a bunch of retired Mossad Cyber-Spies to start up a “Digital Arms” Company and wreak havok on the most “secure phone on the planet”. The Silicon “Wadi” not Valley, Strikes Again!…
Surveillance State: Ways Your Wi-Fi Router Can Spy on You
All the Ways Your Wi-Fi Router Can Spy on You (click on above link to be re-directed) Overall, not surprising news by a long shot but you may be shocked at the WAYS in which it can spy on you, specifically, programs like Wi-Key. Like all Technology in the tight hands tools like this could…
Cyber-Warfare for Sale
Hackers claim to auction NSA source code (click above title link to be re-directed to Source page) More shenanigans from State Sponsored hacking groups most likely. Just another reminder that we have not yet begun to see the true capabilities of what warfare in the fifth domain entails. Stay Alert, Stay Armed and Stay Dangerous!
Cyber Threats – 3 Easy Steps To Getting Your Door Kicked In
By Mr. A The Internet is easy to use, but the consequences of using it are hard for people to understand. Just stop and think about that. This technology can be used by almost anyone with a computer, and yet only a very small fraction of people using computers, smart phones, and tablets really understand…
Surveillance State: Proof “Being the Gray Man” is an Urban Myth
Every move you make. Every click you take. Every game you play. Every place you stay. They’ll be watching you. It’s time to come to terms with the fact that regardless of how “off the grid” or “careful” or “Gray” you THINK you are online, you have been made. An extensive online profile exist…
Espionage Files: Brit Spies Used URL Shortener to Honeypot Arab Spring Dissidents
A shadowy unit of the British intelligence agency GCHQ tried to influence online activists during the 2009 Iranian presidential election protests and the 2011 democratic uprisings largely known as the Arab Spring, as new evidence gathered from documents leaked by Edward Snowden shows. The GCHQ’s special unit, known as the Joint Threat Research Intelligence Group…
Understanding 4th Generation Warfare: The Real Paranoia Inducing Purpose of Russian Hacks
For six months, starting in the fall of 2014, I investigated a shadowy online Russian propaganda operation called the Internet Research Agency. The agency has been widely reported in Russian media to be the brainchild of Evgeny Prigozhin, an oligarch and ally of Vladimir Putin. At the time, it employed hundreds of Russians in a…
Examining Terrorist Tactics: The Jihadist Comms Toolkit
A new report documents how extremist groups’ use of secure digital tools software has evolved. “I don’t think that there are too many [makers of encrypted communication tools who] can say that bad guys don’t use their stuff, accurately,” NSA deputy director Richard Ledgett said during the recent Defense One Tech Summit, describing ISIS’ use…
4GW: Cyberpower Crushes Coup in Turkey
Rewriting the Rulebook on coups, time to add cyberpower Mere hours after the putsch in Turkey has failed, it is still too early to understand exactly what went on. Given those constraints, I still want to discuss something which has altered “the game” so much that the existing guidebook needs to be significantly revised….