Thursday, May 16, 2013
SOFEX is where the world's leading generals come to buy everything from handguns to laser-guided missile systems. It stands for "Special Operations Forces Exhibition Conference" and it's essentially a trade-show where just about anyone with enough money can buy the most powerful weapons in the world. Hosted by Shane Smith | Originally released in 2012 at http://vice.com Check out the VICE Guide to Karachi here: http://bit.ly/Karachi-1 Subscribe for videos that are actually good: http://bit.ly/Subscribe-to-VICE Check out our full video catalog: http://www.youtube.com/user/vice/videos Videos, daily editorial and more: http://vice.com Like VICE on Facebook: http://fb.com/vice Follow VICE on Twitter: http://twitter.com/vice Read our tumblr: http://vicemag.tumblr.com
We went to Pakistan to invesitage why suicide bombings, IED use, and the Taliban are all growing at alarming rates. In a recent trip to Pakistan to report on the recent spike in the region's violence and bloodshed, Suroosh Alvi heard over and over the same sentiment from people on the ground: America's war on terror is falling flat on its face. The military conflict in neighboring Afghanistan, repeatedly cited by locals, sends a constant flood of guns, refugees, militants, and heroin flowing into Pakistan. Heroin is now actually cheaper than hashish in cities like Lahore, and the Kalashnikov culture, the foundation of which was laid 30 years ago when the CIA financed the mujahideen, is all-consuming. According to the Pakistanis he spoke to, it's all taken a devastating toll on the country and is creating the next generation of militants. Hosted by Suroosh Alvi | Originally released in 2010 on http://vice.com Follow Suroosh Alvi on Twitter - http://twitter.com/surooshalvi Watch "The Gun Markets of Pakistan": http://bit.ly/VICE-Gun-Markets Subscribe for videos that are actually good: http://bit.ly/Subscribe-to-VICE Check out our full video catalog: http://www.youtube.com/user/vice/videos Videos, daily editorial and more: http://vice.com Like VICE on Facebook: http://fb.com/vice Follow VICE on Twitter: http://twitter.com/vice Read our tumblr: http://vicemag.tumblr.com
Learn how easy it is to make fake passports and scam the rich into trusting you with thousands of dollars. If the fraud industry were its own country, it would have the fifth strongest economy in the world, just ahead of the UK. Come and meet the fraudsters who're making a killing from the fastest growing crime on Earth. Check out "How to Sell Drugs" here: http://bit.ly/Selling-Drugs Subscribe for videos that are actually good: http://bit.ly/Subscribe-to-VICE Check out our full video catalog: http://www.youtube.com/user/vice/videos Videos, daily editorial and more: http://vice.com Like VICE on Facebook: http://fb.com/vice Follow VICE on Twitter: http://twitter.com/vice Read our tumblr: http://vicemag.tumblr.com
On Monday night, Ryan Fogle was arrested in Moscow after he allegedly attempted to recruit a Russian secret service agent to work for the United States. Russian officials claim that Fogle was working for the CIA, but was posing as a third secretary at the US Embassy in Moscow. Ray McGovern, retired CIA officer, gives us some insight on what this incident means for US/Russian relations. Find RT America in your area: http://rt.com/where-to-watch/ Or watch us online: http://rt.com/on-air/rt-america-air/ Like us on Facebook http://www.facebook.com/RTAmerica Follow us on Twitter http://twitter.com/RT_America
Tuesday, May 14, 2013
|Ryan Fogle, an alleged CIA officer being detained by Russian|
counterintelligence after his cover was "blown" (Source: AFP)
A recent display of good "cover" discipline came coincidentally during an exchange with a "hacktivist" known as The Jester and Jeff Bardin, a leading information security expert. The Jester and Bardin engaged in a phony confrontation regarding The Jester's alleged betrayal of Bardin's "cover" during an information security intelligence operation. The "feud" ended with Bardin "revealing" The Jester's "real" name which was actually a "cover" he developed for this operation over two years ago. It was very elaborate but according to those involved, it was a success.
Here's a snippet from The Jester and Bardin's "feud":
@th3j35t3r Fix in DM my ass. YOU blew my op and and exposed my resources. It is time your shit was blown.The Jester posted this with regards to his "cover" on another website:
— Treadstone 71 (@Treadstone71LLC) May 9, 2013
For just such an occasion.....
On the 1st July 2011 - I myself left this on pastebin >> http://goo.gl/JtI46
I also purposely left this in source code of my blog: http://goo.gl/8lwUC
Later I created this: http://goo.gl/S0UAb
and to bolsert I also created this http://goo.gl/O7EtX
It's taken almost 2 years for anyone to spot the deliberate mistake. Well Done.
He doesn't exist. It's a decoy. Good to know who's who though. Thanks.
You will notice the meticulousness of the preparation involved in developing a good cover. The Jester has been active for a few years and has yet to be successfully unmasked because of his adherence to good "cover discipline".
I'm not an intelligence expert nor have I ever claimed to be. However, I have studied intelligence gathering and espionage for quite some time. What I have learned is that spies on rely on secrecy, deception, and disguise to conduct clandestine operations. In order to be successful, spies must "live, eat, and breathe" their cover story. As it's stated in this article, "Cover is a mosaic, it's a puzzle," said James Marcinkowski, a former CIA case officer who attended the dinner. "Every piece is important [to protect] because you don't know which pieces the bad guys are missing."
For more information on "cover":
It never ceases to amaze me how many of the cardinal rules of security and threat mitigation are relevant know matter which era or platform they are adhered to in. This video is a perfect illustration of that. It's a video produced by the National Security Council for government contractors who worked with classified projects. It follows a fictional case wherein a company loses a key piece of classified information they produced. Of interest to security practitioners are the human security vulnerabilities exposed. Many of the fictional characters are exploited using social engineering. While the manner in which the information is much more elaborate than what we say in modern corporate espionage, the lessons are the same.
Monday, May 13, 2013
This video is a classic from the Cold War. While some of the material is outdated, those same human security vulnerabilities still exist whether it be financial, sex, or peer pressure. The only difference between when this film was produced and now is the theater of operations has changed from being solely in an analog world to a digital, multi-spectrum world.
Here's the synopsis from archives.org:
Here's the synopsis from archives.org:
Exposes the worldwide operation of the Sino-Soviet espionage system and shows how Communist agents used any means to obtain vital information from military personnel. Reconstructs three actual cases to demonstrate various facets of espionage techniques. Explains how agents of different nationalities probe for vulnerable areas, such as loneliness, indebtedness, fast money, sex and the sporting life. Portrays the agent as he subtly approaches, ensnares and involves his victim until it is too late for the victim to retreat. Purpose: Information on communist espionage methods.