Page 3 of 4 FirstFirst 1234 LastLast
Results 21 to 30 of 34

Thread: intelligence gathering disciplines

  1. #21
    Senior Member atmjjc's Avatar
    Join Date
    Dec 2011
    Location
    Lost in Time
    Posts
    830
    Blog Entries
    11
    Some Orwellian news here…

    To break up human trafficking of the slave trade business is a noble cause but why now and why this way? So why not focus their efforts on the borders and the ports, it’s not rocket science here folks.

    Think there might be more to this government intrusion to the internet?

    -----------------------------------
    DARPA Wants to Help You Search the Web Better

    The Defense Advanced Research Projects Agency has kicked off a project to fine tune Web searches by topical domain rather than general subjects, allowing it to “maintain technological superiority in the area of content indexing and Web search on the Internet.”

    DARPA plans to use the system initially to counter human trafficking, which is enabled by websites, forums and chat rooms.

    DARPA said its “Memex” (a combination of the words memory and index) project will, among other things, search “deep Web” content missed by commercial search engines and “will address the inherent shortcomings of centralized search by developing technology for domain-specific indexing of Web content and domain-specific search capabilities.”

    Memex will develop technology to enable discovery, organization, and presentation of domain-relevant content. DARPA envisions the new system providing fast, flexible and efficient access to domain-specific content as well as search interfaces that offer valuable insight into a domain that previously remained unexplored.

    DARPA wants researchers to develop advanced and highly automated Web-crawler software to penetrate sites and resources that have erected crawler defenses to aid domain-specific indexing and a domain specific search engine.

    The research agency said the Memex system can help counter human trafficking, which, “especially for the commercial sex trade, is a line of business with significant Web presence to attract customers and is relevant to many types of military, law enforcement, and intelligence investigations.”

    Human trafficking forums, chats, advertisements, job postings and hidden services “continue to enable a growing industry of modern slavery,” DARPA said. “An index curated for the counter trafficking domain, including labor and sex trafficking, along with configurable interfaces for search and analysis will enable a new opportunity for military, law enforcement, legal, and intelligence actions to be taken against trafficking enterprises.”

    The Memex project takes its name and inspiration from a 1945 article in The Atlantic titled As We May Think, in which Dr. Vannevar Bush, head of the White House Office of Scientific Research and Development, envisioned an analog computer to supplement human memory, the Memex, which would store and automatically cross-reference all of the user’s books, records and other information.

    DARPA expects the Memex research project will run three years with proposals due April 8.

    http://www.defenseone.com/technology...itial-continue
    We control matter because we control the mind. Reality is inside the skull.
    ~ George Orwell ‘1984’

  2. #22
    An interesting group of vids to look over when you have the time.

    http://www.youtube.com/playlist?list...-_NaU2BKppx5kg
    project-maji forum

  3. #23
    Senior Member atmjjc's Avatar
    Join Date
    Dec 2011
    Location
    Lost in Time
    Posts
    830
    Blog Entries
    11
    TAO— ‘Tailored Access Operations’

    At one time I viewed Edward Snowden as a patriot but the more I learn of the secrets he bellied up to the world concerning our countries “D” operations and how important and vulnerable our digital infrastructure is to the national security of the free world the more I am beginning to awaken to the big picture of why our spying apparatus should and must remain secret and the more I begin to view Snowden as a traitor.

    Though the world of spying has its own jargon of what they term certain operations within their circle one of the most successful ways the TAO operate is what I refer to as a honey trap brush pass form of spying where they hack the hackers of foreign and domestic black hats without their knowledge kicking back and stealing or viewing their operations in real time and gaining valuable insight and secrets of who and what the black hats are attempting to accomplish establishing motive of who, what, where etc. and the fifty shades of MK... of why the brush. The (I)z want to know what and especially who, asks the bearded man to the blond carrier.



    The NSA has its own team of elite hackers
    The WASHINGTON POST
    By Andrea Peterson



    Our Post colleagues have had a busy day. First, they released documents revealing the U.S. intelligence budget from National Security Agency (NSA) leaker Edward Snowden. Then they recounted exactly how the hunt for Osama bin Laden went down.

    In that second report, Craig Whitlock and Barton Gellman shared a few tidbits about the role of the government's hacking unit, Tailored Access Operations (TAO) in the hunt, writing that TAO "enabled the NSA to collect intelligence from mobile phones that were used by al-Qaeda operatives and other 'persons of interest' in the bin Laden hunt."

    So just what is Tailored Access Operations? According to a profile by Matthew M. Aid for Foreign Policy, it's a highly secret but incredibly important NSA program that collects intelligence about foreign targets by hacking into their computers, stealing data, and monitoring communications. Aid claims TAO is also responsible for developing programs that could destroy or damage foreign computers and networks via cyberattacks if commanded to do so by the president.

    So, TAO might have had something to do with the development of Stuxnet and Flame, malware programs thought to have been jointly developed by the U.S. and Israel. The malware initially targeted the Iranian nuclear program, but quickly made its way into the digital wild.

    According to Aid, TAO's primary base is in the NSA headquarters in Fort Meade. There, he says, some 600 members of the unit work rotating shifts 24-7 in an "ultramodern" space at the center of the base called the Remote Operations Center (ROC).

    The unit bears a striking resemblance to a Chinese hacking group described in a report released by cybesecurity company Mandiant earlier this year. The report indicated that that group, APT1, was likely organized by the Chinese military. Perhaps not so coincidentally, Aid says multiple confidential sources have told him that TAO has "successfully penetrated Chinese computer and telecommunications systems for almost 15 years," in the process, "generating some of the best and most reliable intelligence information about what is going on inside the People's Republic of China."

    But for all the reported secrecy surrounding TAO's activities, a quick search of networking site LinkedIn shows a number of current and former intelligence community employees talking pretty openly about the exploits.

    To continue reading----->http://www.washingtonpost.com/blogs/...elite-hackers/
    We control matter because we control the mind. Reality is inside the skull.
    ~ George Orwell ‘1984’

  4. #24
    Be very afraid...this kind of power corrupts..... They already killed Hastings

  5. #25
    Senior Member newyorklily's Avatar
    Join Date
    Nov 2011
    Location
    New York City
    Posts
    5,638
    Blog Entries
    3
    With people talking openly about it on LinkedIn, wouldn't that indicate that it is more propaganda hype than physically real?

    Sent from my LG-LS720 using Tapatalk
    www.disclosurebeginsathome.wordpress.com
    Disclosure begins at home so start a conversation about UFOs.
    "Debunkers are like school yard bullies." - Kevin Smith to Leslie Kean, August 31, 2010

  6. #26
    Senior Member newyorklily's Avatar
    Join Date
    Nov 2011
    Location
    New York City
    Posts
    5,638
    Blog Entries
    3
    Some of you might be interested in this. Coursera is offering a free internet class on Surveillance Law. It is being taught at Stanford and begins today, January 19. You can access it here https://www.coursera.org/course/surveillance

    Sent from my LG-LS720 using Tapatalk
    www.disclosurebeginsathome.wordpress.com
    Disclosure begins at home so start a conversation about UFOs.
    "Debunkers are like school yard bullies." - Kevin Smith to Leslie Kean, August 31, 2010

  7. #27
    Senior Member atmjjc's Avatar
    Join Date
    Dec 2011
    Location
    Lost in Time
    Posts
    830
    Blog Entries
    11
    I pulled this article from ‘Defense One” concerning SOCOM and Social Media and how in certain circumstances it is used in the battlefield with our military for positive ID (PID).

    SOCOM is an acronym referring to the United States Special Operations Command.

    http://www.defenseone.com/technology...seone_today_nl



    ...
    We control matter because we control the mind. Reality is inside the skull.
    ~ George Orwell ‘1984’

  8. #28
    Senior Member atmjjc's Avatar
    Join Date
    Dec 2011
    Location
    Lost in Time
    Posts
    830
    Blog Entries
    11
    Quote Originally Posted by murmur View Post
    Be very afraid...this kind of power corrupts..... They already killed Hastings
    Yep, just look at the pushback to Rolling Stone Magazine when they reported the gang bang rape that never took place. Just about ruined the Magazine and destroyed its credibility. LOL wonder who had a hand in that.
    We control matter because we control the mind. Reality is inside the skull.
    ~ George Orwell ‘1984’

  9. #29
    Senior Member atmjjc's Avatar
    Join Date
    Dec 2011
    Location
    Lost in Time
    Posts
    830
    Blog Entries
    11
    The Washington Post came out with an enlightening article about the Pentagon's hosting of a $3.5 million, international competition that will pit robot against robot in an obstacle course designed to test their physical prowess, agility, and even their awareness and cognition.


    Washington Post
    By Christian Davenport May 16 at 10:18 PM

    Military pushes for emergency robots as skeptics worry about lethal uses

    It’s 6-foot-2, with laser eyes and vise-grip hands. It can walk over a mess of jagged cinder blocks, cut a hole in a wall, even drive a car. And soon, Leo, Lockheed Martin’s humanoid robot, will move from the development lab to a boot camp for robots, where a platoon’s worth of the semiautonomous mechanical species will be tested to see if they can be all they can be.


    To continue http://www.washingtonpost.com/busine...fb7_story.html

  10. #30
    Senior Member atmjjc's Avatar
    Join Date
    Dec 2011
    Location
    Lost in Time
    Posts
    830
    Blog Entries
    11
    The link below will give you a pretty good capture of which catalogs the type of tools used in cyber espionage of over 60 countries. I was really surprised at Ethiopia.

    The Wall Street Journal
    By Jennifer Valentino-DeVries, Lam Thuy Vo and Danny Yadron
    Published Dec. 28, 2015 at 12:00 p.m. ET

    To view…http://graphics.wsj.com/world-catalogue-cyberwar-tools/

    atmjjc
    We control matter because we control the mind. Reality is inside the skull.
    ~ George Orwell ‘1984’

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •