Internal TigerSwan documents provide a detailed picture of how the mercenary firm surveilled Dakota Access Pipeline opponents and infiltrated protest camps. Source: Leaked Documents Reveal Counterterrorism Tactics Used at Standing Rock to “Defeat Pipeline Insurgencies”
http://www.engadget.com/2014/09/01/wifi-physics-signal-reception/ 3D-Printed ‘Bump Key’ Can Open Almost Any Lock
The NSA has exploited Heartbleed bug for years, Bloomberg reports | The Verge.
http://www.reuters.com/article/2014/02/16/us-usa-kickstarter-idUSBREA1F03320140216?feedType=RSS&feedName=technologyNews Kickstarter was hacked, and some personal info was compromised but not credit card info. http://www.engadget.com/2014/02/16/google-acquires-slicklogin-sound-passwords/?ncid=rss_truncated Google acquires startup SlickLogin which uses inaudible sound to act as a password replacing the traditional typed password. http://www.reuters.com/article/2014/02/16/us-radiation-leak-newmexico-idUSBREA1F06Y20140216?feedType=RSS&feedName=topNews Possible radiation leak at New Mexico military nuclear waste site http://america.aljazeera.com/articles/2014/2/16/more-than-200-minerstrappedinsouthafricanillegalshaft.html More than 200 miners trapped in illegal South African […]
“N.S.A. Devises Radio Pathway Into Computers – NYTimes.com” “N.S.A. Devises Radio Pathway Into Computers – NYTimes.com”
Today I found out that during the height of the Cold War, the US military put such an emphasis on a rapid response to an attack on American soil, that to minimize any foreseeable delay in launching a nuclear missile, for nearly two decades they intentionally set the launch codes at every silo in the […]
If a recently leaked document is any indication, the US National Security Agency — or its UK counterpart — appears to have put on a Google suit to gather intelligence. Read this article by Edward Moyer on CNET News. NSA disguised itself as Google to spy, say reports