FBI Chief Says Threats From Drones to U.S. ‘Steadily Escalating’

https://www.theepochtimes.com/assets/uploads/2018/10/10/2018-10-10T154629Z_1_LYNXNPEE991DJ_RTROPTP_4_USA-SECURITY.jpg

FBI Director Christopher Wray, testifies before a Senate Homeland Security and Government Affairs Committee hearing on “Threats to the Homeland” at the Dirksen Senate Office Building in Washington on Oct. 10, 2018. REUTERS/Alex Wroblewski

 

WASHINGTON—FBI director Christopher Wray told a U.S. Senate panel on Wednesday that the threat from drones “is steadily escalating” even as Congress gives agencies new tools to address threats.

Wray told the Senate Homeland Security committee that the FBI assesses that “given their retail availability, lack of verified identification requirement to procure, general ease of use, and prior use overseas, (drones) will be used to facilitate an attack in the United States against a vulnerable target, such as a mass gathering.” Continue reading

The U.S. Is “Morphing” Into The U.S.S.A. – The United States Of Soviet America

https://www.zerohedge.com/sites/default/files/inline-images/america-crumbling.jpg?itok=LTUqPjkw

 

We are experiencing an ever-increasing level of  surveillance over the citizenry, government censorship and closed-door policies, control and manipulation of the media, and a “hardline” shift of all institutions to the left. The institutions I’m referring to specifically are the educational system (better termed a system of indoctrination), the courts, the religious institutions…every one of them are all “leaning” toward (if not striving toward) full blown socialism. Let us recall a key quote:

“The goal of Socialism is Communism.” – Lenin Continue reading

The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies

Recognition of this urgent and grave matter is finally receiving recognition by the mainstream media. Chinese microchips have been planted within every facet of U.S. life, from the military to household PC components, as well as everyday appliances such as irons and microwaves.

Further information previously archived on Global Geopolitics can be found within the following previous posts:

The Secret Ways of Chinese Telecom Giant Huawei (2013)

Security backdoor found in China-made US military chip (2012)

 

Click for a larger animated version. (Illustrator: Scott Gelber for Bloomberg Businessweek)

 

The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources.

In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices. Its technology had helped stream the Olympic Games online, communicate with the International Space Station, and funnel drone footage to the Central Intelligence Agency. Elemental’s national security contracts weren’t the main reason for the proposed acquisition, but they fit nicely with Amazon’s government businesses, such as the highly secure cloud that Amazon Web Services (AWS) was building for the CIA. Continue reading

China, Russia, Iran Engaged in Aggressive Economic Cyber Spying

https://fb13.akamaized.net/up/2018/07/china-economic-spying.png

 

Counterintelligence report details foreign spies theft of advanced U.S. technology

Foreign spies from China, Russia, and Iran are conducting aggressive cyber operations to steal valuable U.S. technology and economic secrets, according to a U.S. counterintelligence report.

The report by the National Counterintelligence and Security Center, a DNI counterspy unit, concludes China is among the most aggressive states engaged in stealing U.S. proprietary information as part of a government-directed program. Continue reading

Signs of sophisticated cellphone spying found near White House, U.S. officials say

https://www.washingtonpost.com/resizer/Smgx_AoHZ60OBOdXQWkeCSb7RzY=/1484x0/arc-anglerfish-washpost-prod-washpost.s3.amazonaws.com/public/YMY6POTOEU3KJIP43OKRBYZH3U.jpg

Members of the Secret Service patrol from the top of the White House. (Jabin Botsford/The Washington Post)

 

A federal study found signs that surveillance devices for intercepting cellphone calls and texts were operating near the White House and other sensitive locations in the Washington area last year.

A Department of Homeland Security program discovered evidence of the surveillance devices, called IMSI catchers, as part of federal testing last year, according to a letter from DHS to Sen. Ron Wyden (D-Ore.) on May 22. The letter didn’t specify what entity operated the devices and left open the possibility that there could be alternative explanations for the suspicious cellular signals collected by the federal testing program last year. Continue reading

Israel reportedly behind discovery of Russian antivirus company’s spy links

Computer hacking

 

Israeli spy services were reportedly behind the United States government’s recent decision to purge Kaspersky Lab antivirus software from its computers, citing possible collusion with Russian intelligence. Last month, the US Department of Homeland Security issued a directive ordering that all government computers should be free of software products designed by Kaspersky Lab. Formed in the late 1990s by Russian cybersecurity expert Eugene Kaspersky, the multinational antivirus software provider operates out of Moscow but is technically based in the United Kingdom. Its antivirus and cybersecurity products are installed on tens of millions of computers around the world, including computers belonging to government agencies in the US and elsewhere. But last month’s memorandum by the US government’s domestic security arm alarmed the cybersecurity community by alleging direct operational links between the antivirus company and the Kremlin. Continue reading

Trump chief of staff’s phone was breached for nearly a year, say sources

https://upload.wikimedia.org/wikipedia/commons/thumb/c/cb/John_Kelly_official_DHS_portrait.jpg/220px-John_Kelly_official_DHS_portrait.jpg

 

The personal cell phone of the White House Chief of Staff John Kelly (photo) was compromised by persons unknown and may have been bugged for nearly a year, according to United States government officials. General Kelly retired from the US Marine Corps in 2016, after serving as chief of the US Pentagon’s Southern Command, where he supervised American military operations in Latin America and the Caribbean. Soon afterwards, he was appointed by US President Donald Trump to lead the Department of Homeland Security, which he joined in January of 2017. Six months later, however, he replaced Reince Priebus, who resigned abruptly from the post of White House Chief of Staff, citing differences over management style with the Trump administration. Continue reading

Homeland Security Dept bars Kapersky software; Russian intel intrusion feared

Amid concern that cybersecurity software made by Kapersky Lab is vulnerable to intrusion by Russian intelligence services, the US Department of Homeland Security on Wednesday barred American federal agencies from using the company’s products. It said in a statement that “the Russian government could capitalize on access provided by Kaspersky products to compromise federal information and information systems”, directly affecting US national security. It noted that Russian law permits the country’s intelligence agencies “to request or compel assistance from Kaspersky and to intercept communications transiting Russian networks”. The company is reported to have a close working relationship with Russia’s FSB intelligence agency. Continue reading

NSA and CIA is the enemy of the people

 

Astute students of history understand that government agencies often further their own interests and not the administration they are designated to serve. Seldom is the genuine national security advanced when bureaucrats pledge their loyalty to their respective fiefdoms of projecting influence and power. Absent in this supremacy struggle equation is the abstract notion that state legitimacy is founded upon the will and consent of the people. Such a quaint concept does not reflect a chapter in the training manual that breeds the spooks who operate as above the law and unaccountable super spies.

Guarding signals traffic or capturing foreign communication is a logical task to protect national secrets, while gathering information on intentions and operations from adversaries. Once upon a time the National Security Agency directed the ECHELON project as a cold war network. Over the decades the functions of electronic surveillance broadened into collection on all forms of data, no matter the source or the national origin of the subject. Continue reading

Soros Bankrolling Effort to Stop Trump’s Temporary Refugee Halt Order

The real George Soros:

For more on Soros’ background and the destruction he has left behind, see here:

Discover the Networks – George Soros

Discover the Networks – George Soros Network

KeyWiki – George Soros

 

The flurry of anguished news stories and protests surrounding President Trump’s executive action temporarily suspending “immigrants and non-immigrants” from “countries of particular concern” appears to be part of a coordinated PR effort financed by left-wing billionaire George Soros.

Rather than a complete “Muslim ban” as promised during the campaign, Trump’s executive order contains moderate refugee restrictions, similar to those that have been implemented by President Obama. If reports are true that restrictions are being applied even to green-card holders, that is an unfortunate misapplication of the law that will likely soon be corrected.

Protesters quickly materialized Saturday at JFK Airport, where some refugees were being temporarily detained. Continue reading

Georgia’s secretary of state: DHS tried to breach our firewall

Georgia’s secretary of state has claimed the Department of Homeland Security tried to breach his office’s firewall and has issued a letter to Homeland Security Secretary Jeh Johnson asking for an explanation.

Brian Kemp issued a letter to Johnson on Thursday after the state’s third-party cybersecurity provider detected an IP address from the agency’s Southwest D.C. office trying to penetrate the state’s firewall. According to the letter, the attempt was unsuccessful.   Continue reading

Overwhelmed Border Patrol Agents Stuck Serving Burritos to Illegal Immigrants

Border Patrol agents look over the primary fence separating Tijuana, Mexico, right, and San Diego / AP

Agents spending great amount of time taking care of kids, families

Border agents have expressed shock at the menial tasks they’ve been required to perform following a massive flow of illegal immigrant children across the U.S. southern border, according to Morgan, who warned that the force is being strained as a result of this influx.

During one recent trip to a border patrol outpost, “the supervisor in charge said, ‘Chief, we’re going to do whatever this country asks us to do, but I never thought in my 20 years that I would be, as part of procurement, ordering baby powder and baby wipes,’” Morgan recalled during Wednesday testimony before the Senate Homeland Security and Governmental Affairs Committee. Continue reading

DHS may leave known smuggling route into U.S. unprotected

Agent told ‘by end of month we’re not covering it anymore’

An active smuggling route at the U.S. southern border with Mexico will be largely abandoned by the government at the end of this month, an agent with U.S. Border Patrol has informed WND.

The so-called “S2 route” runs along a two-lane county road through a remote area. More than 900 illegal immigrants have been apprehended on the route over the past year, said the agent, who works out of the USBP’s El Centro sector but asked not to be identified.

“For basically the last year we’ve been out there covering that route. Now we were told by the end of this month we’re not going to cover it anymore,” said the agent, who said he has personally patrolled the route in the past. “Nobody is going to be on this road come Oct. 1. Continue reading

Chinese spyware found on 700 million Android phones

Chinese-authored spyware that can be used to track a user’s movements and communications has been found on some 700 million Android smartphones, security researchers said.

The spyware, discovered by Virginia-based Kryptowire, was reportedly authored by Chinese startup Shanghai Adups Technology Company. Continue reading

FBI reports more attempts to hack voter registration system

There have also been ‘scanning activities,’ which could be preludes to attacks

The U.S. Federal Bureau of Investigation has found more attempts to hack the voter registration systems of states, ahead of national elections.

The agency had reportedly found evidence in August that foreign hackers had breached state election databases in Illinois and Arizona, but it appears that there have been other attempts as well, besides frequent scanning activities, which the FBI describes as preludes for possible hacking attempts.

Continue reading