Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
Editorials & Other Articles
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
Creative Speculation
Related: About this forumThere are only two types of companies in the USA.
Last edited Tue Mar 29, 2016, 11:06 PM - Edit history (1)
Is illegal eavesdropping on FBI, DHS, DEA, ATF and U.S. Secret Service homes and offices still only a conspiracy theory?I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.
Technology has become pervasive as a target. It has also been used as a means of attack. But this story illustrates our use of technology as an investigative tool. It also illustrates the power of innovative thinking and fast actionthe very tools we need to stop those who have hijacked cyber space for their own ends.
The individuals who planned the attempted Times Square bombing in May 2010 used public web cameras for reconnaissance. They used file-sharing sites to share sensitive operational details. They deployed remote conferencing software to communicate. They used a proxy server to avoid being tracked by an IP address. And they claimed responsibility for the attempted attackon YouTube.[arrest targeted electronic terrorist in the Southeastern section of the USA, this weekend, while the crime syndicate organizers are away for the weekend. Then, the suspects will provide information, on their crime syndicates, for a plea bargain.]
We do not want you to feel victimized a second time by an investigation. We will minimize the disruption to your business, and we will safeguard your privacy. Where necessary, we will seek protective orders to preserve trade secrets and business confidentiality. And we will share with you what we can, as quickly as we can, about the means and the methods of attack.
https://www.fbi.gov/news/speeches/combating-threats-in-the-cyber-world-outsmarting-terrorists-hackers-and-spies
Technology has become pervasive as a target. It has also been used as a means of attack. But this story illustrates our use of technology as an investigative tool. It also illustrates the power of innovative thinking and fast actionthe very tools we need to stop those who have hijacked cyber space for their own ends.
The individuals who planned the attempted Times Square bombing in May 2010 used public web cameras for reconnaissance. They used file-sharing sites to share sensitive operational details. They deployed remote conferencing software to communicate. They used a proxy server to avoid being tracked by an IP address. And they claimed responsibility for the attempted attackon YouTube.[arrest targeted electronic terrorist in the Southeastern section of the USA, this weekend, while the crime syndicate organizers are away for the weekend. Then, the suspects will provide information, on their crime syndicates, for a plea bargain.]
We do not want you to feel victimized a second time by an investigation. We will minimize the disruption to your business, and we will safeguard your privacy. Where necessary, we will seek protective orders to preserve trade secrets and business confidentiality. And we will share with you what we can, as quickly as we can, about the means and the methods of attack.
https://www.fbi.gov/news/speeches/combating-threats-in-the-cyber-world-outsmarting-terrorists-hackers-and-spies
3 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
There are only two types of companies in the USA. (Original Post)
Jeffersons Ghost
Nov 2015
OP
The overt visibility of this zOpening Post could suggest FBI agents are trollng at D.U...
Jeffersons Ghost
Mar 2016
#1
Jeffersons Ghost
(15,235 posts)1. The overt visibility of this zOpening Post could suggest FBI agents are trollng at D.U...
https://www.fbi.gov/wanted/cyber FBI agents should use agents in the Federal Bureau of Investigation [GNO] (FBI) office in Beijing, China to arrest these smiley-ass, cyber criminals in Chinese military uniforms or quit wasting US taxpayer money to keep the FBI joke-office - in Beijing China - open!
zappaman
(20,618 posts)2. Oh, I'm pretty sure FBI agents troll DU.
Jeffersons Ghost
(15,235 posts)3. What inspires FBI agents?
By announcing an ongoing investigation and putting Hillary Clinton on trial in the media, Director Comey (of the FBI) looked like a stupid Chinese satellite puppet! [and no FBI "agent" bothered to snail mail their directors to inform them about Chinese satellite technology, WITH SNAIL-MAIL! I AM ABOUT TO SNAIL-MAIL LETTERS TO THE U.S. SENATE SELECT COMMITTEE ON INTELLIGENCE TO REDUCE SATELLITE ATTACKS ON DIRECTOR ROGERS!] The last CIA director busted the Director of the CIA! That eavesdropping on CIA email was more than a bit embarrassing for the USA, in international media and intelligence circles.