recentpopularlog in

cia

« earlier   
Twitter
Langer Thread darüber, warum das im #Iran alles so gekommen ist. SEHR lesenswert.

#Mossadegh #CIA
https://t.co/cNLFS7YBD8
– vera bunse (kaffeebeimir) http://twitter.com/kaffeebeimir/status/899407508841910273
Iran  CIA  via:packrati.us  Mossadegh 
3 days ago by kelo
Robert Blum, the spy who shaped the world Part 1
Even for students of the history of the Intelligence Community (IC), Robert Blum is all but forgotten except as a bureaucrat, a professor, and the head of a philanthropic foundation with ties to the CIA. In reality, he was a counterintelligence chief who worked for several agencies, built large pieces of the United States’ foreign economic policies, had the Director of Central Intelligence fired, and redesigned a significant portion of the IC, including its mechanisms for covert action and propaganda.
history  CIA  intelligence  politics  propaganda  reference 
3 days ago by kmt
Obama’s secret struggle to retaliate against Putin’s election interference - Washington Post, June 23, 2017
Inside was an intelligence bombshell, a report drawn from sourcing deep inside the Russian government that detailed Russian President Vladi­mir Putin’s direct involvement in a cyber campaign to disrupt and discredit the U.S. presidential race.

But it went further. The intelligence captured Putin’s specific instructions on the operation’s audacious objectives — defeat or at least damage the Democratic nominee, Hillary Clinton, and help elect her opponent, Donald Trump.

At that point, the outlines of the Russian assault on the U.S. election were increasingly apparent. Hackers with ties to Russian intelligence services had been rummaging through Democratic Party computer networks, as well as some Republican systems, for more than a year. In July, the FBI had opened an investigation of contacts between Russian officials and Trump associates. And on July 22, nearly 20,000 emails stolen from the Democratic National Committee were dumped online by WikiLeaks.
Obama  obama_administration  Russia  hacking  2016USElections  sanctions  decision_making  NSC  Susan_Rice  CIA  intelligence_assessment  TrumpAdministration 
3 days ago by elizrael
Palantir Contract Dispute Exposes NYPD’s Lack of Transparency | Brennan Center for Justice
First, some background. Palantir is a secretive tech company founded in part with funds from In-Q-Tel, the venture capital arm of the CIA. Immigrations and Customs Enforcement (ICE) is one of dozens of government agencies with multimillion-dollar Palantir contracts, fueling fears that the technology could be used to enforce President Donald Trump’s aggressive immigration agenda. The NYPD has also had a contract with Palantir for years, but the specifics are still unknown.

All we know is that the NYPD was licensing Palantir software to produce analysis from data collected by the police, such as arrest records, license-plate reads, and parking tickets. According to BuzzFeed, Palatir’s software “graphs this data in a way that can reveal connections among crimes and people.” The NYPD’s continued use of this analytic data is at the center of the ongoing contract dispute. Palantir has declined to hand over a readable version of the data to the NYPD, claiming that doing so would threaten its intellectual property.

All of this begs the question: Why are New Yorkers just learning about this now, and where is the public oversight? 

We know who’s not being kept in the loop: the New York City Council.
CIA  NYPD  police  surveillance  data 
5 days ago by Quercki
CIA Torture Psychologists Settle Lawsuit | American Civil Liberties Union
“Government officials and contractors are on notice that they cannot hide from accountability for torture,” said Hina Shamsi, director of the ACLU National Security Project. “Our clients’ groundbreaking case has changed the legal landscape. It showed that the courts are fully capable of handling lawsuits involving abuses committed in the name of national security.”
ifttt  facebook  CIA  Torture 
6 days ago by minorjive
CouchPotato: CIA Hacking Tool to Remotely Spy On Video Streams in Real-Time
After disclosing CIA's strategies to hijack and manipulate webcams and microphones to corrupt or delete recordings, WikiLeaks has now published another Vault 7 leak, revealing CIA's ability to spy on video streams remotely in real-time.
Dubbed 'CouchPotato,' document leaked from the CIA details how the CIA agents use a remote tool to stealthy collect RTSP/H.264 video streams.
Real Time Streaming Protocol, or RTSP, is a network control protocol designed for use in entertainment and communication systems for controlling streaming media servers.
security  privacy  CIA  wikileaks  video  hack  spying 
12 days ago by rgl7194
Vault 7: Wikileaks Divulges CIA Tool for Capturing RTSP and H.264 Video Streams
Wikileaks published today a manual for an alleged CIA tool that can capture the content of remote video streams and save them to disk for further analysis.
The tool's name is CouchPotato and is described in a usage manual dated to February 14, 2014, available online here.
According to its manual, CIA operatives can use a command-line interface to start the tool and point it to the URL of an RTSP or H.264 video stream and the location where to save the stream on disk.
security  privacy  CIA  wikileaks  video  hack  spying 
12 days ago by rgl7194
The CIA, Washington Post, And Russia: What You're Not Being Told | Zero Hedge
According to an unsubstantiated article by the Washington Post, anonymous CIA officials have confirmed that the Russian government hacked the United States election to favor Donald Trump. Though it’s entirely possible the Russian government attempted to influence the election, the Post has been widely criticized — for the second time in a month — for its failure to follow basic journalistic practices. Nevertheless, the narrative is sticking. But the outlet’s behind-the-scenes relationship with the CIA is nothing new. In 2013, a conflict of interest arose shortly after Jeff Bezos, founder and CEO of Amazon, purchased the newspaper.
LIF-blog  CIA  journalism 
14 days ago by icresource
Politico’s Challenge to JFK Orthodoxy That Isn’t - WhoWhatWhy
Webster’s dictionary defines disinformation as: “false information deliberately and often covertly spread (as by the planting of rumors) in order to influence public opinion or obscure the truth.” For a fascinating example of disinformation, mainstream-media style, consider this story in Politico Magazine, How the CIA Came to Doubt the Official Story of JFK’s Murder by Philip Shenon and Larry J. Sabato.
At face value the headline sounds quite intriguing. It promises great new revelations. But skeptics will look at it differently: they believe that, since CIA operatives had a great deal to do with setting up Oswald in the first place, then of course they knew the official story was false from the beginning. They helped invent it.
POTUS  RIP  kennedy  60s  gov2.0  CIA  crime  politics  guns 
14 days ago by rgl7194
Vault 7: CIA Tool Can Shut Down Webcams and Corrupt Video Recordings
WikiLeaks has released today eight manuals from the CIA's Dumbo project, a tool that the Agency uses to disable webcams, microphones, and other surveillance software.
The purpose of this tool is to cripple audio and video surveillance on critical targets so that field agents can perform their missions.
The tool — named Dumbo — isn't malware but a Windows-only utility that agents carry around on a USB thumb drive. The agent inserts the tool in one of the target's computers and runs it. The tool uses the following GUI...
gov2.0  CIA  spying  video  camera  security  privacy  wikileaks 
14 days ago by rgl7194
This is How CIA Disables Security Cameras During Hollywood-Style Operations
In last 20 years, we have seen hundreds of caper/heist movies where spies or bank robbers hijack surveillance cameras of secure premises to either stop recording or set up an endless loop for covert operations without leaving any evidence.
Whenever I see such scenes in a movie, I wonder and ask myself: Does this happen in real-life?
Yes, it does, trust me—at least CIA agents are doing this.
gov2.0  CIA  spying  video  camera  security  privacy  wikileaks 
14 days ago by rgl7194
3 New CIA-developed Hacking Tools For MacOS & Linux Exposed
WikiLeaks has just published a new set of classified documents linked to another CIA project, dubbed 'Imperial,' which reveals details of at least three CIA-developed hacking tools and implants designed to target computers running Apple Mac OS X and different flavours of Linux operating systems.
If you are a regular reader of THN, you must be aware that this latest revelation by the whistleblower organisation is the part of an ongoing CIA-Vault 7 leaks, marking it as the 18th batch in the series.
If you are unaware of the Vault 7 leaks, you can head on to the second of this article for having a brief look on all the leaks at once.
Achilles — Tool to Backdoor Mac OS X Disk Images
Dubbed Achilles, the hacking tool allows CIA operators to combine malicious Trojan applications with a legitimate Mac OS app into a disk image installer (.DMG) file.
The binding tool, the shell script is written in Bash, gives the CIA operators "one or more desired operator specified executables" for a one-time execution.
gov2.0  malware  mac  installer  security  privacy  CIA 
15 days ago by rgl7194
Achilles, Aeris, and SeaPea Are 3 CIA Tools for Hacking Mac and POSIX Systems
Today, Wikileaks published more documents part of its Vault 7 CIA exposé series, revealing new manuals for three tools named Achilles, Aeris, and SeaPea, part of a larger CIA project named Imperial.
Each of the three tools has a different purpose, being developed to target only a specific set of operating systems.
Achilles
The first of these tools is named Achilles and this is a utility for trojanizing macOS DMG installers.
According to a one-page user guide released by WikiLeaks, Achilles allows an operator to bind an executable to a DMG file for a one-time execution.
Running the DMG file installs the original app, installs the payload, and then removes the payload from the DMG file. Using a one-time execution routine is typical to US cyber-intelligence, who are known to put a lot of effort into remaining undetected on targeted machines.
gov2.0  malware  mac  installer  security  privacy  CIA 
15 days ago by rgl7194
Twitter
RT : ’s list of ways to censor information because it’s classified has been censored because it’s classified…
CIA  from twitter
15 days ago by DocDre
The Mapmaker’s Craft: A History of Cartography at CIA — Central Intelligence Agency
Tracing its roots to October 1941, CIA’s Cartography Center has a long, proud history of service to the Intelligence Community (IC) and continues to respond to a variety of finished intelligence map requirements. The mission of the Cartography Center is to provide a full range of maps, geographic analysis, and research in support of the Agency, the White House, senior policymakers, and the IC at large. Its chief objectives are to analyze geospatial information, extract intelligence-related geodata, and present the information visually in creative and effective ways for maximum understanding by intelligence consumers.
Since 1941, the Cartography Center maps have told the stories of post-WWII reconstruction, the Suez crisis, the Cuban Missile crisis, the Falklands War, and many other important events in history.
CIA  maps  cartography 
16 days ago by shannon_mattern
Twitter
. ha publicado "Dumbo": el sistema de la para apagar cámaras de seguridad y/o manipular grabaciones.…
CIA  from twitter_favs
20 days ago by larissas
How the CIA Came to Doubt the Official Story of JFK’s Murder
Newly released documents from long-secret Kennedy assassination files raise startling questions about what top agency officials knew and when they knew it.
history  clippings  Kennedy  Warren+Commission  JFK  CIA  assassinations  National+Archives+and+Records+Administration 
20 days ago by mjb

Copy this bookmark:





to read