The Department of Homeland Security is funding a Boeing company to create a “brain chip” for its self-destructing Black smartphone that could be adapted for any device, DHS officials say. The technology powering the devices potentially could identify the user’s walking style, for example. Officials would be alerted if the gait does not match the authorized user’s…
Category: Cyber-Warfare
Engineering Humans for War
By Annie Jacobsen Inside the Pentagon’s efforts to create a super-soldier—and change the future of the battlefield. Retired four-star general Paul F. Gorman recalls first learning about the “weakling of the battlefield” from reading S.L.A. Marshall, the U.S. Army combat historian during World War II. After interviewing soldiers who participated in the Normandy beach landings,…
The CIA’s Campaign to Steal Apple’s Secrets
RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security…
Apt. 29, aka “The Dukes”: 7 Years of Russian Cyber Espionage
Today we release a new whitepaper on an APT group commonly referred to as “the Dukes”. We believe that the Dukes are a well-resourced, highly dedicated, and organized cyber-espionage group that has been working for the Russian government since at least 2008 to collect intelligence in support of foreign and security policy decision-making. The Dukes…
16 basic principles of Mass Indoctrination
1.Start While They are Young 2. Create the Illusion of Political Freedom 3. Use Simplistic Stereo-types to Sway Public Opinion Read the Remainder at Medium
Reminder: If you have not turned off Windows 10 Keylogger, DO IT NOW!
Read the Article at The Hacker News
Non-Kinetic Warfare Skills for the Civilian
The Kinetic Threats faced by the 21st Century Civilian Operator are getting more and more violent and random. Every day it seems we hear on the news about another Active Shooter, Carjacking, Kidnapping or Home Invasion. For most CO’s, this ignites a burning desire to train harder, more realistic and more enthusiastic than ever before….
Asymmetrical Warfare Moves Into Your iPad
Now that the Internet is so ubiquitous that you must accept direct deposit for your paycheck, and your refrigerator has to get online to check for sales on cottage cheese, we find ourselves totally dependent on a service that we don’t understand and can’t live without. System engineers, whether they work for huge companies…
Flying Malware Injectors, Invisible UAV’s and Anti-Drone Lasers (Part 4)
This is the fourth and final installment of Drones and the Civilian Operator. If you missed the preceding installments, the First, Second and Third, are available to read. Think about it, if somebody were to have used terms like: “Counter-UAV Lasers”, “Hacker Drones” or “Invisible UAV’s” ten years ago, you would have called them nuts;…
RFID Microchips in Clothing (Part 2)
“I’d Rather Go Naked” Spyware vs. Spy Wear: Emergence of RFID Microchips in Clothing In part 1 of our story, we discussed how clothing manufacturers have started to embed RFID microchips into their apparel. These chips are sensors that cannot be turned off and — with readily available readers — can be used to track information about the consumer…
