Jump to content

Rate this topic

Recommended Posts

9373

1] Follow-up to next above: https://www.reuters.com/article/us-usa-security-kaspersky/trump-administration-orders-purge-of-kaspersky-products-from-u-s-government-idUSKCN1BO2CH  of 13Sept17

2] Bradley "Chelsea" Manning 14Sept17 1943hrsEDT  https://www.nbcnews.com/feature/nbc-out/ex-cia-boss-resigns-harvard-after-chelsea-manning-hire-n801341   Former acting DClA M.Morell resigned over the Kennedy School of Gov't hired Manning as a Visiting Fellow.

Share this post


Link to post
Share on other sites

9373

1] Follow-up to next above: https://www.reuters.com/article/us-usa-security-kaspersky/trump-administration-orders-purge-of-kaspersky-products-from-u-s-government-idUSKCN1BO2CH  of 13Sept17

2] Bradley "Chelsea" Manning 14Sept17 1943hrsEDT  https://www.nbcnews.com/feature/nbc-out/ex-cia-boss-resigns-harvard-after-chelsea-manning-hire-n801341   Former acting DClA M.Morell resigned over the Kennedy School of Gov't hired Manning as a Visiting Fellow.

Share this post


Link to post
Share on other sites

9510

From 1973 -A Back to the Future Congressional Hearing- "Telephone monitoring practices by Federal agencies: hearings ..."

https://archive.org/stream/telephonemonitor00unit/telephonemonitor00unit_djvu.txt 

The interesting stuff starts on page 6

"Two-way Television" [using back-emf-reflectivity the picture tube also functioned as a TV camera; like with your smart phone]

Touch-Tone phones with one-button tapping

How the military 'spied' on governors and the VP.

p.30 how medical records were retrieved back then

p.34 A detective that broke a major mafia case testifies that wiretapping provided "no evidence" or "dramatic information" and that other investigative techniques made the cases. Most of what was overheard was "nonsense".

p.37 "conspiracy" as a basis for 'emergency wiretaps'

While a light read, and a very interesting one from a technical viewpoint, it does become repetitive after page 40.

Some Help Notes:

CWA = Communications Workers of America, a union who wanted these hearings

Anderson = "Jack" Anderson, one of Drew Pearson's boys who did investigative reports, muckraking and is one founder of America's "scandal culture".

TouchTone = trademark of an AT&T button phone

 

Edited by hasanhh

Share this post


Link to post
Share on other sites

9590

ln conformance with the OP ...

You cannot hide it from  Electronics Detecting Dogs / Electronics Sniffing Dogs 

http://www.techrepublic.com/article/electronics-sniffing-dogs-how-k9s-became-a-secret-weapon-for-solving-high-tech-crimes/ 

The K9s can find microSDs inside receptacle plates (wall plug outlets), and DVDs, CDs, flashdrives, and whatever else hidden, apparently, anywhere.

As at the end of the article, these dogs will now be made available to companies.

 

Share this post


Link to post
Share on other sites

9628

North Korea-DPRK "hacks" RoK and maybe US power companies.

OPLAN 5015 Total War on DPRK war plan stolen

Dark Web opns

"The Daily 202: Foreign intelligence agencies might be using your anti-virus software against you"

https://www.washingtonpost.com/news/powerpost/paloma/daily-202/2017/10/11/daily-202-foreign-intelligence-agencies-might-be-using-your-anti-virus-software-against-you/59dd6e5a30fb0468cea81e60/?utm_term=.ff35276ec1c1 

:cry: "Thank You Again, NSA & CSS."

Share this post


Link to post
Share on other sites

9798

:dwarf: "Over a TTTrillion Dollars spent and now THIS ?"  :cry:

While Ed Snowden leaked the code names and descriptions of unlawful surveillance programs, Shadow Brokers are leaking lines-of-code.

Kapersky used the codewords to develop information from word searches.

One document showing a Russian company hacked into one company that serves as a "vendor" for election systems in the US is the basis for "Russia hacked the 2016 General Election". [so was it Epson or Diebold ?]

For a detailed article see: https://www.nytimes.com/2017/11/12/us/nsa-shadow-brokers.html  who broke the story.

For short descriptions see: https://www.thedailybeast.com/report-nsa-hunts-for-moles-amid-crippling-information-leaks  &  https://www.fastcompany.com/40495158/mysterious-hackers-theft-of-cyberweapons-from-nsa-exceeds-damage-done-by-snowden-leaks 

OPINE: With "airgaps" in use since the 1990s, procedures, white-hat operations, and so forth ... the problem is geographical :einstein:s.  NSA & CSS  facilities are so widely dispersed -and connected many relationships by cable- that you have a tap problem wherein ajoined analyzers can auto-detect the alternating 'dead-lines' used to detect taps. Similarly for wave-forms such as in GWEN.

N.S.A. = National Security Affliction 

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×