geheimdienst_us_cia_ddi_cci   3

Trump, Seeking to Relax Rules on U.S. Cyberattacks, Reverses Obama Directive
Mr. Trump signed an order on Wednesday reversing the classified rules, known as Presidential Policy Directive 20, that had mapped out an elaborate interagency process that must be followed before U.S. use of cyberattacks, particularly those geared at foreign adversaries. The change was described as an “offensive step forward” by an administration official briefed on the decision, one intended to help support military operations, deter foreign election influence and thwart intellectual property theft by meeting such threats with more forceful responses. It wasn’t clear what rules the administration is adopting to replace the Obama directive. A number of current U.S. officials confirmed the directive had been replaced but declined to comment further, citing the classified nature of the process. The policy applies to the Defense Department as well as other federal agencies, the administration official said, while declining to specify which specific agencies would be affected. One former senior U.S. official who worked on cybersecurity issues said there were also concerns that Mr. Trump’s decision will grant the military new authority “which may allow them to have a domestic mission.”
wsj, 15.08.2018
geheimdienst_allg_sabotage  land_usa  us_regierung_ppd20  geheimdienst_us_nsa_tao_cna_cne  itsicherheit_malware_spyware  us_ministerium_verteidigung  geheimdienst_polizei_infiltration_tech  staat_politik_geheimhaltung  militär_us_cyber_command_oco_cna_cne  militär_allg_infiltration_tech  militär_allg_sabotage  geheimdienst_us_cia_ddi_cci  us_regierung_potus  militär_allg_kriegsführung_elektro_it_ki 
5 weeks ago by kraven
The spy base where real-life British 'Qs' collaborated with CIA to hack TVs and phones
A secretive branch of Britain’s intelligence services which is home to real life ‘Qs’ fictionalised in James Bond was behind the hacking of mobile phones and televisions revealed in a series of leaked CIA documents. Her Majesty’s Government Communications Centre (HMGCC) is identified in the Wikileaks files as the British intelligence agency that collaborated with the CIA in breaking into the operating systems of iPhones. HMGCC is a little known outpost of the Foreign Office based in and around Hanslope Park, a 17th century manor house hidden down a leafy lane just off the M1 and close to Milton Keynes in Buckinghamshire. Unlike more famous branches of the British secret services - such as MI5, MI6 and GCHQ - little is known about HMGCC.
daily telegraph, 10.03.2017
geheimdienst_uk_hmgcc  geheimdienst_uk_mi6_sis_tsd  geheimdienst_us_cia_ddi_cci  überwachung_int_sigint_comint  geheimdienst_polizei_zusammenarbeit  land_uk  land_usa  geheimdienst_polizei_infiltration_tech  ngo_wikileaks_cia_vault  uk_ministerium_außen 
march 2017 by kraven
Vault7 - Year Zero
WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency. The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election. Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive. "Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.
wikileaks, 07.03.2017
geheimdienst_us_cia_ioc  land_usa  geheimdienst_allg_sabotage  geheimdienst_allg_spionage  geheimdienst_allg_verdeckte_operation  itsicherheit_exploit_flaw  itsicherheit_malware_spyware  überwachung_int_sigint_comint  geheimdienst_us_analyse_datenzentrum  geheimdienst_us_cia_ddi_cci  überwachung_akustisch  überwachung_raum  überwachung_lokalisierung_bewegung  überwachung_itk_inhaltsdaten  überwachung_mobilfunk  überwachung_chat_telefonie_voip  geheimdienst_polizei_zusammenarbeit  geheimdienst_us_fbi  geheimdienst_uk_gchq  geheimdienst_uk_mi5_ss  überwachung_quellen_tkü  geheimdienst_us_cia_ddi_ccie  überwachung_onlinedurchsuchung  krypto_crypto_war  geheimdienst_us_cia_ddi_cci_edg  itsicherheit_hardware  itsicherheit_os  itsicherheit_mobil_os  geheimdienst_polizei_infiltration_tech  ngo_wikileaks_cia_vault  geheimdienst_polizei_tarnung_undercover  militär_allg_kriegsführung_elektro_it_ki 
march 2017 by kraven

related tags

geheimdienst_allg_sabotage  geheimdienst_allg_spionage  geheimdienst_allg_verdeckte_operation  geheimdienst_polizei_infiltration_tech  geheimdienst_polizei_tarnung_undercover  geheimdienst_polizei_zusammenarbeit  geheimdienst_uk_gchq  geheimdienst_uk_hmgcc  geheimdienst_uk_mi5_ss  geheimdienst_uk_mi6_sis_tsd  geheimdienst_us_analyse_datenzentrum  geheimdienst_us_cia_ddi_cci_edg  geheimdienst_us_cia_ddi_ccie  geheimdienst_us_cia_ioc  geheimdienst_us_fbi  geheimdienst_us_nsa_tao_cna_cne  itsicherheit_exploit_flaw  itsicherheit_hardware  itsicherheit_malware_spyware  itsicherheit_mobil_os  itsicherheit_os  krypto_crypto_war  land_uk  land_usa  militär_allg_infiltration_tech  militär_allg_kriegsführung_elektro_it_ki  militär_allg_sabotage  militär_us_cyber_command_oco_cna_cne  ngo_wikileaks_cia_vault  staat_politik_geheimhaltung  uk_ministerium_außen  us_ministerium_verteidigung  us_regierung_potus  us_regierung_ppd20  überwachung_akustisch  überwachung_chat_telefonie_voip  überwachung_int_sigint_comint  überwachung_itk_inhaltsdaten  überwachung_lokalisierung_bewegung  überwachung_mobilfunk  überwachung_onlinedurchsuchung  überwachung_quellen_tkü  überwachung_raum 

Copy this bookmark:



description:


tags: