secret   6187

« earlier    

Using Gradle for Sensitive Credentials – Ash Davies – Medium
It obviously goes without saying that you shouldn't store sensitive data such as client id’s or secrets in plain text or commit it as part of a Git or Subversion repository. In actual fact you…
android  security  key  api  secret 
8 days ago by lgtout
The One Place in the US Google Earth Stopped Mapping - Motherboard
"We were interested in the mechanism used in the censorship. Was it a physical component of the satellite itself that prevented it from taking a photo? A direct order from the federal government to the satellite company that we could FOIA? Or something quieter, harder to track? So we began to research the history of commercial satellite imaging. In 1992, 32 years after the first classified US reconnaissance satellite was placed in orbit, the US Land Remote Sensing Policy Act made it legal for commercial satellite imagery vendors to sell to civilian entities. The politics of this were, and remain, a compromise between the two predominant neoliberal concerns of national security and capital. If anyone could purchase satellite images, a certain tactical advantage would be lost by US military/security forces.

However, as former CIA Senior Executive Intelligence Officer Michele Brunngraber wrote in a paper for the National War College [pdf], "the argument was that it would be better to have U.S. contractors dominate the industry," where the industry-standard resolution and other points of concern could be regulated by federal law. Still, the tension between the concerns of capital and national security continues to the present day. In 2016 Walter Scott, the founder of DigitalGlobe, an industry-leading commercial satellite imagery vendor, pleaded for the unleashing of the “power of the U.S. commercial remote sensing industry.”

This close relationship between the private sector and the government allows the federal government to censor satellite imagery officially and unofficially. The official censorship method is known as "Formal Interruption of Normal Commercial Operations," also known as "Modified Operations" or "Shutter Control” [pdf]. This occurs when the National Geospatial-Intelligence Agency (NGA), the Department of the Navy, the Department of Commerce, or another government agency invokes national security and declares the sale of certain imagery as off-limits for the commercial satellite imagery market or demands commercial satellite image resellers/providers reduce the image resolution of said imagery. Shutter control proved highly controversial as a concept, at least until 9/11 occurred and First Amendment rights began to be routinely sacrificed en masse for nebulous security gains.

But shutter control has never been officially invoked. Bureaucracy may have something to do with this, as the Secretary of State, Commerce, or Defense would have to sign such an order personally. Instead, the federal agency in question practices what is known as "checkbook shutter control" or "buy-to-deny," purchasing the exclusive rights to imagery from commercial satellite vendors and then sitting on said rights. According to various media sources, buy-to-deny was used in conjunction with US operations in Afghanistan in 2001 and 2002. An NGA spokesperson, however, told us in an email that there is no such policy and that "given the number of vendors and capabilities in the current commercial remote sensing marketplace, it would not be practical nor effective to take this approach." This year, Walter Scott confirmed to Wired that there is an "exclusivity arrangement" between DigitalGlobe and "US government customers.""
us  googleearth  satellite  imagery  secret  nevada  shuttercontrol 
17 days ago by gohai
Former CIA Chief Explains How Spies Use Disguises | WIRED - YouTube
Former Chief of Disguise for the CIA, Jonna Mendez, explains how disguises are used in the CIA, and what aspects to the deception make for an effective disguise.
secret  military  interesting  videos 
19 days ago by ramitsethi

« earlier    

related tags

'flower  "wacky  18.09  2018-07-27  2018-08-06  2018-08-13  2018  2019  72  a  aasaanji  acid  activity  administration's  admission  advance  ae:  affiliate  afghanistan  after  airbnb  alex  alexander  american  americans  an  and  andreas  android  andy  ansible  anti-china  anti-trans  any  anymore?  api  apologizes  app  apparent  apple  are  around  article  as  asked  asleep  atkins  atma  atmayoga  attorney  audio  aws  bagpiper  base64  basketball  bdsm  beach  been  behind  between  big  billion  billionaire  blasts  bomb  bombs:  book  boston  boy'  brain  break  brennan  build  buildkit  bulls  buying  byttow  call  canada  can’t  catamarans  catches  cause  chanakya  change  changed  charisme  cheka  chief  china  cia  city  civilian  class  co-founder  cohen's  comments  commit  committee  companies  concert—here’s  conclusions  cookie  cornwall  corruption  crappy  creator  ctrl+alt+del  daily  dandelion  darkens  dashboard  david  death  debate  decode  decrypted  decryption  derrick  designed  details  detection  detox  devops  did  dirty  docker  document  documentation  done  doom  draxe  drink  driving  drugs  easter  easteregg  ecommerce  edinburgh  editor  efficiency  egg  elon  embassy  emma  emmerdale’s  empires:  encrypted  encryption  engineering  enriches  envoy  equipment  espionnage  europe  events  example  excuse  executive  exodus  expert.  explains  family  famous  fat  favorite  february  fergus  fight  file  files  finally  firing  first  flight  for  forever  former  friend  friends  friendship  from  funders  gaping  gaza  general  getting  git  github  gitlab-ci  go  golang  googleearth  government  great!  grove  guardian  guide  gwynne  had  handwriting  harlow  harvard  has  he's  head  health  heat  held  helm  her  hidden  hides  hiding  his  history  holes  holiday  holygrail  host  hours  how  howto  htc  i  identity  idle  idleness  ifttt  illness  imagery  important  in  industry  influence  ingredient  inspector  instagram  intel  interesting  is  its  it’s  jailed  jenkins  jobs  john  joins  k8s  karma  keep  kelly  kentucky  key  kgb  korea  korean  kubernetes  launches  law?  law  lawyer  legal  lesbianing  lewandowski  lines:  links  lisa  lyft  makers  management  marijuana  matt  max  mccartney’s  meeting  memories  memory  mi6  microchips  microsoft  might  military  mmm  model  money  moritz  mueller's  mueller’s  musk  name  names  nationwide  netanyahu  nevada  new  news  next  nkvd  north  nosrat’s  now  nude  nyc  of  office  ogpu  omarosa's  omarosa"  omarosa  omarosa’s  omswami  on  open  opsec  over  palestinian  parades  passenger—with  password  passwords  past  paul  payola:  pdf  peace  people  perepilichnyy  photo  plan  plans  plays  pocket  political  politics  politique  ponder  possible  president's  prisoners  privacy  private  process  programming  protections  quickforget  reason  recipe  recording  recordings  reference  rejuvenation  relationship”  releases  report  report:  reportedly  research  restaurant’s  reveals  rich  richest  robert  root  rose  rosé  russia  russian  salt  samin  satellite  saying:  schweizer  scoop:  screen  secrets  secure  security  sensitive  service  services  session  shamir  share  sharing  she  shotwell  shows  shuttercontrol  sisi  skies  skull  sleep  smart  smb  snap  sodone  some  son  sops  sorority  south  spacex  spied  spy  ssh  staging  stay  stealth  steve  stores  success  successful  suggested  supremecourt  surefire  surveillance  swimming  take  talks  tape  tapes  terrorism  tesla  test  thanksgiving  the  they're  through  tickets  timeless  to  token  tool  tools  touch  trading  travel  trump  try  tsa  tunnel  tutorial  tv  tweets  two  tyler  u.s.  ulchemy  underwear  university  unveils  up  us  uses  ussr  variable  variables  vault  victoria's  victoria’s  videos  waitlist.dat  weapon  web  what  whitaker  who  why  wild  will  windows  wine  winnie  with  woman  work  years  yoga  your  ‘stole’  “i’m  “vanity” 

Copy this bookmark:



description:


tags: