Things You Need to Know about Current Global and National Threats to Your Personal Security
Cyber Armies
U.S. Allies
Cyber Warfare
The First Line of Attack in Conflict Between Nations
THE MOST SERIOUS THREAT WE FACE IS...
The Power Grid being hacked/disabled if at war.
“If the grid went down for a long enough time…
90 percent of the U.S. population would die from starvation, lack of water, and social disruption. We are talking about total devastation.”
-- Ambassador Henry Cooper, Former Director of U.S. Strategic Defense
NATION-STATES - AXIS: China, Russia, Iran, North Korea
NATION-STATES - ALLIES: the U.S., the U.K., Israel, NATO
List of National Cyber Defense Command Centers around the World.
CIVILIAN: Rogue Hackers, Hacking Communities, Criminal Gangs, Hacktivists
In this section, we will focus on major nation-state cyber armies but also touch on a few civilian ones too. Most nation-states focus on defensive cyber activities. Civilians, larger nation-states, and highly dedicated smaller states also develop offensive capabilities.
Types of Hackers and Hacking
14 min
How Governments use Hacking for Power
July 2024 | 11 min | Cybernews
Top 7 Most Elite Nation-State Hackers
Oct 2020 | 19 min | Jack Rhysider
Unit 8200: The Elite Israeli Cyberforce Behind Hezbollah's Worst Nightmare
Sept 2024 | 6 min | Briefly
Israel-Hamas War:
The Latest Front of Cyberwarfare?
Oct 2023 | 11 min | DW News (German Public TV)
Israel's Cyber Security: The Invisible War
Feb 2022 | 23 min | TBN Israel
What Makes Israel So Good at Hacking?
Sept 2022 | 16 min | Cyberspatial
Israeli Cyber-Attack Cripples Iranian Nuclear Site; Iran Vows Revenge
April 2021 | 12 min | TBN
How Israel Rules The World of Cyber Security
March 2018 | 14 min | VICE News
Wikipedia
coming...
CISA (Cybersecurity & Infrastructure Security Agency) Wikipedia - for American citizens, business, and industry
Dept of Defense: U.S. Cyber Command | Army Cyber Command, Marine Corps Forces Cyberspace Command, Air Force Cyber Command, Navy U.S. Fleet Cyber Command
NSA (National Security Agency), CIA (Central Intelligence Agency)
SEE ALSO: The U.S. Intelligence Community
Department of Defense
US has the Best Cyber Offensive Capability in the World: Gen. Jack Keane
Aug 2018 | 2 min | Fox Business
Exclusive Look at the NSA Fight Against Cyberattacks
Nov 2021 | 5 min | ABC News
An Exclusive Look Behind-the-Scenes of the U.S. Military’s Cyber Defense
March 2018 | 8 min | PBS News Hour
National Security Agency (NSA) Overview
July 2019 | 4 min | U.S. National Security Agency
Cybersecurity is National Security
Sept 2024 | 26 min | U.S. National Security Agency
NSA Cyber Exercise Competition 2024
Nov 2024 | 8 min | U.S. National Security Agency
Inside NSA Hawaii, the "front lines" and Secretive Outpost for Intelligence Gathering
May 2019 | 6 min | CBS News
Pine Gap: Unveiling the CIA & NSA's Secret Spy Base in Australia
April 2024 | 6 min | Defence Central
Department of Justice, FBI, Homeland Defense
Inside the FBI's Cyber Division headquarters
April 2015 | 3 min | CBS News
FBI receives 840k+ Cybercrime Complaint per Year
July 2022 | 3 min | CBS 17 North Carolina
Mass Collection of Everyone's Data
Government - Commercial - Hackers
Does the U.S. Government spy on Americans and its Allies? The Official Line is: No. Un-Officially: Yes.
What it definitely does is mass collection of digital data on everyone, foreign and domestic. This opens the door for the capability of mass surveillance along with mass abuses. Does this help protect the public from bad guys? Yes. This 'mass collection,' if done by other non-governmental parties, would be considered highly illegal and criminal, yet they say it is being done for 'national security,' to 'protect us,' to 'keep us safe.'
Do Businesses collect, store, buy and sell your personal data? Yes.
Do Hackers sometimes gain illegal access to all of the above? And buy and sell personal, business, and government data? Yes.
No More Secrets. In Hacker-lore, this has been a dream - of an ultimate decryption key that opens all secure data vaults and secure communications. In reality, this same thing is being accomplished by other means. See the scene from the classic 'hacking' film: Sneakers (1992) with the famous line: "No More Secrets" staring Robert Redford, Dan Aykroyd, and Sidney Poitier.
What they do with this information is what can be both used for good or evil. While surveilling Americans and Allies is not necessarily the U.S. Government's primary mission, it does take place, and the release of such information does happen by rogue actors, hackers, and missions born out abuse of power.
Power Corrupts. Absolute Power Corrupts Absolutely.
It is important to supervise and keep the accumulation power, apt for abuse, in check to insure the rights and liberties of citizens, friends, and allies.
United States Government Data Collection
Why We Shouldn't Underestimate this Spy Network
Aug 2023 | 27 min | Johnny Harris
America's Surveillance State:
The Surveillance Machine
2021 | 26 min | ENDEVR
Watch Full Series
America's Surveillance State:
Whistleblowers and Inside Threats
2021 | 25 min | ENDEVR
Watch Full Series
America's Surveillance State: Inside the NSA
2021 | 25 min | ENDEVR
Watch Full Series
Exposing the NSA’s Mass Surveillance of Americans
2017 | 22 min | VICE News
Government Abuses
While the examples of government abuse below are from openly available or public information, this opens up the idea of potential abuse and use of non-public private data of citizens. The stories below are only a small sample.
Arrested for a Social Media Post
Interview with Konstantin Kisins
Dec 2022 | 5 min | John Anderson
Arrested for a Facebook Post during COVID
Interview with Zoe Buhler from Australia
July 2023 | 8 min | Sky News Australia
Government Surveillance:
HACKING, SPYING on Computers of American Journalists
Interview with Sharyl Attkisson
Jan 2020 | 9 min | Glenn Beck
Commerical Data Collection
Selling Human Data - Evil Businesses
April 2023 | 22 min | Slidebean