It started innocuously enough. The prime minister-for-life never missed the annual “Liberation Day” parade. With the drums and platoons thundering, nobody noticed as the quadcopter, barely larger than a sparrow, floated down toward the dais, its faint whirr drowned out by the industrial machinery rolling by in formation. It was at once a child’s birthday…
Category: Cyber-Warfare
Military News: China and Russia Field “Anti-Stealth” Drones
Both China and Russia appear to be building unmanned aerial vehicles designed to negate America’s advantages in stealth aircraft. Earlier this year, photos first emerged of a new High Altitude, Long Endurance (HALE) UAV termed the Divine Eagle that foreign observers believe is designed to detect and eliminate stealth enemy aircraft far from the Chinese…
Surveillance State: Inside The NSA’s Real-Time Regional Gateway (RT-RG)
It is a very common trend to see “Counter-Terrorism” programs and technology that were once used to save American Military and Civilian lives in war get re-directed to spy on American citizens in Peace time. This is something to keep in mind with this program. -SF Relentless attacks on American military personnel at the height…
Surveillance State: Everything We Know About How the FBI Hacks People
RECENT HEADLINES WARN that the government now has greater authority to hack your computers, in and outside the US. Changes to federal criminal court procedures known as Rule 41 are to blame; they vastly expand how and whom the FBI can legally hack. But just like the NSA’s hacking operations, FBI hacking isn’t new. In…
Book Review: Playing to the Edge, American Intelligence in the Age of Terror
by Michael V. Hayden Penguin, 448 pp When Michael Hayden was a young air force officer in the 1980s, the military stationed him as an intelligence attaché in Bulgaria. There, the man who would rise to the top of the American intelligence community in the post–September 11 era lived under constant surveillance: he and his…
A New Generation of Unrestricted Warfare
In 1999, two Chinese colonels wrote a book called Unrestricted Warfare, about warfare in the age of globalization. Their main argument: Warfare in the modern world will no longer be primarily a struggle defined by military means — or even involve the military at all. They were about a decade and a half before their…
The Surveillance State: The CIA is Investing in Firms that “Mine” Your Twitter and Instagram Data
SOFT ROBOTS THAT can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence that will sift through large data sets — these are just a few of the technologies being pursued by companies with investment from In-Q-Tel, the CIA’s venture capital firm, according to a document obtained by The Intercept….
Cyber-Warfare Front: NSA Chief Makes ‘Secret’ Israel Trip to talk Iran, Hezbollah Cyber-Warfare
Admiral Rogers said to meet with IDF intelligence officials, including head of 8200 unit, during visit last week The director of the US National Security Agency, Admiral Michael Rogers, reportedly paid a secret visit to Israel last week to discuss cooperation in cyber-defense, in particular to counter attacks by Iran and its Lebanon-based proxy Hezbollah….
Espionage Files: The Brave New World of Drone Hacking
The Israel Police and Shin Bet security service arrested a Gaza resident suspected of hacking into the feeds from Air Force drones and collecting information on troop movements and civilian flights for the Palestinian Islamic Jihad terror group, police said Wednesday. A police statement named the suspect as Majd Ouida, 22, describing him as an…
Cyber-Warfare: Policing The Dark Web and How it Can Effect National Sovereignty
Cops hack into foreign computers to find cyber criminals As crime continues to proliferate on the so-called dark web, law enforcement agencies are sometimes having to work outside of their jurisdiction. When a suspected criminal acts on the dark web, authorities are unlikely to know where in the world he or she is physically located….
