Blog Posts Tagged with "CIA"
June 20, 2012 Added by:J. Oquendo
The CIA, NSA and Microsoft created a completely separate operating system somewhere in the Beltway. Microsoft decided to give the agencies the specific code to make the rogue changes. Microsoft allowed the rogue system to be placed inside of their network and only allow a specific country to be infected...
June 07, 2012 Added by:Jeffrey Carr
If you repeat a rumor often enough, it becomes a fact. Such is the case with the oft-repeated rumor the CIA was responsible for the Trans-Siberian pipeline explosion in 1982 by sabotaging the SCADA system. The latest iteration of that rumor was in the Washington Post's special report on cybersecurity called Zero Day...
May 09, 2012 Added by:Scot Terban
Al-Qaeda has a plan to leverage the internet even more than they already are. I believe they will continue to put the magazine out and perhaps inspire others to make clones. The ubiquitous nature of the internet will only serve to allow their propaganda to be loosed upon us all...
March 21, 2012 Added by:Scot Terban
9/11 opened the floodgates to the world of warrantless wiretaps and surveillance culture we now have and diminished the lines between military and civilian agencies collection and alleged sharing of data. In the case of the NSA though, the abilities were always there...
March 16, 2012 Added by:Pierluigi Paganini
We must approach with care the diffusion of technology, and correctly size up the potential threats. As there has been increased media attention on vulnerabilities within critical structures, the same approach must be followed to manage issues with commonly used devices...
February 13, 2012 Added by:Dan Dieterle
A congressional official has confirmed that Iran did not bring down the drone with it’s “cyber warfare” skills. Information from a 10 week CIA review seems to point to a malfunctioning data stream. Information from the faulty stream may have led the drone operator to land the UAV...
February 06, 2012 Added by:Headlines
Among the greatest challenges in cyber security are knowing the perpetrator of a cyber attack in real time and finding capability gaps in the cyber supply chain – the entire set of key actors involved in the cyber infrastructure...
November 03, 2011 Added by:Richard Thieme
The task of counterintelligence is to figure out what the other side is doing and how they are deceiving us. CI is predicated on double deceiving and triple deceiving the other side into believing fictions nested within fictions, always leavened with some facts, just enough to seem real...
September 19, 2011 Added by:Headlines
Stolen data was published on the website Cryptome, known for its affiliation with the hacktivist collective Anonymous. The leaked data reveals potentially sensitive information about senior intelligence officials from the NSA, CIA, the FBI, and numerous intelligence contractors...
August 12, 2011 Added by:Scot Terban
Data dumps without context have no real intelligence worth. While this stuff is interesting, it’s certainly not earth shattering. What’s worse is that it makes you all look more and more like the boy who cried wolf than the Deep Throat. This is why I keep harping on Anonymous...
June 20, 2011 Added by:Headlines
"We've been entertaining you 1000 times with 140 characters or less, and we'll continue creating things that are exciting and new until we're brought to justice, which we might well be. But you know, we just don't give a living frak at this point..."
June 16, 2011 Added by:Headlines
The hacker collective known as LulzSec conducted a successful attack against a public-facing website of the CIA on Wednesday. The DDoS attack, which caused periodic outages, was announced with a Twitter message from the group stating, "Tango down - cia.gov - for the lulz..."
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013