The Israel Police and Shin Bet security service arrested a Gaza resident suspected of hacking into the feeds from Air Force drones and collecting information on troop movements and civilian flights for the Palestinian Islamic Jihad terror group, police said Wednesday. A police statement named the suspect as Majd Ouida, 22, describing him as an…
Category: Cyber-Warfare
Cyber-Warfare: Policing The Dark Web and How it Can Effect National Sovereignty
Cops hack into foreign computers to find cyber criminals As crime continues to proliferate on the so-called dark web, law enforcement agencies are sometimes having to work outside of their jurisdiction. When a suspected criminal acts on the dark web, authorities are unlikely to know where in the world he or she is physically located….
Crusader Corner: ISIS Publishes Kill List with Names and Addresses of Minnesota Cops
Just like Great Britian, This is the end-result of a Govt. that pacifies and emboldens Terrorist. With this kind of policy, Nobody is safe anymore. Take Responsibility for you and your family’s safety NOW. -SF “Islamic State hackers post ‘kill list’ of Minnesota cops,” by Kellan Howell, The Washington Times, March 15, 2016: A group…
“Predictive Policing”: The Cyber Version of “Stop and Frisk”
Thanks America! How China’s Newest Software Could Track, Predict, and Crush Dissent Armed with data from spying on its citizens, Beijing could turn ‘predictive policing’ into an AI tool of repression. What if the Communist Party could have predicted Tiananmen Square? The Chinese government is deploying a new tool to keep the population from uprising. Beijing is building…
What the 2016 Presidential Candidates Get Wrong About the Future of War
They fail, they lack, they misunderstand, they pander, they don’t get, and they just don’t know national security – not according to our Future of War roster of experts. “The President shall be Commander in Chief…” This clause that leads Article Two, Section II of the U.S. Constitution is without a doubt the most important of…
Inside “Eligible Receiver”
The NSA’s disturbingly successful hack of the American military Excerpted from Dark Territory: The Secret History of Cyber War by Fred Kaplan. Out now from Simon & Schuster. On Wednesday, March 9, Kaplan will discuss his book in New York; for more information and to RSVP, visit the New America website. On June 9,…
Going Inside the Ukrainian Power Grid Hack
IT WAS 3:30 p.m. last December 23, and residents of the Ivano-Frankivsk region of Western Ukraine were preparing to end their workday and head home through the cold winter streets. Inside the Prykarpattyaoblenergo control center, which distributes power to the region’s residents, operators too were nearing the end of their shift. But just as one…
Why You Should More Afraid of Apple than the Feds
I know I suggest this book alot, but you need to read Future Crimes by Marc Goodman. It will absolutely open your eyes to how companies like Apple, Microsoft and the thousands of other Data Brokers out there COLLECT your personal, private information and then treat it as a valuable commodity to be bought and…
Cyber-Security: Googles New “Neural Network” can Locate the Location of any Photo on the Web
For those of you that are “seasoned” Science Fiction fans like myself, perhaps you remember the movie 2001: A Space Odyssey and the HAL Computer? Yeah this “neural network” called PLaNET kinda reminds me of that…unsettling in a way, no? -SF Here’s a tricky task. Pick a photograph from the Web at random. Now…
Why You Should Side With Apple and Not the FBI in the San Bernardino I-Phone Case
I have the utmost respect for Bruce. The man knows his stuff and is the final word in topics of this sort. -SF By Bruce Schneier Earlier this week, a federal magistrate ordered Apple to assist the FBI in hacking into the iPhone used by one of the San Bernardino shooters. Apple will fight this order…
