Seven questions for reporters, lawmakers, and the public to demand answers.
Christopher Wylie goes on the record to discuss his role in hijacking the profiles of millions of Facebook users in order to target the US electorate
Darn it … As I was getting to enjoy, women for a change, tormenting men at the workplace … alas it was not true. Not all may be lost though … a glimmer of that gray area that is Thailand.
ProPublica erred when it reported in 2017 that Gina Haspel was in charge of a secret prison in Thailand during the infamous interrogation of an al-Qaida suspect.
In this second post in our series about Canada’s national security law reform, we begin a discussion of changes proposed for the Communications Security Establishment (CSE), Canada’s primary signals intelligence and cybersecurity agency. We focus specifically on how Canada will address an issue that has also arisen in allied states: oversight of bulk collection that may incidentally include communications involving nationals.
It is about disrupting and holding accountable entrenched actors and conduct that have reared their ugly heads again and again over the years continuing to present.
The following have been updated and added to the integrated slides:
Never Too Late
Focusing on Relevant Stuff
Title 26, 18, 50 and 10 Confusion
Federal Investigations Primer:
Added compartmentalization & Need to Know
Cross-Border Law Enforcement Primer:
Added Canadian “Agent” Role
Added Stings, Ethnic Communities and Foreign Personas
Updated Factual Instances: Corruption
Updated Impacts of Off-the-Books or Regional Independence Alliances
Sources, Operatives & Organizations Digest:
Added Criminal Organization Structure
Added Criminal Organization Communication Structure
Added Matchmakers & Rainmakers
Seattle Federal Corruption Slides Integrated:
Added Selected Linkages Slide Set
This post is the 2nd addendum to (previous limited information 9 posts) and integrated post for documentation and reference purposes. Information, context and statements were previously and contemporaneously documented and independently verifiable. Conclusions and assessments are self-evident or clearly marked and separately identified. Related efforts are not recent and have been ongoing for a significant period.
Reality is no longer what you think it is.
Two Democratic senators on Wednesday asked major vendors of U.S. voting equipment whether they have allowed Russian entities to scrutinize their software, saying the practice could allow Moscow to hack into American elections infrastructure.
Determining the origins of cyberattacks is already difficult, but cyber actors can further muddy attribution through false flag attacks.
A Russian-backed propaganda group used social media in an attempt to disrupt the U.S. energy industry and influence energy policy, according to a new congressional staff report reviewed by The Wall Street Journal.