Archive for the ‘Espionage’ Tag

Lebanon returns Israeli vulture cleared of spying   Leave a comment


aaline

The World is going to the Birds.

israel1

aaline

BBC

A huge vulture detained in Lebanon on suspicion of spying for Israel has been returned home after UN peacekeepers intervened, Israeli officials said.

The bird, which has a 1.9m (6ft 5in) wing span, flew over the border from an Israeli game reserve and was caught by Lebanese villagers on Tuesday.

They became suspicious as the griffon vulture had a tracking device attached to its tail.

It is part of a conservation project to reintroduce raptors to the Middle East.

Wildlife officials say the vulture was brought from Spain last year and set free about a month ago in the Gamla Nature Reserve in the Israeli-occupied Golan Heights.

Tel Aviv University is involved in tracking the bird, and as well as a GPS transmitter, it had tags on its wings and an engraved metal ring on its leg saying: “Tel Aviv Univ Israel”.

‘Discreet operation’

Wildlife officials in Israel were alerted to its capture when photos of the tied-up bird appeared on social media.

aaline

vulture

“In a discreet operation with the Lebanese and with the great help of UN forces and the UN liaison unit, the Israel Nature and Parks Authority was able to return the vulture that was caught a few days ago by villagers of Bint Jbeil, Lebanon,” an Israeli statement released on Friday said.

The Lebanese media says the villagers freed the vulture after it became clear it was not on a spying mission.

After its ordeal the bird was weak and was being treated for minor injuries, officials said.

It is not the first time a griffon vulture has been taken to be an agent of the Israeli spy agency Mossad.

Saudi Arabia captured one, also with a Tel Aviv University tracker, in the desert city of Hyaal in 2011, sparking rumours of a “Zionist plot” that were dismissed by Israeli officials.

.

 

Posted January 30, 2016 by markosun in Uncategorized

Tagged with ,

The NSA can take complete control of any Smartphone   Leave a comment


aaline

hack1

aaline

 

Edward Snowden interview: ‘Smartphones can be taken over’

BBC

Smartphone users can do “very little” to stop security services getting “total control” over their devices, US whistleblower Edward Snowden has said.

The former intelligence contractor told the BBC’s Panorama that UK intelligence agency GCHQ had the power to hack into phones without their owners’ knowledge.

Mr Snowden said GCHQ could gain access to a handset by sending it an encrypted text message and use it for such things as taking pictures and listening in.

The UK government declined to comment.

Mr Snowden spoke to Panorama in Moscow, where he fled in 2013 after leaking to the media details of extensive internet and phone surveillance by his former employer, the US National Security Agency (NSA).

He did not suggest that either GCHQ or the NSA were interested in mass-monitoring of citizens’ private communications but said both agencies had invested heavily in technology allowing them to hack smartphones. “They want to own your phone instead of you,” he said.

Mr Snowden talked about GCHQ’s “Smurf Suite”, a collection of secret intercept capabilities individually named after the little blue imps of Belgian cartoon fame.

“Dreamy Smurf is the power management tool which means turning your phone on and off without you knowing,” he said.

“Nosey Smurf is the ‘hot mic’ tool. For example if it’s in your pocket, [GCHQ] can turn the microphone on and listen to everything that’s going on around you – even if your phone is switched off because they’ve got the other tools for turning it on.

“Tracker Smurf is a geo-location tool which allows [GCHQ] to follow you with a greater precision than you would get from the typical triangulation of cellphone towers.”

Peter Taylor’s film Edward Snowden: Spies and the Law also covers:

  • The contentious relationship between the British government and social media companies. The intelligence agencies and the police want the companies to co-operate in detecting terrorist content but the programme learns that not all companies are prepared to co-operate to the extent that the agencies would like.
  • Documents leaked by Mr Snowden that appear to show that the UK government acquired vast amounts of communications data from inside Pakistan by secretly hacking into routers manufactured by the US company, Cisco.

aaline

hacker

US President Barack Obama and Vice President Joe Biden meet with executives from leading technology companies, including Apple, Twitter and Google, in this Dec. 17 archive photo. The documents seen by SPIEGEL indicate the NSA’s desire to “subvert endpoint devices”.

aaline

‘Necessary and proportionate’

Mr Snowden also referred to a tool known as Paronoid Smurf.

“It’s a self-protection tool that’s used to armour [GCHQ’s] manipulation of your phone. For example, if you wanted to take the phone in to get it serviced because you saw something strange going on or you suspected something was wrong, it makes it much more difficult for any technician to realise that anything’s gone amiss.”

Once GCHQ had gained access to a user’s handset, Mr Snowden said the agency would be able to see “who you call, what you’ve texted, the things you’ve browsed, the list of your contacts, the places you’ve been, the wireless networks that your phone is associated with.

“And they can do much more. They can photograph you”.

Mr Snowden also explained that the SMS message sent by the agency to gain access to the phone would pass unnoticed by the handset’s owner.

“It’s called an ‘exploit’,” he said. “That’s a specially crafted message that’s texted to your number like any other text message but when it arrives at your phone it’s hidden from you. It doesn’t display. You paid for it [the phone] but whoever controls the software owns the phone.”

aaline

hack GCHQ-aerial

GCHQ is the UK government’s digital spy agency

Looks like something out of James Bond.

aaline

Describing the relationship between GCHQ and its US counterpart, he said: “GCHQ is to all intents and purposes a subsidiary of the NSA.

“They [the NSA] provide technology, they provide tasking and direction as to what they [GCHQ] should go after.”

The NSA is understood to have a similar programme to the Smurf Suite used by GCHQ on which it is reported to have spent $1bn in response to terrorists’ increasing use of smartphones.

Mr Snowden said the agencies were targeting those suspected of involvement in terrorism or other serious crimes such as pedophilia “but to find out who those targets are they’ve got to collect mass data”.

“They say, and in many cases this is true, that they’re not going to read your email, for example, but they can and if they did you would never know,” he said.

In a statement, a spokesperson for the UK government said: “It is long-standing policy that we do not comment on intelligence matters.

“All of GCHQ’s work is carried out in accordance with a strict legal and policy framework, which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the secretary of state, the interception and intelligence services commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”

The government believes Mr Snowden has caused great damage to the intelligence agencies’ ability to counter threats to national security.

Mr Snowden maintains he has acted in the public interest on the grounds that the surveillance activities revealed in the thousands of documents he leaked are carried out – in his words – “without our knowledge, without our consent and without any sort of democratic participation”.

aalineaalineaalineaaline

Inside The NSA Utah Data Center

Denise Harwood diagnoses an overheated computer processor at Google’s data center in The Dalles, Ore. Google uses these data centers to store email, photos, video, calendar entries and other information shared by its users.

aaline

NSA Texas

hack nsa texas

aaline

For quite some time now, the intelligence agency has maintained a branch with around 2,000 employees at Lackland Air Force Base, in San Antonio. In 2005, the agency took over a former Sony computer chip plant in the western part of the city. A brisk pace of construction commenced inside this enormous compound. The acquisition of the former chip factory at Sony Place was part of a massive expansion the agency began after the events of Sept. 11, 2001.

On-Call Digital Plumbers

One of the two main buildings at the former plant has since housed a sophisticated NSA unit, one that has benefited the most from this expansion and has grown the fastest in recent years — the Office of Tailored Access Operations, or TAO. This is the NSA’s top operative unit — something like a squad of plumbers that can be called in when normal access to a target is blocked.

According to internal NSA documents viewed by SPIEGEL, these on-call digital plumbers are involved in many sensitive operations conducted by American intelligence agencies. TAO’s area of operations ranges from counterterrorism to cyber attacks to traditional espionage. The documents reveal just how diversified the tools at TAO’s disposal have become — and also how it exploits the technical weaknesses of the IT industry, from Microsoft to Cisco and Huawei, to carry out its discreet and efficient attacks.

.

Posted January 29, 2016 by markosun in Uncategorized

Tagged with

Nazis UFOs are coming!!   Leave a comment


In Ufology, conspiracy theory, science fiction, and comic book stories, claims or stories have circulated linking UFOs to Nazi Germany. The German UFO theories describe supposedly successful attempts to develop advanced aircraft or spacecraft prior to and during World War II, and further assert the post-war survival of these craft in secret underground bases in Antarctica, South America, the United States or the Moon, along with their creators. According to these theories and fictional stories, various potential code-names or sub-classifications of Nazi UFO craft such as Rundflugzeug, Feuerball, Diskus, Haunebu, Hauneburg-Gerät, V7, Vril, Kugelblitz (not related to the self-propelled anti-aircraft gun of the same name), Andromeda-Gerät, Flugkreisel, Kugelwaffe, and Reichsflugscheibe have all been referenced.

Some UFO sightings during World War II, particularly those known as foo fighters, were thought by the Allies to be prototype enemy aircraft designed to harass Allied aircraft through electromagnetic disruption; a technology similar to today’s electromagnetic pulse (EMP) weapon.

.

nazis2

nazis3

nazis4

NazihitlerOvnis

Posted November 29, 2015 by markosun in Uncategorized

Tagged with , , , , , , , ,

Russian Subs and Spy Ships Sneaking Around Underwater Fiber Optic Cable Zones   Leave a comment


NY Times

cables6

Russian Akula Class nuclear attack submarine.

cables5

cables7

Worldwide underwater fiber optic cable systems.

.

cables

cable map 2

.

cables8

cables4

Cable laying ship

cables2

Giant cable spool on a laying ship

cables spool on ship

.

Posted October 26, 2015 by markosun in Uncategorized

Tagged with , ,

Israeli Secret Agent Dolphin apprehended off coast of Gaza   Leave a comment


BBC

Hamas ‘seizes Israeli spy dolphin’ off Gaza

Hamas claims to have captured a dolphin being used as an Israeli spy off the coast of Gaza, local media report.

The militant Palestinian Islamist group, which dominates Gaza, says the mammal was equipped with spying devices, including cameras, according to the newspaper Al-Quds (in Arabic).

It was apparently discovered by a naval unit of Hamas’s military wing and brought ashore.  Al-Quds said that the newest recruit was “stripped of its will” and turned into “a murderer” by the Israeli security services.

It shows the extent of Israel’s “anger” and “indignation” at the formation of Hamas’s naval combat unit, the paper reports.

Israeli authorities have not commented on the media reports.

 

This photo was possibly released by Russian intelligence, apparently taken from a Russian mini-sub.

camerax2

The dolphin appears to have some type of massive camera harnessed to its back

It is not the first time that Israel has been accused of using animals – and birds – for spying purposes.

In 2010 Israel dismissed Egyptian claims that a series of shark attacks in the Red Sea could have been the result of a Mossad plot.

A few weeks later a vulture found in Saudi Arabia with a GPS transmitter was accused of being an unwitting Mossad operative.

And in 2012, villagers in Turkey feared a small migratory bird found dead with a ring on its leg had been an Israeli spy. Their fear proved unfounded.

gaza

Israel controls most of Gaza’s borders, coastline and airspace

.

Posted August 20, 2015 by markosun in Uncategorized

Tagged with

Salon Kitty: the beginning of the Nazisploitation genre   Leave a comment


Salon Kitty is a 1976 erotic-drama film directed by Tinto Brass. The film was coproduced by Italy, France and West Germany. It is based on the novel of the same name by Peter Norden, covering the real life events of the Salon Kitty Incident, where the Sicherheitsdienst (SS intelligence) took over an expensive brothel in Berlin, had the place wire tapped and all the prostitutes replaced with trained spies in order to gather data on various members of the Nazi party and foreign dignitaries.

It is considered among the progenitors of Nazisploitation genre.

salon_kitty

salon_kitty_helmut_berger_tinto_brass_004_jpg_eaip

German prostitutes considered exceptionally beautiful or sexually attractive were selected by the Berlin police to work at the brothel rather than receiving financial punishment.

Salon Kitty was a high-class Berlin brothel used by the Nazi intelligence service, the Sicherheitsdienst (SD), for espionage purposes during World War II.

Created in the early 1930s, the salon was taken over by SS general Reinhard Heydrich and his subordinate Walter Schellenberg in 1939. The brothel was managed by Kitty Schmidt throughout its entire existence who was the original owner. The plan was to seduce top German dignitaries, foreign visitors as well as diplomats with alcohol and women so they would disclose secrets or express their honest opinions on Nazi-related topics and individuals. Notable guests included Heydrich himself, Joseph Dietrich, Galeazzo Ciano and Joseph Goebbles. The building housing the salon was destroyed in an air raid in 1942 and the project quickly lost its importance. Salon Kitty has been the inspiration or subject to many brothels featured in films involving Nazi espionage.

salon 2

Although married, Reinhard Heydrich enjoyed a number of visits to Salon Kitty

As if infidelity mattered to this cold blooded murderer and proponent of genocide.

.

salon kitty

Salon-Kitty_Collectors-Edition_Blu-ray_dvd_cover_D

.

Posted August 17, 2015 by markosun in Uncategorized

Tagged with , ,

Edward Snowden playing with fire, and lives!   Leave a comment


Telegraph

UK under pressure to respond to latest Edward Snowden claims

Downing Street and the Home Office are being challenged to answer in public claims that Russia and China have broken into the secret cache of Edward Snowden  files and that British agents have had to be withdrawn from live operations as a consequence.

The reports first appeared in the Sunday Times, which quoted anonymous senior officials in No 10, the Home Office and security services. The BBC also quoted an anonymous senior government source, who said agents had to be moved because Moscow gained access to classified information that reveals how they operate.

Snowden, a former NSA contractor, handed over tens of thousands of leaked documents to the Guardian in Hong Kong two years ago. He left Hong Kong with flights booked to Latin America but was stopped in Russia when the US revoked his passport, and has been living in Moscow in exile since.

He has repeatedly said he handed over all the documents to journalists in Hong Kong and no longer has access to them, making it impossible for either China or Russia to get to them through him. The Sunday Times and BBC do not say where China or Russia allegedly gained access to the files.

Espionage is part of geopolitics, look at James Bond!

spy_vs_spy_by_ragdollnamedgary

Snowden doesn’t seem to realize there are some extremely nasty creatures in the jungle.  They have to be confronted.  If idiots like Snowden revealed national security secrets every time they saw something, in their minds, wrong with the intelligence gathering process, where would it end?  It would be impossible to conduct espionage.  Leaks would be based on one persons perceived moral compass. Edward Snowden is sitting in a ruthless dictatorship condemning his home country.  Are the Russian plutocrats better than American law?

Posted June 16, 2015 by markosun in Uncategorized

Tagged with ,

So, The NSA has an actual Skynet program   Leave a comment


Wired

nsa9

We’ve suspected it all along—that Skynet, the massive program that brings about world destruction in the Terminator movies, was just a fictionalization of a real program in the hands of the US government. And now it’s confirmed—at least in name.

As The Intercept reports today, the NSA does have a program called Skynet. But unlike the autonomous, self-aware computerized defense system in Terminator that goes rogue and launches a nuclear attack that destroys most of humanity, this one is a surveillance program that uses phone metadata to track the location and call activities of suspected terrorists. A journalist for Al Jazeera reportedly became one of its targets after he was placed on a terrorist watch list.

Ahmad Muaffaq Zaidan, bureau chief for Al Jazeera’s Islamabad office, got tracked by Skynet after he was identified by US intelligence as a possible Al Qaeda member and assigned a watch list number. A Syrian national, Zaidan has scored a number of exclusive interviews with senior Al Qaeda leaders, including Osama bin Laden himself.

Skynet uses phone location and call metadata from bulk phone call records to detect suspicious patterns in the physical movements of suspects and their communication habits, according to a 2012 government presentation The Intercept obtained from Edward Snowden.

The presentation indicates that Skynet looks for terrorist connections based on questions such as “who has traveled from Peshawar to Faisalabad or Lahore (and back) in the past month? Who does the traveler call when he arrives?” It also looks for suspicious behaviors such as someone who engages in “excessive SIM or handset swapping” or receives “incoming calls only.”

The behaviours mentioned in the last paragraph does not in any way affect the average citizen.  The NSA doesn’t care if you hack into Penthouse magazine’s archives.  It is looking for Muslim terrorist schemers and cutthroats. The Taliban and ISIS use child suicide bombers, as young as 10 years old. 60 Minutes had a great documentary on the subject this past weekend. It was mind-boggling beyond a rational persons comprehension.

Link below:

http://www.cbsnews.com/news/child-suicide-bombers-lara-logan-60-minutes/

 

ISIS doing what it does best, slaughtering!

nsa8

Back to the NSA Skynet:

The goal is to identify people who move around in a pattern similar to Al Qaeda couriers who are used to pass communication and intelligence between the group’s senior leaders. The program tracked Zaidan because his movements and interactions with Al Qaeda and Taliban leaders matched a suspicious pattern—which is, it turns out, very similar to the pattern of journalists meeting with sources.

We should note that the NSA has a second program that more closely resembles the Terminator‘s Skynet. This one is called MonsterMind, as revealed by Edward Snowden last year in an interview with WIRED and James Bamford. MonsterMind, like the film version of Skynet, is a defense surveillance system that would instantly and autonomously neutralize foreign cyberattacks against the US, and could be used to launch retaliatory strikes as well. Under this program algorithms would scour massive repositories of metadata and analyze it to differentiate normal network traffic from anomalous or malicious traffic. Armed with this knowledge, the NSA could instantly and autonomously identify, and block, a foreign threat.

Snowden also suggested, however, that MonsterMind could one day be designed to return fire—automatically, without human intervention—against an attacker. Because an attacker could tweak malicious code to avoid detection, a counterstrike would be more effective in neutralizing future attacks. Sounds a lot like Skynet. No word from the NSA on why they didn’t use that iconic film name for its real-world Skynet.

nsa4

nsa2

.

Posted May 20, 2015 by markosun in Uncategorized

Tagged with

Da Da Canada, Nyet Nyet Soviet   Leave a comment


Since the current government in Russia is acting like the old totalitarian Soviet regime, I thought it was apropos to use the old term Soviet.  Canada beat the Russky commies good today to take the World Hockey Championship.  Righteousness always defeats corruption.  Hear that Putin?  Or should I say Rasputin?

hockeyz1

– 

hockeyx

flag_canadajets2

PutinSnowden

A hero to some, a dirty scoundrel traitor to most of us, whistle blower Snowden and Rasputin looking for more secrets to steal. One of the greatest triumphs of World War II was British intelligence breaking the Enigma code. Spies helped win that war. It was all kept secret. A Bodyguard of Secrets. Would a WW II era Snowden have sold these secrets to Hitler?

 

Posted May 17, 2015 by markosun in Uncategorized

Tagged with ,

Fictional Espionage Agencies with Interesting Acronyms   Leave a comment


C.I.S.O. (Canadian International Security Organization), from the Captain Canuck comic book series. Not to be confused with C.S.I.S., the current Canadian spy agency.

acronyms11

C.L.I.T.O.R.I.S. (The Committee for the Liberation and Integration of Terrifying Organisms and their Rehabilitation Into Society), from Red Dwarf

 

acronyms1

C.O.B.R.A. (Criminal Organization of Bloodiness, Revenge and Assassination), an international terrorist organization, headed by Cobra Commander, from the G.I. Joe series.

acronym2

G.R.A.M.P.A. (Global Reaction Agency for Mysterious Paranormal Activity), an international intelligence agency in Marvel Comics.

acronyms2

I.S.I.S (International Secret Intelligence Service) is the agency employing the lead characters in Archer (TV series). Not to be confused with those blood thirsty Muslim terrorists.

acronyms3

K.A.B.O.O.M. (Key Atomic Benefits Organization of Mankind), from the movie The Naked Gun 2½: The Smell of Fear.

acronyms4

SPECTRE (Special Executive for Counter-intelligence, Terrorism, Revenge, and Extortion), from the James Bond series.

acronyms5

  • T.H.U.N.D.E.R.(The Higher United Nations Defense Enforcement Reserves), from Tower Comics.

acronyms6

U.G.L.I. (Undercover Global League of Informants) in the Hardy Boys book, Secret Agent of Flight 101.

acronym7

U.N.C.L.E. (United Network Command for Law and Enforcement) and T.H.R.U.S.H., from The Man from U.N.C.L.E.. (The meaning of T.H.R.U.S.H. was never revealed on the series; but, in the novelizations it was stated to be “Technological Hierarchy for the Removal of Undesirables and the Subjugation of Humanity”.)

acronyms7

V.E.N.O.M. (The Vicious, Evil Network Of Mayhem), the evil mask-wearing cohort from the 1980s Saturday-morning cartoon M.A.S.K.

acronyms8

V.I.L.E. (The Villains’ International League of Evil), Carmen Sandiego’s band of international thieves.

acronyms10

Z.O.W.I.E. (Zonal Organization for World Intelligence and Espionage), from the movies Our Man Flint and In Like Flint.

acronyms9

Posted May 13, 2015 by markosun in Uncategorized

Tagged with ,