warrenellis + spook   13

Messages in the Deep - Builtvisible
"Below, you’ll find an interactive map charting the growth of the modern fibre optic network between 1989 to the modern day, and including cables to be completed in the next few years. You can select a country to see all connections to and from that nation, or specify a provider to see the parts of the network owned by that company."
comms  spook  war 
38 minutes ago by warrenellis
How Al-Qaeda Uses Crypto Post-Snowden (Part 1)
"Following the June 2013 Edward Snowden leaks we observe an increased pace of innovation, specifically new competing jihadist platforms and three (3) major new encryption tools from three (3) different organizations – GIMF, Al-Fajr Technical Committee, and ISIS – within a three to five-month time frame of the leaks."
tech  comms  spook  war 
11 weeks ago by warrenellis
History of 1953 CIA Covert Action in Iran to be Published - Secrecy News
"The publication of the 1989 Iran volume was a milestone in the history of U.S. government secrecy that prompted widespread outrage and ridicule, but it also inspired remedial efforts that had some lasting impact."
pol  spook  history 
april 2014 by warrenellis
NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls - The Washington Post
"In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary."
spook  pol  comms 
march 2014 by warrenellis
Can We Avoid a Surveillance State Dystopia? - Charlie's Diary
"Yearly reminder: unless you're over 60, you weren't promised flying cars. You were promised an oppressive cyberpunk dystopia. Here you go."
war  pol  comms  intel  spook 
february 2014 by warrenellis
Two-Decade Review Yields History of Covert Action in Congo
"“At the same time, based on authorization from President Eisenhower’s statements at an NSC meeting on August 18, 1960, discussions began to develop highly sensitive, tightly-held plans to assassinate Lumumba. After Lumumba’s death at the hands of Congolese rivals in January 1961, the U.S. Government authorized the provision of paramilitary and air support to the new Congolese Government….”"
war  crime  spook  intel 
december 2013 by warrenellis
Karl reMarks: The incredible story of how Putin used secret KGB chess tactics to outwit the US
In the KGB for example, only agents promoted to the prestigious X2, nicknamed the steel professors

THE STEEL PROFESSORS
spook  pol  war 
november 2013 by warrenellis
Johannes Trithemius - Wikipedia, the free encyclopedia
This book is in three volumes, and appears to be about magic—specifically, about using spirits to communicate over long distances. Since the publication of the decryption key to the first two volumes in 1606, they have been known to be actually concerned with cryptography and steganography. Until recently, the third volume was widely still believed to be solely about magic, but the "magical" formulae have now been shown to be covertexts for yet more cryptography content.[5] H
code  magic  spook  history 
august 2013 by warrenellis
Senate Puts Brakes on Defense Clandestine Service
"The Senate moved last week to restrain the rapid growth of the Defense Clandestine Service, the Pentagon’s human intelligence operation."
war  spook  intel  pol 
december 2012 by warrenellis

Copy this bookmark:



description:


tags: