background preloader

The Spy files

cryptovirus Flame The effort, involving the National Security Agency, the CIA and Israel’s military, has included the use of destructive software such as the Stuxnet virus to cause malfunctions in Iran’s nuclear-enrichment equipment. The emerging details about Flame provide new clues to what is thought to be the first sustained campaign of cyber-sabotage against an adversary of the United States. “This is about preparing the battlefield for another type of covert action,” said one former high-ranking U.S. intelligence official, who added that Flame and Stuxnet were elements of a broader assault that continues today. Flame came to light last month after Iran detected a series of cyberattacks on its oil industry. There has been speculation that Washington had a role in developing Flame, but the collaboration on the virus between the United States and Israel has not been previously confirmed. The virus is among the most sophisticated and subversive pieces of malware to be exposed to date. Years in the making

WikiLeaks SpyFiles: New documents examine spy tech companies like Gamma, Hacking Team. Photo by Anthony Devlin/AFP/Getty Images The secretive surveillance technology industry does its best to fly under the radar. But the shadowy companies selling controversial spy tools to governments are being exposed to public scrutiny whether they like it or not, thanks to a new WikiLeaks project. Ryan Gallagher is a journalist who reports on surveillance, security, and civil liberties. Follow On Wednesday, the whistleblower organization published a new trove of documents that reveal the surveillance equipment being sold by more than 90 firms to authorities across the world as part of a burgeoning clandestine market in electronic spying. Dubbed the “SpyFiles” by WikiLeaks, the release builds on a previous surveillance industry exposé by the group in 2011, and comes amid unprecedented international discussion about government spying tactics disclosed in June by former National Security Agency contractor Edward Snowden. Gamma did not respond to a request for comment.

Strategic Studies Institute (SSI) | US Army War College Spy Files 3: WikiLeaks Sheds More Light On The Global Surveillance Industry In this article, Maria Xynou looks at WikiLeaks' latest Spy Files and examines the legality of India's surveillance technologies, as well as their potential connection with India's Central Monitoring System (CMS) and implications on human rights. Last month, WikiLeaks released “Spy Files 3”, a mass exposure of the global surveillance trade and industry. WikiLeaks first released the Spy Files in December 2011, which entail brochures, presentations, marketing videos and technical specifications on the global trade of surveillance technologies. Spy Files 3 supplements this with 294 additional documents from 92 global intelligence contractors. So what do the latest Spy Files reveal about India? When we think about India, the first issues that probably come to mind are poverty and corruption, while surveillance appears to be a more “Western” and elitist issue. ISS World Surveillance Trade Shows The following table lists the Indian attendees at last years’ ISS World: ClearTrail Technologies 1. 3.

Not a Click Away: Joseph Kony in the Real World In 2006, I flew with a group of journalists and United Nations officials to a remote village in Garamba National Park in eastern Congo, just on other side of the South Sudan border, for a meeting with Joseph Kony and the leaders of the Lord's Resistance Army (LRA). The meeting was to be held in a designated staging ground – a neutral space, deep in the forest, created by the UN as part of yet another protracted peace agreement between Kony and the Ugandan government. When we arrived, dozens of heavily armed LRA soldiers emerged from the forest and took their places among the stacks of rotting food that had been delivered to the clearing as an enticement and sign of goodwill. The LRA soldiers, dressed in camouflage pants and European football jerseys, spoke to no one and refused any attempt to address them. Of course no one was killed or arrested that day. Kony was, of course, the main attraction. Kony 2012 wants both. The most common defense of Kony 2012 is that it raises awareness.

War on Gaza - Experimental Beta War on Gaza - Experimental Beta Click on the dots to view reports © 2013 Microsoft Corporation © 2010 NAVTEQ 6 Dec 11 Dec 16 Dec 21 Dec 26 Dec 31 Dec 5 Jan 10 Jan 15 Jan 20 Jan 25 Jan 30 Jan Overview of reported incidents over time This is an experimental web service. Submit an Incident Submit via SMS | Twitter Submit via SMS | Twitter Incidents (from map above listed chronologically) TITLE LOCATION Date Israeli jets strike Rafah tunnels: Raids... Official & mainstream news TITLE SOURCE Date AJELive: Rebels claim control of strategic... As content is contributed from users around the world, AlJazeera cannot be held accountable for accuracy of data on this site. Ushahidi Souktel

[2010] U.S. Spies Want Algorithms to Spot Hot Trends | Danger Room The U.S. intelligence community wants a sharp competitive edge on the world’s best and brightest ideas. In an effort to find the next big thing before it happens, they’re looking to do away with fallible human trendspotters, and enlist an algorithmic system to “scan the horizon” and tap into the first signs of burgeoning memes in science and technology. Iarpa, the intel world’s far-out research arm, is already wary of trusting big calls and predictions to flesh-and-blood experts alone. Earlier this year, the agency solicited proposals for a system that would evaluate and rank the value of expert opinion based on niche, learning style, prior performance and “other attributes predictive of accuracy.” This time around, Iarpa’s looking for a system that wouldn’t just rate experts, but would take over many of their responsibilities entirely. In other words, while Iarpa wants an code-driven prediction system, it’s one that’ll inevitably be founded on fallible human input. See Also:

Betrayer and Betrayed: New Documents Reveal Truth on NATO's 'Most Damaging' Spy - SPIEGEL ONLINE - News - International Everyone thought Hermann Simm deserved to be honored. It was Monday, Feb. 6, 2006, and he was dressed in his best suit to attend the day's event. He had been invited to Estonia's presidential palace to accept the "Order of the White Star" for his "service to the Estonian nation." It was an ironic choice. It wasn't the only medal Simm received for his services that year. Four years on, Simm has now reached the late phase of his career. This is the same man whom NATO, in a classified 141-page report, has recognized as the spy who was "most damaging in Alliance history." 28 NATO Countries Sharing Secrets According to the classified NATO report, the master spy also "compromised a wide range of NATO intelligence reports and analyses," including ones related to fighting terrorism, secret military plans and counterespionage. Of course, Simm was not the only spy in NATO's past. A Swift Rise to Power Simm was born out of wedlock in May 1947 in the small Estonian city of Suure-Jaani.

The NATO Monitor Pentagon asks hackers for help with cyber security  J. Scott Applewhite/AP Former top counterterrorism adviser Richard Clarke is sworn in to testify to the federal panel reviewing the Sept. 11 attacks in 2004. WASHINGTON - The Pentagon agency that invented the Internet is asking the hacker community for help in eliminating Defense Department computer vulnerabilities. The Defense Advanced Research Projects Agency, or DARPA, hosted a meeting this week for defense stakeholders and civilian computer experts, acknowledging that it has to start thinking differently about cyber security, reported. And the computer networks that run U.S. infrastructure are so vulnerable to cyber attack that the White House should think twice before even attacking emerging adversaries, a national security expert said. Richard Clarke, who advised ex-Presidents Bill Clinton and George W. Their Goliath scale leaves them especially vulnerable to tiny attacks, the Associated Press and Wired reported.

Has CIA changed its strategy in Pakistan drone war? General Petraeus makes a point to President Obama in the White House Situation Room A fresh US drone strike killed a group of senior militants in Pakistan today, the latest in a string of recent attacks which have reportedly killed a high ranking militant, or High Value Target as they are known in military jargon. On 6 September former US General David Petraeus took charge at the Central Intelligence Agency. Since then the Bureau has recorded twelve CIA drone strikes, eleven in Pakistan and one in Yemen. Could it be that the US is moving away from its recent strategy of using drone strikes to kill low-ranking militants in Pakistan? In the early years of the drone campaign under President Bush, almost all attacks were against HVTs who were viewed as a strategic threat to US interests. For the Bureau’s full data on CIA drone strikes in Pakistan click here. And in recent years HVTs were only occasionally killed. But the situation may be changing. Well maybe. The CIA declined to comment.

Ataques a Computadores Militares Quando surge uma notícia sobre um ataque de crackers a alguma empresa, todos ficam chocados. mesmo sendo eventos relativamente esporádicos e isolados, a atenção que a mídia dá para o assunto chega a assustar toda uma população. Mas saibam que esses ataques cibernéticos a grandes empresas norte-americanas e européias que tem ocorrido esses anos todos, são fichinhas perto do que acontece com os militares. Podemos dizer que essa última categoria está acostumada a vivenciar milhares de tentativas de ataques, todos os dias. Um exemplo disso é o Pentágono, o Quartel-General do Departamento de Defesa (DoD - Department of Defense) dos Estados Unidos. Tenente-General Keith B. O Senador Carl Levin, que é o atual presidente do Comitê de Serviços Armados do Senado (Senate Armed Services Committee) afirmou que o novo Comando "garante uma análise cuidadosa", porque "as capacidades para operar no cyber-espaço tem ultrapassado o desenvolvimento da política, da lei e da jurisprudência".

Risk REPORT Governo dos EUA alerta falha de segurança na Siemens O governo dos Estados Unidos alertou clientes da Siemens de que sistemas de gestão de controle industrial que compraram da empresa apresentam uma falha de segurança que, de acordo com um pesquisador, poderia permitir que hackers prejudiquem infraestrutura essencial. A Siemens ainda está se recuperando das consequências da descoberta do vírus Stuxnet, no ano passado, um worm criado especificamente para atacar seus sistemas de controle industrial. Ataques aos sistemas da empresa poderiam ter impacto amplo. O conglomerado alemão, que minimizou a importância das falhas depois que estas foram reveladas na semana passada pela NSS Labs, uma empresa de segurança na computação, afirmou na terça-feira que está desenvolvendo atualizações de software para resolver os mais recentes problemas de segurança em seus sistemas de controle industrial.