Blog Posts Tagged with "CIA"

850c7a8a30fa40cf01a9db756b49155a

Microsoft, the CIA and NSA Collude to Take Over the Internet

June 20, 2012 Added by:J. Oquendo

The CIA, NSA and Microsoft created a completely separate operating system somewhere in the Beltway. Microsoft decided to give the agencies the specific code to make the rogue changes. Microsoft allowed the rogue system to be placed inside of their network and only allow a specific country to be infected...

Comments  (0)

296634767383f056e82787fcb3b94864

The Myth of the CIA and the Trans-Siberian Pipeline Explosion

June 07, 2012 Added by:Jeffrey Carr

If you repeat a rumor often enough, it becomes a fact. Such is the case with the oft-repeated rumor the CIA was responsible for the Trans-Siberian pipeline explosion in 1982 by sabotaging the SCADA system. The latest iteration of that rumor was in the Washington Post's special report on cybersecurity called Zero Day...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

AQ, AQAP, BVD Bombs, CIA, INSPIRE, Media, Moles... Oh My

May 09, 2012 Added by:Infosec Island Admin

Al-Qaeda has a plan to leverage the internet even more than they already are. I believe they will continue to put the magazine out and perhaps inspire others to make clones. The ubiquitous nature of the internet will only serve to allow their propaganda to be loosed upon us all...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Digital Posse Comitatus: Generals Obfuscate and Inveigle Congress

March 21, 2012 Added by:Infosec Island Admin

9/11 opened the floodgates to the world of warrantless wiretaps and surveillance culture we now have and diminished the lines between military and civilian agencies collection and alleged sharing of data. In the case of the NSA though, the abilities were always there...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

CIA and the Intelligence Components of Security

March 16, 2012 Added by:Plagiarist Paganini

We must approach with care the diffusion of technology, and correctly size up the potential threats. As there has been increased media attention on vulnerabilities within critical structures, the same approach must be followed to manage issues with commonly used devices...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

US Confirms Iran Did Not Hack RQ-170 Stealth Drone

February 13, 2012 Added by:Dan Dieterle

A congressional official has confirmed that Iran did not bring down the drone with it’s “cyber warfare” skills. Information from a 10 week CIA review seems to point to a malfunctioning data stream. Information from the faulty stream may have led the drone operator to land the UAV...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Intelligence Leaders Urge Congress to Act on Cyber Laws

February 06, 2012 Added by:Headlines

Among the greatest challenges in cyber security are knowing the perpetrator of a cyber attack in real time and finding capability gaps in the cyber supply chain – the entire set of key actors involved in the cyber infrastructure...

Comments  (0)

29cf3ef0a3104bccc62f3387739c1ca6

Why We Are All Getting a Little Crazy

November 03, 2011 Added by:Richard Thieme

The task of counterintelligence is to figure out what the other side is doing and how they are deceiving us. CI is predicated on double deceiving and triple deceiving the other side into believing fictions nested within fictions, always leavened with some facts, just enough to seem real...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Premier Intelligence Group's Website Hacked

September 19, 2011 Added by:Headlines

Stolen data was published on the website Cryptome, known for its affiliation with the hacktivist collective Anonymous. The leaked data reveals potentially sensitive information about senior intelligence officials from the NSA, CIA, the FBI, and numerous intelligence contractors...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Anonymous Conspiracies That Never Materialize

August 12, 2011 Added by:Infosec Island Admin

Data dumps without context have no real intelligence worth. While this stuff is interesting, it’s certainly not earth shattering. What’s worse is that it makes you all look more and more like the boy who cried wolf than the Deep Throat. This is why I keep harping on Anonymous...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

LulzSec Vows to Continue "Until We're Brought to Justice"

June 20, 2011 Added by:Headlines

"We've been entertaining you 1000 times with 140 characters or less, and we'll continue creating things that are exciting and new until we're brought to justice, which we might well be. But you know, we just don't give a living frak at this point..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

LulzSec Attacks CIA Website, Taunts The Jester

June 16, 2011 Added by:Headlines

The hacker collective known as LulzSec conducted a successful attack against a public-facing website of the CIA on Wednesday. The DDoS attack, which caused periodic outages, was announced with a Twitter message from the group stating, "Tango down - cia.gov - for the lulz..."

Comments  (0)