Revealed: US spy operation that manipulates social media | Technology The US military is developing software that will let it secretly manipulate social media sites by using fake online personas to influence internet conversations and spread pro-American propaganda. A Californian corporation has been awarded a contract with United States Central Command (Centcom), which oversees US armed operations in the Middle East and Central Asia, to develop what is described as an "online persona management service" that will allow one US serviceman or woman to control up to 10 separate identities based all over the world. The project has been likened by web experts to China's attempts to control and restrict free speech on the internet. The discovery that the US military is developing false online personalities – known to users of social media as "sock puppets" – could also encourage other governments, private companies and non-government organisations to do the same. Nobody was available for comment at Ntrepid. … we have a small favour to ask.
How Nsa Uses Radio Frequencies The 3 rules of a secure cell phone Big brother is coming after your phone. The government is increasingly interested in your calls, your movements, and your purchases. Don’t believe me? They don’t even need a warrant to seize your records anymore: Think about this: you probably have your credit locked (or you should!) That’s right your cell phone is rapidly becoming the little spy in your pocket. Password protect. These days you have to remember: the more access you have to your information, the more access everyone else has to your data. Keep your various devices and services separated as much as possible to limit the damage one lost item can do to you and your family.
NSA Devises Radio Pathway Into Computers not connected to the internet By DAVID E. SANGER and THOM SHANKER WASHINGTON — The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. No Domestic Use Seen Richard A. A Focus on Defense An Old Technology
Xbox Live among game services targeted by US and UK spy agencies | World news To the National Security Agency analyst writing a briefing to his superiors, the situation was clear: their current surveillance efforts were lacking something. The agency's impressive arsenal of cable taps and sophisticated hacking attacks was not enough. What it really needed was a horde of undercover Orcs. That vision of spycraft sparked a concerted drive by the NSA and its UK sister agency GCHQ to infiltrate the massive communities playing online games, according to secret documents disclosed by whistleblower Edward Snowden. The files were obtained by the Guardian and are being published on Monday in partnership with the New York Times and ProPublica. The agencies, the documents show, have built mass-collection capabilities against the Xbox Live console network, which has more than 48 million players. Games, the analyst wrote, "are an opportunity!". If properly exploited, games could produce vast amounts of intelligence, according to the NSA document.
NSA TEMPEST Attack can remotely view your computer using radio waves! This is a public service announcement. Using an antenna and some gadgets from your local electronics store, you can spy on your neighbors TV. If you think that’s scary, the National Security Agency can view your cellphone screen from over a kilometer away, listen to signals from your monitor cable, and use your computer’s power supply to snoop on you. This security flaw inherent in all digital devices is the greatest threat to our privacy and has massive implications for the future of the entire digital world. This article will give some examples of how this technology works, why it matters, and provide you with a plethora of research links to get educated about this rarely discussed topic. I encourage you to read the links, protect your sensitive material as best you can, and demand the same electromagnetic protection for consumer products that the military expects. What is a TEMPEST Attack? Also referred to as “Van Eck Phreaking” NSA spills its guts on TEMPEST attacks source: tgdaily.com
NSA files: games and virtual environments paper | World news Turn autoplay off Edition: <span><a href=" Sign in Beta About us Today's paper Subscribe Custom Search NSA files: games and virtual environments paper NSA document, written in 2008 and titled Exploiting Terrorist Use of Games & Virtual EnvironmentsRevealed: spy agencies' covert push to infiltrate virtual world of online games theguardian.com, NSA Games Paper Document Pages Zoom Previous for “” Next p. 1 Loading Loading p. 2 Page Note 1 of 2 0 To print the document, click the "Original Document" link to open the original PDF. World news More news Order The Snowden Files for £8.99 (save £4) A real-life political thriller telling the story of the individuals behind the most spectacular intelligence breach in history. © 2014 Guardian News and Media Limited or its affiliated companies. Send to a friend Your IP address will be logged Share Short link for this page: Contact us Close
The Limits of Intelligence Santiago Ramón y Cajal, the Spanish Nobel-winning biologist who mapped the neural anatomy of insects in the decades before World War I, likened the minute circuitry of their vision-processing neurons to an exquisite pocket watch. He likened that of mammals, by comparison, to a hollow-chested grandfather clock. Indeed, it is humbling to think that a honeybee, with its milligram-size brain, can perform tasks such as navigating mazes and landscapes on a par with mammals. A honeybee may be limited by having comparatively few neurons, but it surely seems to squeeze everything it can out of them. At the other extreme, an elephant, with its five-million-fold larger brain, suffers the inefficiencies of a sprawling Mesopotamian empire. Signals take more than 100 times longer to travel between opposite sides of its brain—and also from its brain to its foot, forcing the beast to rely less on reflexes, to move more slowly, and to squander precious brain resources on planning each step.