You are racing through the airport. The low power light is blinking red. You are desperate to plug into any outlet you can find. Watch out. You could get juice jacked. Guess what? In every smart phone—no matter what the model—power and data flow through the same USB port and power cable. That creates a potential attack…
Category: Technology
Military Defense News: Latest Insights Into Chinese Military Tech
It’s that time of year again, and the end of an era. On Friday, the Obama Administration released the last annual Pentagon China report under its watch. Working the China military observers’ graveyard shift this weekend, I published analyses of the report’s overall content, and its key omissions — namely, any mention whatsoever of China’s maritime…
Surveillance State: Inside The NSA’s Real-Time Regional Gateway (RT-RG)
It is a very common trend to see “Counter-Terrorism” programs and technology that were once used to save American Military and Civilian lives in war get re-directed to spy on American citizens in Peace time. This is something to keep in mind with this program. -SF Relentless attacks on American military personnel at the height…
Surveillance State: Everything We Know About How the FBI Hacks People
RECENT HEADLINES WARN that the government now has greater authority to hack your computers, in and outside the US. Changes to federal criminal court procedures known as Rule 41 are to blame; they vastly expand how and whom the FBI can legally hack. But just like the NSA’s hacking operations, FBI hacking isn’t new. In…
Book Review: Playing to the Edge, American Intelligence in the Age of Terror
by Michael V. Hayden Penguin, 448 pp When Michael Hayden was a young air force officer in the 1980s, the military stationed him as an intelligence attaché in Bulgaria. There, the man who would rise to the top of the American intelligence community in the post–September 11 era lived under constant surveillance: he and his…
The Surveillance State: Police are Creating Fake Social Media Accounts To Monitor You
Police Create Fake Profiles on Facebook and Attempt to Build Relationships Along With Monitor Your Friends and Events Kristan T. Harris | American Intelligence Report Police departments around the nation have taken predictive crime prevention to a new level by building fake user accounts, as well as posing as genuine people to gather information about local events, Tech.Mic reports….
Developing The “Ice-Cube Tray” Mentality
By Hammerhead Technology can be likened to a fantastic drug. When you have it and are USING it, you feel awesome and alive. It helps you through your day. It entertains you. It helps you organize and be more efficient. It connects you to the things you care about. In short, it helps you…
Surveillance State: No Warrant Required for Phone Location Records
We are getting closer and closer to full scale Legal Federal monitoring of ALL cellular devices folks. Every day the Feds are chipping away the 4th Amendment a little at a time. In a few years it will be non-existent..all in the name Of “National Security”.-SF Federal agents can obtain cellphone records that reveal a…
The Surveillance State: First was the Breathalyzer, now Meet the “Textalyzer”
We’re all familiar with the Breathalyzer, the brand name for a roadside device that measures a suspected drunken driver’s blood-alcohol level. It has been in use for decades. Now there’s a so-called “textalyzer” device to help the authorities determine whether someone involved in a motor vehicle accident was unlawfully driving while distracted. The roadside technology is…
Espionage Files: CIA Funds Cosmetics That Can Collect DNA
SKINCENTIAL SCIENCES, a company with an innovative line of cosmetic products marketed as a way to erase blemishes and soften skin, has caught the attention of beauty bloggers on YouTube, Oprah’s lifestyle magazine, and celebrity skin care professionals. Documents obtained by The Intercept reveal that the firm has also attracted interest and funding from In-Q-Tel, the venture capital arm of…
