For a long time, the US Central Intelligence Agency (CIA) has plotted “peaceful evolution” and “color revolutions” as well as spying activities around the world. Although details about these operations have always been murky, a new report released by China’s National Computer Virus Emergency Response Center and Chinese cybersecurity company 360 on Thursday unveiled the main technical means the CIA has used to scheme and promote unrest around the world.
New report unveils how CIA schemes color revolutions around the world
Tag: Cybersecurity
Taiwanese Leader Meets with John Bolton, Calls for Deeper Ties with US

Former American national security adviser John Bolton completed a week-long tour of Taiwan by meeting President Tsai Ing-wen. During the meeting, Tsai claimed Taiwan was on the frontline in the fight for democracy and, as such, Taipei needs stronger ties with like-minded nations.
Taiwanese Leader Meets with John Bolton, Calls for Deeper Ties with US
Mercenary spyware hacked iPhone victims with rogue calendar invites, researchers say
Microsoft and Citizen Lab have new reports out about QuaDream, a little-known Israeli mercenary spyware provider
Mercenary spyware hacked iPhone victims with rogue calendar invites, researchers say
How The FBI Helps Ukrainian Intelligence Hunt ‘Disinformation’ On Social Media
The Federal Bureau of Investigation pressures Facebook to take down alleged Russian “disinformation” at the behest of Ukrainian intelligence, according to a senior Ukrainian official who corresponds regularly with the FBI. The same official said that Ukrainian authorities define “disinformation” broadly, flagging many social media accounts and posts that he suggested may simply contradict the Ukrainian government’s narrative.
How The FBI Helps Ukrainian Intelligence Hunt ‘Disinformation’ On Social Media (archived)
Senator Brian Schatz Joins The Moral Panic With Unconstitutional Age Verification Bill
Senator Brian Schatz is one of the more thoughtful Senators we have, and he and his staff have actually spent time talking to lots of experts in trying to craft bills regarding the internet. Unfortunately, it still seems like he still falls under the seductive sway of this or that moral panic, so when the bills actually come out, they’re perhaps more thoughtfully done than the moral panic bills of his colleagues, but they’re still destructive.
Senator Brian Schatz Joins The Moral Panic With Unconstitutional Age Verification Bill
Related:
Bipartisan Senate bill would ban social media algorithms for minors
Senators Brian Schatz (D-Hawaii), Chris Murphy (D-Conn), Katie Britt (R-Ala) and Tom Cotton (R-Ark) introduced the Protecting Kids on Social Media Act on Wednesday. The bill would set a minimum age of 13 to use social media sites, and would require parental consent and age verification for users under 18.
Secret Team: The Nord Stream Pipeline Sabotage Revisited
Join us, as we take a deeper dive into the Nord Stream Pipeline sabotage story, and identify the diving team, their equipment, as well as those parties who benefitted from what many are calling ‘an act of war’ against European infrastructure.
Secret Team: The Nord Stream Pipeline Sabotage Revisited
Video via Kim Iversen

The So Far Non-Existent Vulkan Leaks
The Guardian, Washington Post and Der Spiegel have today published “bombshell” revelations about Russian cyber warfare based on leaked documents, but have produced only one single, rather innocuous leaked document between them (in the Washington Post), with zero links to any.
The So Far Non-Existent Vulkan Leaks
US And EU Nations Request The Most User Data From Tech Companies, Obtain It More Than Two-Thirds Of The Time
from the may-as-well-just-be-government-contractors dept
Most tech companies handling data requests from governments now publish transparency reports. As everything moves towards always-online status (including, you know, your fridge), social media platforms and other online services have become the favored targets of government data requests. It just makes sense to look there first rather than out there in the real world, where people (and their communications) are that much more difficult to locate.
US And EU Nations Request The Most User Data From Tech Companies, Obtain It More Than Two-Thirds Of The Time

You must be logged in to post a comment.