Tag Archives | Leaks

Leaked Documents Reveal GCHQ Has Tools to Manipulate Online Information

Government_Communications_Headquarters_logo.svgDocuments have been leaked that show how the GCHQ (Government Communications Headquarters) has tools that can manipulate online information.

via The Guardian:

The disclosure comes the day before the UK parliament is due to begin up to three days’ debate on emergency legislation governing British surveillance capabilities. With cross-party support the bill is expected to be voted through this week.

Among the programs revealed in the document are:

• GATEWAY: the “ability to artificially increase traffic to a website”.

• CLEAN SWEEP which “masquerade[s] Facebook wall posts for individuals or entire countries”.

• SCRAPHEAP CHALLENGE for “perfect spoofing of emails from BlackBerry targets”.

• UNDERPASS to “change outcome of online polls”.

• SPRING BISHOP to find “private photos of targets on Facebook”.

The document also details a range of programs designed to collect and store public postings from Facebook, Twitter, LinkedIn and Google+, and to make automated postings on several of the social networks.

Read the rest
Continue Reading

2014 Academy Awards – Best “Most American” Film (leaked clip)

Oscars 2014 – Preview (Spoiler Alert Leaked Clip!!!) 86th Academy Awards

Benny and Kevin from JoyCamp were thrilled to be invited back to the Academy Awards. They had a lot of fun presenting the award for The Best “Most American” Film of the Year (despite a little snafu at the end). Check out this leaked clip to see who won, and what happened during their presentation.

Read the rest

Continue Reading

Revealed: The Burglars Who Beat J. Edgar Hoover and the FBI

Hoover-JEdgar-LOCIt must have been incredibly difficult to pull off this raid on the FBI and never have your secret leak, least of all to the FBI and it’s then omnipotent boss J. Edgar Hoover. The New York Times profiles the gang who pulled it off:

The perfect crime is far easier to pull off when nobody is watching.

So on a night nearly 43 years ago, while Muhammad Ali and Joe Frazier bludgeoned each other over 15 rounds in a televised title bout viewed by millions around the world, burglars took a lock pick and a crowbar and broke into a Federal Bureau of Investigation office in a suburb of Philadelphia, making off with nearly every document inside.

They were never caught, and the stolen documents that they mailed anonymously to newspaper reporters were the first trickle of what would become a flood of revelations about extensive spying and dirty-tricks operations by the F.B.I.

Read the rest
Continue Reading

What Goes Around Comes Around: The Karma Of Political Deception

Politicians follow laws or make their own but often don’t think that one of the oldest moral admonitions applies to them: the law of karma. That’s the one, seeped in Buddhist philosophy, but accepted by other religious traditions, that says ‘what goes around comes around.’

It’s a variant of the biblical injunction to do unto others what you want others to do unto you and the notion that for every action there’s a reaction.

The concept has many interpreters including this one: “Karma is not punishment or retribution but simply an extended expression or consequence of natural acts. Karma means ‘deed’ or ‘act’ and more broadly names the universal principle of cause and effect, action and reaction, that governs all life.”

Here’s President Obama committed to high tech warfare turning the skies into a shooting gallery. The idea of course is to precisely find and target enemies using super computers and image enhancement technologies to neutralize (i.e.… Read the rest

Continue Reading

Anonymous Claims to Breach NATO Security

Anonymous NATOVia Fox News:

NATO is looking into claims that hackers have breached its security and accessed scads of material so confidential the hacker group itself deemed it “irresponsible” to publish them all, despite a series of international raids Tuesday designed to corral the hacking activity.

“NATO is aware that hacker group released what it claims to be NATO classified documents on the internet,” a NATO spokseman said in a statement. “NATO security experts are investigating these claims. We strongly condemn any leak of classified documents which could potentially endanger the security of NATO allies, armed forces and citizens.”

The group, which goes by the name “Anonymous,” claimed to be sitting on about 1 gigabyte of data. The hackers broadcast a link to a PDF file Thursday via Twitter, showing what appeared to be a document headed “NATO Restricted.”

The group’s actions have become intolerable, Steven Chabinsky, deputy assistant FBI director, said in an interview with NPR.

Read the rest
Continue Reading

LulzSec Leaks Arizona Law Enforcement Papers

LulzSecRob Beschizza writes on BoingBoing:
LulzSec announced Thursday evening the publication at Pirate Bay of a trove of leaked material from Arizona law enforcement agencies. Arizona's Department of Public Safety confirmed shortly thereafter that it was hacked. In the press release included with the dump, a LulzSec affiliate outlines a more activist agenda than is usually associated with the group: We are releasing hundreds of private intelligence bulletins, training manuals, personal email correspondence, names, phone numbers, addresses and passwords belonging to Arizona law enforcement. We are targeting AZDPS specifically because we are against SB1070 and the racial profiling anti-immigrant police state that is Arizona. The documents classified as "law enforcement sensitive", "not for public distribution", and "for official use only" are primarily related to border patrol and counter-terrorism operations and describe the use of informants to infiltrate various gangs, cartels, motorcycle clubs, Nazi groups, and protest movements.
Continue Reading

Al Jazeera Publishes Confidential ‘Palestine Papers’

Palestine PapersFrom Al Jazeera’s own introduction:

Over the last several months, Al Jazeera has been given unhindered access to the largest-ever leak of confidential documents related to the Israeli-Palestinian conflict. There are nearly 1,700 files, thousands of pages of diplomatic correspondence detailing the inner workings of the Israeli-Palestinian peace process. These documents – memos, e-mails, maps, minutes from private meetings, accounts of high level exchanges, strategy papers and even power point presentations – date from 1999 to 2010.

The material is voluminous and detailed; it provides an unprecedented look inside the continuing negotiations involving high-level American, Israeli, and Palestinian Authority officials.

Al Jazeera will release the documents between January 23-26th, 2011. They will reveal new details about:

  • the Palestinian Authority’s willingness to concede illegal Israeli settlements in East Jerusalem, and to be “creative” about the status of the Haram al-Sharif/Temple Mount;
  • the compromises the Palestinian Authority was prepared to make on refugees and the right of return;
  • details of the PA’s security cooperation with Israel;
  • and private exchanges between Palestinian and American negotiators in late 2009, when the Goldstone Report was being discussed at the United Nations.
Read the rest
Continue Reading

Military Bans Disks And Other Forms Of Removable Data To Prevent Future Leaks

cd

Via Wired’s Danger Room:

It’s too late to stop WikiLeaks from publishing thousands more classified documents, nabbed from the Pentagon’s secret network. But the U.S. military is telling its troops to stop using CDs, DVDs, thumb drives and every other form of removable media — or risk a court martial.

Maj. Gen. Richard Webber, commander of Air Force Network Operations, issued the Dec. 3 “Cyber Control Order” — obtained by Danger Room — which directs airmen to “immediately cease use of removable media on all systems, servers, and stand alone machines residing on SIPRNET,” the Defense Department’s secret network. Similar directives have gone out to the military’s other branches.

“Unauthorized data transfers routinely occur on classified networks using removable media and are a method the insider threat uses to exploit classified information. To mitigate the activity, all Air Force organizations must immediately suspend all SIPRNET data transfer activities on removable media,” the order adds.

Read the rest
Continue Reading