volprof
Destroyer of Nihilists
- Joined
- Oct 26, 2011
- Messages
- 18,154
- Likes
- 10,067
What part of my post did not get the message through that our intelligence services "should be kept in check"?
I'm not going to freak out like a five-year-old, however, every time a leak by some ahole contributes to our collective narcissism.
Not really. IMO it just gives hardware and software manufacturers insight into known vulnerabilities which are exploited and they fix them to the best of their abilities. So In essence it takes away the ability of anyone or any country from future exploitation. So all hackers will have to find new vulnerabilities in the new hardware and software to exploit. Time to retool our arsenal.
We will survive.
Our CIA's entire hacking arsenal is floating around out there, and complete strangers at Wikileaks are taking it upon themselves to show who-the-hell-knows at apple, google, etc. At this point, at least we can hope they'll use that knowledge to help protect all of their customers, but the fact we're at their mercy is pretty ****ing pathetic and scary...
Our CIA's entire hacking arsenal is floating around out there, and complete strangers at Wikileaks are taking it upon themselves to show who-the-hell-knows at apple, google, etc. At this point, at least we can hope they'll use that knowledge to help protect all of their customers, but the fact we're at their mercy is pretty ****ing pathetic and scary...
Our CIA's entire hacking arsenal is floating around out there, and complete strangers at Wikileaks are taking it upon themselves to show who-the-hell-knows at apple, google, etc. At this point, at least we can hope they'll use that knowledge to help protect all of their customers, but the fact we're at their mercy is pretty ****ing pathetic and scary...
The fatal mistake of our IC is allowing private contractors access to these tool. This article from 07 is an interesting read.
The corporate takeover of U.S. intelligence - Salon.com
The fatal mistake of our IC is allowing private contractors access to these tool. This article from 07 is an interesting read.
The corporate takeover of U.S. intelligence - Salon.com
"You could knock me over with a feather" - Tom Woods
NSA staff used spy tools on spouses, ex-lovers: watchdog | Reuters
"You could knock me over with a feather" - Tom Woods
NSA staff used spy tools on spouses, ex-lovers: watchdog | Reuters
Hours before dying in a fiery car crash, Rolling Stone journalist Michael Hastings told his neighbor he believed his Mercedes had been tampered with, according to a report.
Hastings, a swashbuckling war correspondent known for taking on powerful figures, had told several friends he believed the government was watching him in the weeks before his death on June 18 in Los Angeles.
But in a lengthy profile by LA Weekly, Hastings neighbor Jordanna Thigpen says he knocked on her door after midnight and asked to borrow her Volvo because he was afraid to drive his own car. "He was scared, and he wanted to leave town," she told the weekly newspaper. She declined, saying her car was in need of repairs.
It was revealed today by the WikiLeaks Vault 7 leak that the Central Intelligence Agency may have car hacking capabilities, leading online conspiracists to further the claims that journalist Michael Hastings was murdered by the CIA. Hastings died on June 18, 2013, in a fiery high-speed automobile crash in his Mercedes C250 Coupé following the publication of Why Democrats Love to Spy On Americans on BuzzFeed. Hastings had been a vocal critic of the Obama administration. Following his death, former U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism Richard A. Clarke said that Hastings crash was consistent with a car cyber attack.
WikiLeaks Vault 7 Conspiracy: Michael Hastings Assassinated by CIA Remote Car Hack? | Heavy.com
The fatal mistake of our IC is allowing private contractors access to these tool. This article from 07 is an interesting read.
The corporate takeover of U.S. intelligence - Salon.com