/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

@inteloperator

@inteloperator
13 posts
2021-03-30
In December, officials discovered a sprawling, months-long cyber-espionage effort done largely through a hack of widely used software from Texas-based SolarWinds. At least nine federal agencies were hacked, and dozens of private-sector companies. https://twitter.com/...
2021-03-30 View on X
Associated Press

Sources: SolarWinds hackers gained access to emails of Trump administration's top DHS officials, including acting Secretary Chad Wolf and cybersecurity staff

Report iTnews : SolarWinds hack obtained emails of top US Homeland Security officials Tweets: @inteloperator : The recently approved stimulus package includes $650m for the Cyberse...

The recently approved stimulus package includes $650m for the Cybersecurity and Infrastructure Security Agency to harden cyber defenses. Federal officials said that amount is only a down payment on much bigger planned spending. https://twitter.com/...
2021-03-30 View on X
Associated Press

Sources: SolarWinds hackers gained access to emails of Trump administration's top DHS officials, including acting Secretary Chad Wolf and cybersecurity staff

Report iTnews : SolarWinds hack obtained emails of top US Homeland Security officials Tweets: @inteloperator : The recently approved stimulus package includes $650m for the Cyberse...

2021-03-20
“Multi-direction cameras and ultrasonic sensors in Tesla cars may “expose locations” and the vehicles are being barred from military residences to ensure the safety of confidential military information” https://twitter.com/...
2021-03-20 View on X
Wall Street Journal

Sources: China is restricting use of Tesla cars by military and state employees, citing concerns that the data they collect could be sent back to the US

Wall Street Journal :

2020-05-24
According to Top10VPN, some of the services provided by U.S. tech firms include hosting the surveillance firms' website and emails to authentication methods. https://www.cnbc.com/...
2020-05-24 View on X
CNBC

Report: Amazon, Microsoft, and Google are among American tech companies providing web services to blacklisted Chinese surveillance firms like Dahua, Hikvision

Arjun Kharpal / CNBC : Tweets: @inteloperator Tweets: @inteloperator : According to Top10VPN, some of the services provided by U.S. tech firms include hosting the surveillance fir...

2020-04-25
With tech companies' moderation efforts constrained by the pandemic, distributors of child sexual exploitation material are growing bolder, using major platforms to try to draw audiences. https://twitter.com/...
2020-04-25 View on X
NBC News

Distribution of child sexual abuse materials increases across major sites including Facebook and YouTube, as moderation efforts are constrained during pandemic

particularly Facebook and Mega. Nobody wants to this stuff on their platform https://www.nbcnews.com/...

2020-03-08
Kim Jong-un's regime is economically isolated by sanctions aimed at hampering its nuclear weapons program. In the past few years it has turned to the cryptocurrency world to generate revenue, mostly by stealing it. https://www.technologyreview.com/ ...
2020-03-08 View on X
MIT Technology Review

How North Korean hackers laundered $100M in stolen Bitcoin by using hundreds of automated transactions to “peel” small amounts off the original

Hackers working for Kim Jong-un have become experts at covering their tracks on the Bitcoin blockchain.

2020-01-01
“The OPM hack was a watershed moment, ushering in an era when big data and other digital tools may render methods of traditional human intelligence gathering extinct” H/T @hoyawolf https://news.yahoo.com/...
2020-01-01 View on X
Yahoo News

Overview of the ongoing efforts by the US to modernize its spy operations, to contain the damage from the 2014 OPM breach, be more resilient to tracking, more

likely based on differences in pay between diplomats, speedy promotions...” https://twitter.com/... Artyom Lukin / @artyomlukin : Fascinating longread on espionage tradecraft. Ment...

2019-12-31
“The OPM hack was a watershed moment, ushering in an era when big data and other digital tools may render methods of traditional human intelligence gathering extinct” H/T @hoyawolf https://news.yahoo.com/...
2019-12-31 View on X
Yahoo News

Overview of the ongoing efforts by the US to modernize its spy operations, to contain the damage from the 2014 OPM breach, be more resilient to tracking, more

When hackers began slipping into computer systems at the Office of Personnel Management in the spring of 2014 … Tweets: @edwardlucas , @sanhotree , @zachsdorfman , @inteloperator ,...

2019-08-27
Australia and New Zealand have increased scrutiny of websites and social media companies in the wake of the Christchurch massacre in March, when 51 worshippers were killed in attacks on two New Zealand mosques. https://www.reuters.com/...
2019-08-27 View on X
Reuters

Australia will block access to internet domains hosting terrorist material during crisis events; sites to be censored will be determined on a case-by-case basis

Alison Bevege / Reuters :

A 24/7 Crisis Coordination Centre would be established to monitor the online world for extreme violence or terrorist material. https://twitter.com/...
2019-08-27 View on X
Reuters

Australia will block access to internet domains hosting terrorist material during crisis events; sites to be censored will be determined on a case-by-case basis

Alison Bevege / Reuters :

2019-08-26
A 24/7 Crisis Coordination Centre would be established to monitor the online world for extreme violence or terrorist material. https://twitter.com/...
2019-08-26 View on X
Reuters

Australia will block access to internet domains hosting terrorist material during crisis events; sites to be censored will be determined on a case-by-case basis

Alison Bevege / Reuters :

Australia and New Zealand have increased scrutiny of websites and social media companies in the wake of the Christchurch massacre in March, when 51 worshippers were killed in attacks on two New Zealand mosques. https://www.reuters.com/...
2019-08-26 View on X
Reuters

Australia will block access to internet domains hosting terrorist material during crisis events; sites to be censored will be determined on a case-by-case basis

Alison Bevege / Reuters :

2019-08-19
This kind of behavior isn't shocking. The Chinese government has been clamping down on critics who voice dissent on Twitter, even though the service is blocked beyond Hong Kong. https://www.engadget.com/...
2019-08-19 View on X
@pinboard

[Thread] Twitter has been running ads from Chinese state news agency Xinhua that aim to discredit protesters in Hong-Kong

@pinboard :