/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

@alexrblackwell

@alexrblackwell
7 posts
2024-05-29
@UK_Daniel_Card ... As someone at NSA once told me: If a photon can get in or out, so can we.
2024-05-29 View on X
Wired

How researchers recovered access to ~$2M worth of bitcoin stored in a software wallet, using a flaw in a decade-old version of the RoboForm password manager

Thanks to a flaw in a decade-old version of the RoboForm password manager and a bit of luck, researchers were able to unearth …

2022-09-19
“'There are some who think we shouldn't do anything clandestine in that space. Ceding an entire domain to an adversary would be unwise. But we need stronger policy guardrails.'” https://www.washingtonpost.com/ ...
2022-09-19 View on X
Washington Post

Sources: the Pentagon plans to audit how it conducts online clandestine information warfare after Meta, Twitter, and others removed pro-US operations

Complaints about the U.S. military's influence operations using Facebook and Twitter have raised concern in the White House and federal agencies.

2022-02-12
“It was also not clear whether another U.S. intelligence agency was performing the actual surveillance that supported the functioning of the CIA program, which isn't unusual.” https://www.wsj.com/...
2022-02-12 View on X
Wall Street Journal

Senators Wyden and Heinrich: declassified docs show a CIA bulk surveillance program collecting Americans' data without clear judicial or congressional oversight

The lawmakers called for the immediate declassification of details about the surveillance program and what data was collected Source: U.S. Senator Ron Wyden … .

2022-02-11
“It was also not clear whether another U.S. intelligence agency was performing the actual surveillance that supported the functioning of the CIA program, which isn't unusual.” https://www.wsj.com/...
2022-02-11 View on X
Wall Street Journal

Senators Wyden and Heinrich: declassified documents show a CIA bulk surveillance program collecting Americans' data without judicial or congressional oversight

The lawmakers called for the immediate declassification of details about the surveillance program and what data was collected Source: U.S. Senator Ron Wyden … .

2021-12-05
“...interviews with a half-dozen people close to the case reveal that the surprise detention of Sachkov has links to one of the government's most notorious hacking operations.” https://www.bloomberg.com/...
2021-12-05 View on X
Bloomberg

Profile of Group-IB CEO Ilya Sachkov, who is charged with treason in Russia, sources say for allegedly giving the US info about Fancy Bear's 2016 operation

Ilya Sachkov, who's been charged with treason in Russia, is alleged to have given the U.S. information about the “Fancy Bear” … Tweets: @bw , @hewiak , @amandakhurley , @z3r0trust ...

2021-06-05
“Amazon's massive cloud-computing unit is aggressively recruiting U.S. government officials as it pushes to make itself essential to branches such as the military and the intelligence community...” All the eggs shouldn't go in one basket. https://www.politico.com/...
2021-06-05 View on X
Politico

AWS hired at least 66 former US government officials since 2018; AWS employee says such hires give the company a “leg up” in winning government contracts

2020-12-21
This is ridiculous. A hack like this is not a series of phone calls from Yasenevo to, say, Texas that NSA can intercept. And if human penetration agents in the US tech sector were involved, NSA beacons on *foreign* networks would be useless. https://twitter.com/...
2020-12-21 View on X
Defense One

WH officials propose ending the “dual-hat” leadership arrangement of NSA and Cyber Command, renewing debate over splitting up the agencies amid recent attacks

though “when” is a tricky question. But the idea that this is going to happen in the final 32 days of an administration, under an acting SefDef, without congressional support (and ...