by Michael V. Hayden Penguin, 448 pp When Michael Hayden was a young air force officer in the 1980s, the military stationed him as an intelligence attaché in Bulgaria. There, the man who would rise to the top of the American intelligence community in the post–September 11 era lived under constant surveillance: he and his…
Category: Cyber-Warfare
A New Generation of Unrestricted Warfare
In 1999, two Chinese colonels wrote a book called Unrestricted Warfare, about warfare in the age of globalization. Their main argument: Warfare in the modern world will no longer be primarily a struggle defined by military means — or even involve the military at all. They were about a decade and a half before their…
The Surveillance State: The CIA is Investing in Firms that “Mine” Your Twitter and Instagram Data
SOFT ROBOTS THAT can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence that will sift through large data sets — these are just a few of the technologies being pursued by companies with investment from In-Q-Tel, the CIA’s venture capital firm, according to a document obtained by The Intercept….
Cyber-Warfare Front: NSA Chief Makes ‘Secret’ Israel Trip to talk Iran, Hezbollah Cyber-Warfare
Admiral Rogers said to meet with IDF intelligence officials, including head of 8200 unit, during visit last week The director of the US National Security Agency, Admiral Michael Rogers, reportedly paid a secret visit to Israel last week to discuss cooperation in cyber-defense, in particular to counter attacks by Iran and its Lebanon-based proxy Hezbollah….
Espionage Files: The Brave New World of Drone Hacking
The Israel Police and Shin Bet security service arrested a Gaza resident suspected of hacking into the feeds from Air Force drones and collecting information on troop movements and civilian flights for the Palestinian Islamic Jihad terror group, police said Wednesday. A police statement named the suspect as Majd Ouida, 22, describing him as an…
Cyber-Warfare: Policing The Dark Web and How it Can Effect National Sovereignty
Cops hack into foreign computers to find cyber criminals As crime continues to proliferate on the so-called dark web, law enforcement agencies are sometimes having to work outside of their jurisdiction. When a suspected criminal acts on the dark web, authorities are unlikely to know where in the world he or she is physically located….
Crusader Corner: ISIS Publishes Kill List with Names and Addresses of Minnesota Cops
Just like Great Britian, This is the end-result of a Govt. that pacifies and emboldens Terrorist. With this kind of policy, Nobody is safe anymore. Take Responsibility for you and your family’s safety NOW. -SF “Islamic State hackers post ‘kill list’ of Minnesota cops,” by Kellan Howell, The Washington Times, March 15, 2016: A group…
“Predictive Policing”: The Cyber Version of “Stop and Frisk”
Thanks America! How China’s Newest Software Could Track, Predict, and Crush Dissent Armed with data from spying on its citizens, Beijing could turn ‘predictive policing’ into an AI tool of repression. What if the Communist Party could have predicted Tiananmen Square? The Chinese government is deploying a new tool to keep the population from uprising. Beijing is building…
What the 2016 Presidential Candidates Get Wrong About the Future of War
They fail, they lack, they misunderstand, they pander, they don’t get, and they just don’t know national security – not according to our Future of War roster of experts. “The President shall be Commander in Chief…” This clause that leads Article Two, Section II of the U.S. Constitution is without a doubt the most important of…
Inside “Eligible Receiver”
The NSA’s disturbingly successful hack of the American military Excerpted from Dark Territory: The Secret History of Cyber War by Fred Kaplan. Out now from Simon & Schuster. On Wednesday, March 9, Kaplan will discuss his book in New York; for more information and to RSVP, visit the New America website. On June 9,…