#Cyber Warfare
Explore tagged Tumblr posts
davidaugust · 7 hours ago
Text
This is part of why having and using communication systems, like Signal, Bluesky and the already decentralized Mastodon, that are not directly controlled by the cyber putschists (twitter completely, facebook, instagram, threads, and tiktok likely as well) is essential. Vital to have ways to connect with and share information that are not subject to coup plotters' direct manipulation.
"Let me say this more clearly: what is happening right now, in America, in real time, is a coup."
"This is an information war and this is what a coup now looks like."
"Musk didn’t need a tank, guns, soldiers. He had a small crack cyber unit that he sent into the Treasury department last weekend. He now has unknown quantities of the entire US nation’s most sensitive data and potential backdoors into the system going forward. Treasury officials denied that he had access but it then turned out that he did. If it ended there, it would be catastrophic. But that unit - whose personnel include a 19-year-old called “Big Balls” - is now raiding and scorching the federal government, department by department, scraping its digital assets, stealing its data, taking control of the code and blowing up its administrative apparatus as it goes."
24 notes · View notes
blorbocedes · 5 months ago
Text
if 3000+ devices exploded simultaneously and thousands got injured, 37+ ppl died in usa or london or france anywhere in the imperial core this website would be talking about it nonstop. my coworkers' relatives are lebanese and he hasn't been able to contact them because everyone's nervous of using anything with a lithium battery. the kids from diaspora are teaching their parents how to turn off find my phone and airdrop and other geolocating options. it's absurd to me people are carrying on like its normal, or just don't care cause c'mon ppl blow up in the middle east all the time, right?
28K notes · View notes
disk28 · 8 months ago
Text
Tumblr media
621 notes · View notes
sprites4ever · 5 months ago
Text
So, the Mossad somehow managed to hack Lebanese Hezbollah pagers so thoroughly that they caused them to explode (most likely by overdrawing the battery).
https://www.reuters.com/world/middle-east/dozens-hezbollah-members-wounded-lebanon-when-pagers-exploded-sources-witnesses-2024-09-17/
I can hear Elon Musk screaming at the implications this has for NeuraLink all the way here in Germany.
7 notes · View notes
actualadvocacybruh · 5 months ago
Text
People being shocked that a big American conservative media network was actively being funded by Russia shows how little attention they actually pay to such thing
Many experts in cyber, hybrid and intelligence warfare have said for DECADES now that Russia does fund groups in other nations to produce propaganda for them shining a good light on Russia while attacking progressive values and anything even remotely anti authoritarian
If you actually watched the content they put out it was clear from the start they had an agenda and that someone was footing the bill with interests in Russia or for the Russian oligarchs
And it’s pretty sad that I have to point at the FBI and CIA and tell leftists “they told this YEARS AGO”
Also the “we didn’t know who funded us” is already being shoved as a narrative and it’s BS
3 notes · View notes
odinsblog · 1 year ago
Text
Tumblr media
(source)
In June 2019, three Israeli computer engineers arrived at a New Jersey building used by the F.B.I. They unpacked dozens of computer servers, arranging them on tall racks in an isolated room. As they set up the equipment, the engineers made a series of calls to their bosses in Herzliya, a Tel Aviv suburb, at the headquarters for NSO Group, the world’s most notorious maker of spyware. Then, with their equipment in place, they began testing.
The F.B.I. had bought a version of Pegasus, NSO’s premier spying tool. For nearly a decade, the Israeli firm had been selling its surveillance software on a subscription basis to law-enforcement and intelligence agencies around the world, promising that it could do what no one else — not a private company, not even a state intelligence service — could do: consistently and reliably crack the encrypted communications of any iPhone or Android smartphone.
Since NSO had introduced Pegasus to the global market in 2011, it had helped Mexican authorities capture Joaquín Guzmán Loera, the drug lord known as El Chapo. European investigators have quietly used Pegasus to thwart terrorist plots, fight organized crime and, in one case, take down a global child-abuse ring, identifying dozens of suspects in more than 40 countries. In a broader sense, NSO’s products seemed to solve one of the biggest problems facing law-enforcement and intelligence agencies in the 21st century: that criminals and terrorists had better technology for encrypting their communications than investigators had to decrypt them. The criminal world had gone dark even as it was increasingly going global.
But by the time the company’s engineers walked through the door of the New Jersey facility in 2019, the many abuses of Pegasus had also been well documented. Mexico deployed the software not just against gangsters but also against journalists and political dissidents. The United Arab Emirates used the software to hack the phone of a civil rights activist whom the government threw in jail. Saudi Arabia used it against women’s rights activists and, according to a lawsuit filed by a Saudi dissident, to spy on communications with Jamal Khashoggi, a columnist for The Washington Post, whom Saudi operatives killed and dismembered in Istanbul in 2018.
(continue reading)
15 notes · View notes
weareatwar · 2 years ago
Text
The Hacker's War's
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
6 notes · View notes
archtroop · 1 year ago
Text
I'll Google Translate this one became this one is incredibly interesting and fascinating, especially for people who spend a lot of time online.
"An Israeli cyber group announced that it had taken down a Hamas news website: "We will continue to act with a heavy hand"
WeRedEvils is a group of Israeli cyber warriors that was established after the start of the war and operates in the cyber arena against Hamas and its affiliates, and yesterday announced that it had taken down a major news site affiliated with Hamas, Gaza Now. In a conversation with mako, one of the group's managers tells about its activities: "We hacked into the phones and WhatsApp accounts of journalists, terrorists and Hamas officials and published databases of 40 million Iranians"
The group of cyber warriors @WeRedEvils yesterday attacked the GazaNow site, the main news site of the terrorist organization Hamas, which publishes anti-Israeli content, and information about IDF and intelligence operations. The site went down for 18 hours, came back up for a short time and is now working again, but according to the group's servers are expected to collapse within hours again.
WeRedEvils are a group of about 80 Israeli cyber warriors, who have been working since the beginning of the war on a voluntary basis, and take part in the war aid effort. These are former intelligence unit 8200, owners of major cyber companies in Israel, private investigators and Red Hat hackers. The group is closed, and everyone who enters it has undergone a full scan, according to P. G., one of the group's managers, who served as the IDF spokesman and deals with cyber, and asked to remain anonymous. According to him, the group is divided into several teams - intelligence and information gathering, attack, marketing and advertising and social media.
"We hacked and took down Hamas's largest news site, we hacked into the phones and WhatsApp accounts of Hamas journalists, terrorists and senior Hamas officials and published databases of 40 million Iranians," says G. to Mako. "We blocked crypto accounts and websites for receiving funds that Hamas established, we closed a website for them that raised half a million dollars. We took down the website of the Hamas Employment Ministry and we will continue to act with a tough hand."
According to him, "We will continue to attack. We have a list of 200 very important sites for Hamas that we will not release until we disable them."
Does the government help you or do you work alone?
G: "The government doesn't help, because no one has a way to contact us. Right now I'm talking to you from a servant who sits on another country, purely because one of the managers asked, and we have enough money and tools to use it."
Did you give messages to Hamas?
"We gave a message to one of the journalists to stop publishing, otherwise we hack into his phone and WhatsApp, he did not respond to our requests and we attacked and stopped his activity. We are not giving a message to anyone anymore, we attack and stop activities that the SHABACH is unable to do."
This is not the only initiative by cyber experts to attack Hamas government websites, and there are different groups, isolated from each other, that operate in the field. "All the websites of Hamas and their supporters have fallen in recent days, and will fall again if the sites are brought back online," says one of the Israelis active on the issue.
And what about cyber attacks on Israel? At the beginning of the war, rumors were spread through the WhatsApp groups about a cyber attack on Israel, but the national cyber system emphasized that no such attack existed. Since then there have been attempts to break into Israeli websites, but no significant achievement has been recorded for Hamas on this level.
[On a personal note I cannot in any way verify or deny this, apart from it being on a large popular mass media outlet. BUT, the 8200 unit are the cyber intelligence of IDF and are highly regarded. A group of them formed a resistance to the current government and have been acting on that front for months. So it may be them or their colleagues]
3 notes · View notes
gwydionmisha · 1 year ago
Text
China’s cyber army is invading critical U.S. services
2 notes · View notes
firstoccupier · 11 days ago
Text
The Evolving Tactics of Beijing: A New Era of Grayzone Warfare
A Social Media Review by: Sundance Baybay City | January 31, 2025 As the world witnesses a growing assertiveness from Beijing, South China Sea intelligence operative Ray Powell highlights a significant shift in China’s approach to international relations. He asserts that China is now employing full-spectrum grayzone tactics, veiled in thin layers of opacity and deniability. This marks a notable…
0 notes
davidaugust · 8 days ago
Text
Since the House holds US purse strings, seems like US Capitol Police can and should send police to Treasury buildings to detain & arrest anyone accessing computer systems & data without proper authorization, right?
US Secret Service and US Treasury Department have failed to do so.
“All Bills for raising Revenue shall originate in the House of Representatives; but the Senate may propose or concur with amendments as on other Bills.”
— U.S. Constitution, Article I, section 7, clause 1
They are six 19-24 year old engineers, and need to be stopped.
The Appropriations Committees of both the House and Senate, and the House Administration and Senate Rules and Administration Committees, oversee Capitol Police, and they can and should deploy their police as musk is as I type this interfering with appropriated US Treasury funds.
Below are links to how to get contact info and lists of members of those committees, call them if they're yours.
Get their contact info here: https://www.congress.gov/members/find-your-member
House Appropriations Committee members: https://appropriations.house.gov/about/membership
Senate Appropriations Committee members: https://www.appropriations.senate.gov/about/members
House Administration Committee members: https://cha.house.gov/members
Senate Rules and Administration Committee members: https://www.rules.senate.gov/about/committee-membership
46 notes · View notes
blorbocedes · 5 months ago
Note
okay I’m really sorry if this comes across as tone deaf or ignorant or anything but I know what’s happening to Gaza but you’re the first person I’ve seen mention Lebanon. What’s happening?
tldr: israel exploded 4000+ pagers and walkie talkies all at once in lebanon, most likely contaminating a shipment and rigging it. thousands injured, 37+ dead. western media is praising the act as coordinated, targeted attack on hezbollah. doctors (who primarily use pagers), civilians, 10 year old children playing with their father's pager lost an eye, finger, died. millions in lebanon currently afraid to use their devices in case it might explode, the definition of a terrorist attack on a civilian population
189 notes · View notes
disk28 · 7 months ago
Text
Tumblr media
163 notes · View notes
amrutmnm · 14 days ago
Text
Cyber Warfare Market Overview
The global market of cyber warfare is presently under rapid growth, being facilitated by continuously advanced nature of the threat of cyber-attacks along with dependence of global defense on its infrastructure. The entire security scenario of these forces involves substantial spending on cutting-edge protection products for data, thereby augmenting its size massively in the global market of cybersecurity. Emerging technologies such as AI, ML, and quantum computing are part of cyber-defense strategies today. It increases their ability to detect threats as well as respond. Many key players are establishing strategic partnerships and investing greater R&D efforts in such areas with the growing demand of the nature of Cyber Warfare. This market will help shape future modern warfare for sure because of strong growth in its regions such as North America, Europe, and Asia-Pacific.
0 notes
egirl4rent · 16 days ago
Text
Jade Ann Byrne’s Tactical eGirl Energy Loadout: Hydro Flask Infusion Meta – Cuties Rinds, Tazo Wild Sweet Orange, & Warzone Mobile Buffs
Jade Ann Byrne’s Tactical eGirl Energy Loadout: Hydro Flask Infusion Meta – Cuties Rinds, Tazo Wild Sweet Orange, & Warzone Mobile Buffs Welcome to the Ultimate IRL Loadout – The Citrus-Infused Hydro Flask Meta Listen up, Operators. If you’re trying to clutch the Gulag, dominate Ranked, and survive sweaty late-night lobbies—you need more than aim and movement. You need hydration that hits like…
0 notes
thingsfromthehead · 4 months ago
Text
Tumblr media
0 notes