RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security…
Category: Intelligence Tradecraft
Apt. 29, aka “The Dukes”: 7 Years of Russian Cyber Espionage
Today we release a new whitepaper on an APT group commonly referred to as “the Dukes”. We believe that the Dukes are a well-resourced, highly dedicated, and organized cyber-espionage group that has been working for the Russian government since at least 2008 to collect intelligence in support of foreign and security policy decision-making. The Dukes…
16 basic principles of Mass Indoctrination
1.Start While They are Young 2. Create the Illusion of Political Freedom 3. Use Simplistic Stereo-types to Sway Public Opinion Read the Remainder at Medium
21st Century Facial Recognition Software: What the CO Needs to Know
By Hammerhead With America well on its way to becoming known as “Uncle Snoopy” versus “Uncle Sam”, one has only to look at the current surveillance state of Great Britain to see where most American cities will be in five years. At current count, Great Britain has over 5.9 Million CCTV cameras spread over…
China’s New “We will Kick America’s Ass” Propaganda Video
Yesterday, China held a parade commemorating the 70th anniversary of World War II, and swore high and low that it wasn’t flexing its military muscles in the process. Zhang Ming, vice minister of China’s Ministry of Foreign Affairs, told a press conference last month that “if someone says this is flexing anything, it is a flexing of the…
Use Espionage to Destroy ISIS
By William A. Levinson Sun Tzu’s Art of War admonished more than 2500 years ago, “Hostile armies may face each other for years, striving for the victory which is decided in a single day. This being so, to remain in ignorance of the enemy’s condition simply because one grudges the outlay of a hundred ounces…
Why Your Intelligence Section Must ID Gang Activity Now
“Experience teaches us that it is much easier to prevent an enemy from posting themselves than it is to dislodge them after they have got possession.” – George Washington By Samuel Culper This past weekend, we had the great fortune to see some of the good, the bad, and the ugly in West Virginia. First…
Flying Malware Injectors, Invisible UAV’s and Anti-Drone Lasers (Part 4)
This is the fourth and final installment of Drones and the Civilian Operator. If you missed the preceding installments, the First, Second and Third, are available to read. Think about it, if somebody were to have used terms like: “Counter-UAV Lasers”, “Hacker Drones” or “Invisible UAV’s” ten years ago, you would have called them nuts;…
Acoustic Kitty: More Weird Cold War Spy-Gear
By Luis A. Mercado Ever wished you could talk to animals to find out what they know? Well, so did the CIA. During the Cold War, when espionage was the stage for many of the ways the U.S. and the Soviets tried to one-up each other, the latest project of choice was, “Acoustic Kitty”. “Acoustic…
Approaching UAV’s as a CO Skill-Set and not just a Weekend Hobby
The civilian operator has to understand that the future of conflict, regardless if it is domestic or foreign, is going to involve technology on a massive scale. With hybrid warfare now being perfected by both state and non-state actors, the civilian operator/prepper needs to plan on also using a combination of conventional, asymmetrical and…