Category Archives: COUNTER TERRORISM

CELL 180: N.KOREA CYBER EYE…

North Korea’s Unit 180, the cyber warfare cell that worries the West Continue reading

Advertisements
Posted in COUNTER TERRORISM, CYBBER SECURITY, CYBER CRIME, CYBER INTELLIGENCE, Uncategorized | Tagged , , , , , , | Leave a comment

“The State of Security:” TOP 17 Security Conferences-2018

“The State of Security” assembled a list of the top conferences in information security. 17. THE DIANA INITIATIVE When: 9-10 August, 2018 Where: Caesars Palace, Las Vegas, Nevada, USA Website: http://dianainitiative.com/3_0/ The Diana Initiative is an organization that’s dedicated to … Continue reading

Posted in ARTIFICIAL INTELLIGENCE, CIA, COUNTER TERRORISM, CRYPTOCURRENCIES, CYBER TERRORISM, DARK WEB, DEFENCE INTELLIGENCE AGENCY, FBI, HOMELAND TERRORISM, Uncategorized | Tagged , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Saudi Money In Syria – Sowing The Seeds Of ISIS 2.0

(Abundant Hope, Oct 19, 2017) –There is dangerous news evolving from Raqqa, Syria. While ISIS is largely defeated seeds get sown for its reappearance. The Kurdish forces under the label SDF and led by U.S. special forces have defeated ISIS in … Continue reading

Posted in BREITBART -WH, CIA, COUNTER TERRORISM, Defense Intelligence Agency, Intelligence Community, Iran, ISLAMIC MILITARY COUNTER TERRORISM COALITION, Uncategorized | Tagged , , , , , , | Leave a comment

Netizen Report: Iranian Authorities Are Blocking International Web Traffic and Messaging Platforms

The start of 2018 marks the start of full enforcement of Germany’s controversial Netzwerkdurchsetzungsgesetz anti-hate speech law, called the NetzDG for short. Under the law, social media companies must respond to government requests to remove illegal content—including hate speech and so-called “fake news”—within 24 hours of receipt. Companies will have up to seven days to consider the removal of more ambiguous material. Facebook, Twitter and Google/YouTube will be the primary focus for the law’s implementation. Continue reading

Posted in COUNTER TERRORISM, Uncategorized | Tagged , , , , , | Leave a comment

“Alsa3ka Technology” Hacks Israel University Website

“Alsa3ka Technology” to Israel: “Game over Israel Leave Palestine” Continue reading

Posted in COUNTER TERRORISM, Uncategorized | Tagged , , , , , , , , , | Leave a comment

Money As A Weapon System-Afghanistan

September 7, 2012 Purpose. The aim of reintegration is to stabilize local areas by convincing insurgents, their leaders and their supporters to cease active and/or passive support for the insurgency and to become peaceful members of Afghan society. Reintegration will … Continue reading

Posted in COUNTER TERRORISM, Uncategorized | Leave a comment

Latest from the OSCE Special Monitoring Mission to Ukraine (SMM), based on information received as of 19:30, 29 June 2017

In areas not controlled by the Government, the SMM observed fresh tracked-vehicle markings consistent with an APC (MT-LB) chassis between Oleksandrivsk (10km west of Luhansk) and Metalist (7km north-west of Luhansk), and another set of tracks between Vesela Hora (16km north of Luhansk) and Svitle (11km north of Luhansk). Continue reading

Posted in COUNTER TERRORISM | 1 Comment

Russian Hacking………….

Fancy Bear is the name given to the Russian hacking team working for GRU (the external intelligence agency of the Russian military) among others, including APT 28, Strontium, and the Sofacy Group. Fancy Bear has been on the radar of security researchers for at least seven years, most notably for its disinformation campaigns in Georgia, Ukraine, and against NATO. Cozy Bear—also known as CozyDuke, the Dukes or APT 29—is Fancy Bear’s rival hacking team, and is believed to belong to a competing Russian intelligence service that has hacked the State department, White House, and Joint Chiefs of Staff. Continue reading

Posted in COUNTER TERRORISM | Leave a comment

“KABBA” ANONYMOUS: CYBER HIT TURKISH TVs…..

The Hacktivist group Anonymous and the hacking team called Kba Squad take the responsibility for cyber attacks today on .24 Turkish Channel &CNN TURK Continue reading

Posted in COUNTER TERRORISM | Leave a comment

PURGED: A Detailed Look at ‘The Purge” of U.S. Counterterrorism Training by the Obama Administration

Unconstrained Analytics’ new report details how this counterterrorism training purge happened, the players involved, the surprising but overlooked findings by a GAO report, and the consequences of having our lawenforcement/military/intelligence professionals intentionally denied important training on the threat doctrine of the enemy, As a result, they have been blinded, losing any ability to identify, and then defeat, the enemy.
Continue reading

Posted in COUNTER TERRORISM | Leave a comment