A man with intense eyes crouches over a laptop in a darkened room, his face and hands hidden by a black ski mask and gloves. The scene is lit only by the computer screen’s eerie glow. Exaggerated portraits of malicious hackers just like this keep popping up in movies and TV, despite the best efforts…
Category: Cyber-Warfare
Espionage Files: Counterintelligence for U.S. Companies Operating Abroad
In January, the CEO of American Superconductor publicly detailed how traditional economic espionage methods carried out by a small Chinese firm resulted in over a billion dollars in loss to his company. Since at least 2011, much attention has been given to the rampant cyber espionage threat against U.S. firms, ultimately pushing U.S. businesses to…
Future Warfare: 21st Century DIY Insurgency
It started innocuously enough. The prime minister-for-life never missed the annual “Liberation Day” parade. With the drums and platoons thundering, nobody noticed as the quadcopter, barely larger than a sparrow, floated down toward the dais, its faint whirr drowned out by the industrial machinery rolling by in formation. It was at once a child’s birthday…
Military News: China and Russia Field “Anti-Stealth” Drones
Both China and Russia appear to be building unmanned aerial vehicles designed to negate America’s advantages in stealth aircraft. Earlier this year, photos first emerged of a new High Altitude, Long Endurance (HALE) UAV termed the Divine Eagle that foreign observers believe is designed to detect and eliminate stealth enemy aircraft far from the Chinese…
Surveillance State: Inside The NSA’s Real-Time Regional Gateway (RT-RG)
It is a very common trend to see “Counter-Terrorism” programs and technology that were once used to save American Military and Civilian lives in war get re-directed to spy on American citizens in Peace time. This is something to keep in mind with this program. -SF Relentless attacks on American military personnel at the height…
Surveillance State: Everything We Know About How the FBI Hacks People
RECENT HEADLINES WARN that the government now has greater authority to hack your computers, in and outside the US. Changes to federal criminal court procedures known as Rule 41 are to blame; they vastly expand how and whom the FBI can legally hack. But just like the NSA’s hacking operations, FBI hacking isn’t new. In…
Book Review: Playing to the Edge, American Intelligence in the Age of Terror
by Michael V. Hayden Penguin, 448 pp When Michael Hayden was a young air force officer in the 1980s, the military stationed him as an intelligence attaché in Bulgaria. There, the man who would rise to the top of the American intelligence community in the post–September 11 era lived under constant surveillance: he and his…
A New Generation of Unrestricted Warfare
In 1999, two Chinese colonels wrote a book called Unrestricted Warfare, about warfare in the age of globalization. Their main argument: Warfare in the modern world will no longer be primarily a struggle defined by military means — or even involve the military at all. They were about a decade and a half before their…
The Surveillance State: The CIA is Investing in Firms that “Mine” Your Twitter and Instagram Data
SOFT ROBOTS THAT can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence that will sift through large data sets — these are just a few of the technologies being pursued by companies with investment from In-Q-Tel, the CIA’s venture capital firm, according to a document obtained by The Intercept….
Cyber-Warfare Front: NSA Chief Makes ‘Secret’ Israel Trip to talk Iran, Hezbollah Cyber-Warfare
Admiral Rogers said to meet with IDF intelligence officials, including head of 8200 unit, during visit last week The director of the US National Security Agency, Admiral Michael Rogers, reportedly paid a secret visit to Israel last week to discuss cooperation in cyber-defense, in particular to counter attacks by Iran and its Lebanon-based proxy Hezbollah….
