Leaked Documents Reveal Counterterrorism Tactics Used at Standing Rock to “Defeat Pipeline Insurgencies”

Internal TigerSwan documents provide a detailed picture of how the mercenary firm surveilled Dakota Access Pipeline opponents and infiltrated protest camps. Source: Leaked Documents Reveal Counterterrorism Tactics Used at Standing Rock to “Defeat Pipeline Insurgencies”

Sunday Morning News 2/16/14

http://www.reuters.com/article/2014/02/16/us-usa-kickstarter-idUSBREA1F03320140216?feedType=RSS&feedName=technologyNews Kickstarter was hacked, and some personal info was compromised but not credit card info. http://www.engadget.com/2014/02/16/google-acquires-slicklogin-sound-passwords/?ncid=rss_truncated Google acquires startup SlickLogin which uses inaudible sound to act as a password replacing the traditional typed password. http://www.reuters.com/article/2014/02/16/us-radiation-leak-newmexico-idUSBREA1F06Y20140216?feedType=RSS&feedName=topNews Possible radiation leak at New Mexico military nuclear waste site http://america.aljazeera.com/articles/2014/2/16/more-than-200-minerstrappedinsouthafricanillegalshaft.html More than 200 miners trapped in illegal South African […]

For 20 Years the Nuclear Launch Code at US Minuteman Silos Was 00000000

Today I found out that during the height of the Cold War, the US military put such an emphasis on a rapid response to an attack on American soil, that to minimize any foreseeable delay in launching a nuclear missile, for nearly two decades they intentionally set the launch codes at every silo in the […]