Account Menu

IP Address:

Tag Archives | Surveillance


Episode 2 – Dr Dave Janda – Tom McInerney & Paul Rosenberg

Thursday June 29th 2017 In this edition Dr. Dave Janda leads off with a WTF segment dissecting the recent “revelations” of The Obama Administration’s surveillance of millions of Americans. In the second segment, Dave welcomes General Tom McInerney who delves into domestic and geo-political events. Then, Paul Rosenberg, who specializes in cyber-security, outlines how the […]

Continue Reading

Ark Midnight Live With John B Wells – Sat March 18 – Guest: John McAfee

Don’t miss “Ark Midnight” Saturday evening LIVE on KLIF570 – Episode 41 @ 10pm to Midnight (Central Time) Our guest today – John McAfee Show Topic – Mass Surveillance & Vault7 Lines will be open if you would like to join our conversation. See you there! – Studio line – 888-787 5543 Join our […]

Continue Reading
https _blueprint-api-production.s3.amazonaws.com_uploads_card_image_91113_2d4914f4aa584d1ba70211a2c3d2fea6

New robot bee may soon be a spy’s secret weapon

By People fear robots are becoming too human, but, in reality, robots are becoming a little more bug-like every day. A team of Harvard University researchers proved this axiom when they found the solution to extending tiny robot flight is by mimicking the way small bugs alight on walls and ceilings. The applications for […]

Continue Reading

Secret Surveillance Court Picks First Outsider to Get a Look In

By: The shadowy Foreign Intelligence Surveillance Court has appointed its first “friend of the court” to add an outsider’s perspective to the highly secretive process of approving surveillance requests from the government. Preston Burton, a criminal defense attorney known for his work with accused spies, is the first of at least five amici curiae […]

Continue Reading

Here Is a Government Surveillance Device Disguised as a Baby’s Car Seat

By: Spend enough time investigating the global surveillance industry, and you’ll come to realize that reality is far stranger than fiction. A previous Motherboard investigation into the cache of documents leaked after the hack of Hacking Team revealed a huge network of companies reselling spyware around the world. But the Italian firm, which makes […]

Continue Reading

U.S. Air Force Eyes Blast Detection Satellite

By: The U.S. Air Force hopes to build an experimental satellite that would detect nuclear explosions and monitor the space environment from geosynchronous orbit, the service said in an Aug. 24 announcement. The Space Test Program Satellite (STPSat) -6 would be the latest in a series of spacecraft developed under a Defense Department program […]

Continue Reading

San Jose Looks at Using Garbage Haulers to Catch Car Thieves

By: The noisy garbage trucks that lumber down San Jose streets every week could soon pick up more than just trash — they might also scan your license plate and all your neighbors’ tags, too, in a proposed city-wide sweep for stolen vehicles that has civil libertarians crying foul. Mayor Sam Liccardo and Councilmen […]

Continue Reading

The Philosopher of Surveillance

By: ARE YOU THE SOCRATES of the National Security Agency? That was the question the NSA asked its workforce in a memo soliciting applications for an in-house ethicist who would write a philosophically minded column about signals intelligence. The column, which would be posted on a classified network at the NSA, should be absorbing […]

Continue Reading

Hacker Turns Secure Computers into Secret-Spewing Radios

By: Modern technology relies on electricity for everything. But a researcher at Black Hat 2015 demonstrated how to turn electronic devices into secret radio transmitters, thanks to physics. Black Hat Bug ArtAng Cui of Red Balloon security is the first to admit that he doesn’t understand how electricity works. “I didn’t know a lot […]

Continue Reading

HUMINT May Be Getting Harder to Do, But SIGINT Continues to Rise in Importance

By: CYBER-CAFÉS were once a favoured tool of Western intelligence and security agencies. They were inconspicuous, cheap to establish and highly effective. Set up near an international summit buzzing with targets, or close to a mosque favoured by Islamist extremists, these facilities allowed their masters to monitor browsing habits, obtain targets’ logins and passwords, […]

Continue Reading

Applied Cyber Intelligence: A Theory on Intelligence Sharing

By: There has been an identified need to share Cyber Intelligence. The history of the discussion dates back a number of years and the actual timeline is out of the scope of this study. However, it is important to understand that the need for sharing this type of information is so that it ultimately […]

Continue Reading

Shame on France: French Constitutional Council Widely Approves Surveillance Law!

By: Update (24 July 2015): The French Constitutional Council shows again its disregard for fundamental rights. This morning, after approving almost all dispositions in the Surveillance law, the Constitutional Council builds momentum by rejecting the Question Prioritaire de Constitutionalité1 handed by La Quadrature du Net, FDN and FDN Federation on the 2014-2019 Defence Law […]

Continue Reading

What Is the Big Secret Surrounding Stingray Surveillance?

By: Given the amount of mobile phone traffic that cell phone towers transmit, it is no wonder law enforcement agencies target these devices as a rich source of data to aid their investigations. Standard procedure involves getting a court order to obtain phone records from a wireless carrier. When authorities cannot or do not […]

Continue Reading

The Trash Man Is Watching You

By: Saving the planet can be a messy proposition. This is indelibly clear to Ron Zanazzo, who spends mornings rifling through garbage bags, looking for envelopes or documents that can identify to whom the trash belongs. “In the summer, it can be pretty disgusting,” he told me, matter-of-factly. “In the winter it’s not as […]

Continue Reading