CIA   8732

« earlier    

The Former Chief of Disguise of the CIA Explains How Spies Use Disguises
In this video, Jonna Mendez, the former Chief of Disguise of the CIA, explains how disgu — Wait, wait, wait…Chief of Disguise!! That is an actual job title!?! WHAT! Ok, back to the post… — explains how disguises are used in the CIA.
With women, you have a broader range of what you can do. You also have one extra step: you can turn a woman into a man. I would mention that it’s almost impossible to turn a man into a woman. What we do is always additive — we can make you taller, we can make you heavier, we can make you older — we can’t go the other direction. You want to be the person that gets on the elevator and then gets off and nobody even remembers that you were really there. That is a design goal at the disguise labs at CIA.
Interesting throughout. As a fan of the disguises on The Americans and as someone who got to wear some bitchin’ makeup for a short extra appearance on Halt and Catch Fire, I really enjoyed this video, but now I’m wondering what my “dead giveaway” mannerisms are. Friends, any thoughts?
CIA  gov2.0  spying  video 
yesterday by rgl7194
The Mystery of the Havana Syndrome
Between December 30, 2016, and February 9, 2017, at least three C.I.A. officers working under diplomatic cover in Cuba had reported troubling sensations that seemed to leave serious injuries. When the agency sent reinforcements to Havana, at least two of them were afflicted as well.

All the victims described being bombarded by waves of pressure in their heads. Unlike Lee, though, the C.I.A. officers said that they heard loud sounds, similar to cicadas, which seemed to follow them from one room to another. But when they opened an outside door the sounds abruptly stopped. Some of the victims said that it felt as if they were standing in an invisible beam of energy.
Havana-Syndrome  Cuba  CIA  sonic-weapons  sound  brain-damage  2016  2017  2018 
2 days ago by zzkt
Former CIA Chief Explains How Spies Use Disguises | WIRED - YouTube
Former Chief of Disguise for the CIA, Jonna Mendez, explains how disguises are used in the CIA, and what aspects to the deception make for an effective disguise.
cia  disguise  pocket-recommendation  video  youtube 
3 days ago by kogakure
The CIA's communications suffered a catastrophic compromise
“We’re still dealing with the fallout,” said one former national security official. “Dozens of people around the world were killed because of this.”
china  cia  security 
6 days ago by soobrosa
The CIA's communications suffered a catastrophic compromise
In 2013, hundreds of CIA officers — many working nonstop for weeks — scrambled to contain a disaster of global proportions: a compromise of the agency’s internet-based covert communications system used to interact with its informants in dark corners around the world. Teams of CIA experts worked feverishly to take down and reconfigure the websites secretly used for these communications; others managed operations to quickly spirit assets to safety and oversaw other forms of triage.
China  CIA  iran  govtInfiltration 
7 days ago by Jswindle
CENTER LANE Information Papers
Declassified docs of that time the army tried to train psychics in remote viewing
cia  intelligence  spying  funny  government 
8 days ago by agius
Falsehood shames Clapper, Brennan and pledge to protect whistleblowers | TheHill
An assurance given to US senators about intelligence monitoring was false and disingenuous — and it took four years and a new presidential administration to get the truth.
Clapper  Brennan  CIA  Whistleblowers  theHill 
8 days ago by PGEddington
The CIA's communications suffered a catastrophic compromise • Yahoo News
Zach Dorfman and Jenna McLaughlin:
<p>Though the Iranians didn’t say precisely how they infiltrated the network, two former U.S. intelligence officials said that the Iranians cultivated a double agent who led them to the secret CIA communications system. This online system allowed CIA officers and their sources to communicate remotely in difficult operational environments like China and Iran, where in-person meetings are often dangerous.

A lack of proper vetting of sources may have led to the CIA inadvertently running a double agent, said one former senior official — a consequence of the CIA’s pressing need at the time to develop highly placed agents inside the Islamic Republic. After this betrayal, Israeli intelligence tipped off the CIA that Iran had likely identified some of its assets, said the same former official.

The losses could have stopped there. But U.S. officials believe Iranian intelligence was then able to compromise the covert communications system. At the CIA, there was “shock and awe” about the simplicity of the technique the Iranians used to successfully compromise the system, said one former official.

In fact, the Iranians used Google to identify the website the CIA was using to communicate with agents. Because Google is continuously scraping the internet for information about all the world’s websites, it can function as a tremendous investigative tool — even for counter-espionage purposes. And Google’s search functions allow users to employ advanced operators — like “AND,” “OR,” and other, much more sophisticated ones — that weed out and isolate websites and online data with extreme specificity.

According to the former intelligence official, once the Iranian double agent showed Iranian intelligence the website used to communicate with his or her CIA handlers, they began to scour the internet for websites with similar digital signifiers or components — eventually hitting on the right string of advanced search terms to locate other secret CIA websites. From there, Iranian intelligence tracked who was visiting these sites, and from where, and began to unravel the wider CIA network.</p>


Iran then cooperated with China to identify US agents there, and then more widely identified US agents worldwide. Stunning piece of reporting. A long read, but worth it. Because of this, a number of US agents in China were caught and executed - the latter fact was reported separately of this a while back.
google  security  china  cia 
9 days ago by charlesarthur
How to explain the KGB’s amazing success identifying CIA agents in the field?
Thus one productive line of inquiry quickly yielded evidence: the differences in the way agency officers undercover as diplomats were treated from genuine foreign service officers (FSOs). The pay scale at entry was much higher for a CIA officer; after three to four years abroad a genuine FSO could return home, whereas an agency employee could not; real FSOs had to be recruited between the ages of 21 and 31, whereas this did not apply to an agency officer; only real FSOs had to attend the Institute of Foreign Service for three months before entering the service; naturalized Americans could not become FSOs for at least nine years but they could become agency employees; when agency officers returned home, they did not normally appear in State Department listings; should they appear they were classified as research and planning, research and intelligence, consular or chancery for security affairs; unlike FSOs, agency officers could change their place of work for no apparent reason; their published biographies contained obvious gaps; agency officers could be relocated within the country to which they were posted, FSOs were not; agency officers usually had more than one working foreign language; their cover was usually as a “political” or “consular” official (often vice-consul); internal embassy reorganizations usually left agency personnel untouched, whether their rank, their office space or their telephones; their offices were located in restricted zones within the embassy; they would appear on the streets during the working day using public telephone boxes; they would arrange meetings for the evening, out of town, usually around 7.30 p.m. or 8.00 p.m.; and whereas FSOs had to observe strict rules about attending dinner, agency officers could come and go as they pleased.
cia  Russia  spying  epicfail 
9 days ago by andrewducker
The CIA's communications suffered a catastrophic compromise
According to the former intelligence official, once the Iranian double agent showed Iranian intelligence the website used to communicate with his or her CIA handlers, they began to scour the internet for websites with similar digital signifiers or components — eventually hitting on the right string of advanced search terms to locate other secret CIA websites.
google  security  infosec  cia  via:jomc 
10 days ago by ignatz

« earlier    

related tags

1947  1960s  1970s  1974  2009  2013  2015  2016  2017  2018  abuse  activism  adventure  afghanistan  africa  amazon.com  amazon  analysis  antiwar/movement(60s-70s)  antiwar  apple  appropriations  arabia  aws  barackobama  bin  bloomberg.com  bloomberg  books  brain-damage  brennan  briefing  bug  bush  business  businessweek.com  cell  charlesliang  chief  china  chip  cia  clapper  clippings  cognition  cold-war  communications  communism  compression  computers  congress  conspiracy  corporate  corruption  costume  counterculture  counterintelligence  creativewriting  crime  criticism  cuba  culture  cybersecurity  d.c.  data  deaths  deception  deep-state  delegation  democratic  democrats  denismcdonough  dhs  digitimes  disguise  disguises  dissident  dnc  document  dod  domestic  donald_trump  donaldtrump  doubelagent  double  drone+base  drone  drones  drugs  election2016  elections  elemental  elementaltechnologies  encryption  epicfail  espionage  ethics  experience  face  facebook  famine  fashion  fbi  fiction  film  fiveeyes  foia  folter  for  ford  foreign+policy  fraud  funny  games  geopolitics  georgewbush  giftgas  google  gop  gov2.0  government  govtinfiltration  grandideastudio  hack  hacker  hacking  hardware  havana-syndrome  history  homelessness  hrc  huawei  humor  illusion  imperialism  implant  in  infosec  inspectorgeneral  intelligence  intelligence_community  interdiction  interesting  internationalrelations  interview  irak  iran  iraq  irvinmcculough  jaredkushner  jerrylee  joefitzpatrick  joegrand  johnreidy  joke  jokes  jordanrobertson  journalism  khashoggi  laden  leadership  lif-blog  maghreb  manufacturing  martinlutherkingjr  mask  mbs  media  meetings  michaelriley  mikepompeo  military  mind  missionimpossible  motherboard  movie  msnbc  murder  navy  newleft  news  niger  nsa  nuclearweapons  nyt  obama  oil  on  openculture  opsec  osama  palestinian  peoplesliberationarmy  perryhayes  phones  plan  pocket-recommendation  pocket  politics  polygraph  potus  press  prisoners  privacy  propaganda  psychology  publishing  putin  qtel  read  recruiting  religion  republican  republicans  roberts  rockefellercommission  root  rusia  russia  russiagate  russian  saic  sanjose  saudi-arabia  saudi  saudiarabia  saudis  scandal  scandals  scoop:  scotus  secret  security  securitybreach  server  shows  siliconvalley  snowden  socialjustice  sonic-weapons  sound  soviet  sovietunion  specialforces  spies  spooky  spy  spying  staffers  statedepartment  supermicro(super_micro_computer)  supermicro  supply_chain_attach  supplychain  surveillance  sxsw  talks  target  technology  terrorism  test  thehill  thesixties  to  topsylabs  torture  trump  turkey  tv  tweets  twitter  u.s.  united-kingdom  united-states  us  usa  uspoli  ussr  video  vietnamwar  villagevoice  violence  vladimir_putin  wapo  war  web  whistleblower  whistleblowers  whitehouse  wired  with  wot  xijinping  yahoo  yemen  youtube  zte 

Copy this bookmark:



description:


tags: