AT&T and the DEA

“AT&T gives DEA 26 years of phone call records to wage war on drugs” http://feedly.com/k/139yDpJ

Advertisements

Tor users identifiable given enough time

A number of techniques have surfaced over the years making security researchs concerned about TORs ability to protect users.

“Snoops can identify Tor users given enough time, experts say” http://feedly.com/k/1cLSrSR

DESTABILIZING TERRORIST NETWORKS – Global Guerrillas

While assassination or targeting of leadership may not be effective and degrading networks delegitimizing various lineages, ie relationships and communications, is historically veey effective.

http://globalguerrillas.typepad.com/globalguerrillas/2004/03/destabilizing_t.html

How Military Counterinsurgency Software Is Being Adapted To Tackle Gang Violence in Mainland USA

Network analysis software developed by the DoD and IC have been used to analyze gangs and criminal networks by LE for some years. Especially in fusion cells. With DoD dollars slowing down though big vendors are looking for new customers and large metropolitan departments may start deploying the same systems as their federal counterparts.

“How Military Counterinsurgency Software Is Being Adapted To Tackle Gang Violence in Mainland USA” http://www.technologyreview.com/view/516701/how-military-counterinsurgency-software-is-being-adapted-to-tackle-gang-violence-in/