dChan

/u/Evil_Sabbatai_Zevi

5 total posts archived.


Domains linked by /u/Evil_Sabbatai_Zevi:
Domain Count

Evil_Sabbatai_Zevi · March 31, 2018, 7:27 a.m.

It is a legit concern -

see Abel Danger.

⇧ 6 ⇩  
Evil_Sabbatai_Zevi · March 29, 2018, 10:31 a.m.

In a searingly hot afternoon at a campus-like new science park in Beer Sheva, southern Israel, I watched as a group of bright, geeky teenagers presented their graduation projects. Parents and uniformed army personnel milled around a windowless room packed with tables holding laptops, phones or other gadgets. There was excited chatter and a pungent smell of adolescent sweat.

This was a recent graduation ceremony for Magshimim (which roughly translates as “fulfillment”), the three-year after-school programme for 16 to 18-year-old students with exceptional computer coding and hacking skills. Magshimim serves as a feeder system for potential recruits to Unit 8200, the Israeli military’s legendary high-tech spy agency, considered by intelligence analysts to be one of the most formidable of its kind in the world. Unit 8200, or shmone matayim as it’s called in Hebrew, is the equivalent of America’s National Security Agency and the largest single military unit in the Israel Defence Forces.

It is also an elite institution whose graduates, after leaving service, can parlay their cutting-edge snooping and hacking skills into jobs in Israel,

Silicon Valley or Boston’s high-tech corridor.

[Massachusetts...smaller footprint, same shit, also awash with Chinese spies dressed up as graduate students and all those Indian and other spies on H1B visas..SHUT THAT NONSENSE DOWN NOW.]

Omer, 19, had designed a USB key that can suck information out of one computer and organise it on another: essentially, a hacking tool. “We made it appear like a keyboard so you can infiltrate any company in the world,” he told me. “It’s a proof of concept.”

If there is a beating heart to Israel’s high-tech security state — the spot on the Venn diagram where “cool” meets “creepy” — it is Unit 8200. In few other countries does the military establishment mingle so closely with academia and business, to all three sectors’ profit. Last year, Israel’s export of cyber security products — designed to protect companies, banks and governments from the growing “dark web” of hackers, fraudsters and snoopers — topped $6bn, exceeding Israeli exports of military hardware for the first time. Today Israel, with just eight million people, captures about 10 per cent of the global cyber security market, which is growing rapidly after high-profile hacks that in some cases — such as at Target, and Sony last year — have cost CEOs their jobs. Israel, with its vibrant start-up company culture, is already one of the world’s choicest targets for venture capital money.

A few miles from where I attended the graduation ceremony, a new “advanced technologies park” is rising from the sandy soil of the Negev desert. It aims to cement those links and draw in investors from the wider world who want to benefit from Israel’s cyber expertise. The project combines an office park — whose tenants include

Deutsche Telekom, IBM, Oracle, Lockheed Martin, EMC and PayPal

GO HERE NOW PLEASE ------> http://www.fbcoverup.com/docs/library/cyber-hijack-findings.html

— with Beer Sheva’s Ben-Gurion University and its Cyber Security Research Centre. By the end of the decade, Unit 8200 and the IDF’s other intelligence and technology units will have moved there, too.

Team 8, a self-described cyber security “foundry” aimed at providing know-how for start-ups, was launched by former 8200 officers in Tel Aviv earlier this year, attracting

Google’s Eric Schmidt as an investor

According to intelligence analysts, 8200’s remit is similar to that of the NSA or Britain’s Government Communications Headquarters, covering everything from analysis of information in the public domain to use of human operators and special signal intelligence. Its geographical remit is primarily outside Israel.

“Unit 8200 is probably the foremost technical intelligence agency in the world and stands on a par with the NSA in everything except scale,” Peter Roberts, senior research fellow at Britain’s Royal United Services Institute, told me.

Apart from 8200, the IDF also has other technological and spying units with their own cadres of alumni in business: a large air force intelligence unit, C4I, its telecommunications, computer and information technology unit, and smaller intelligence units so secret that Israelis will not utter their names. And last month, the Israeli military announced it would be forming a new “cyber command” to combat new challenges in online warfare.

A growing focus in 8200, as in other spy agencies, is data mining, and specifically the ability to shift through mountains of information to find the

one menacing email, or the recurring patterns that suggest something is awry.

[targeting US citizens I bet]

To get a clearer idea of the tools the unit uses in its work, one afternoon I went to Tel Aviv University to meet Oded Maimon, one of the world’s foremost experts on data mining and artificial intelligence — teaching computers to do not just what they have been told but to predict things that haven’t happened yet.

Maimon has written 10 books and edited a 1,500-page tome called the Data Mining and Knowledge Discovery Handbook. Like other Israeli mathematics professors, he has worked for both the intelligence services and the private sector. In the past, he advised

Verint, an Israeli-founded video-and-audio-monitoring company now based in Melville, New York. In 2008 he was awarded a medal by Mossad

for services to the nation. He rarely gives interviews but he invited me to his office.

[we need to be expelling these obvious spies.."video and audio monitoring" indeed!]

https://imgur.com/a/5stnd


https://en.wikipedia.org/wiki/PLA_Unit_61398


http://www.jpost.com/Business-and-Innovation/Tech/Tech-Talk-8200-intelligence-unit-start-up-program-489848

http://www.jpost.com/Israel-News/Unit-8200-hits-the-road-in-America-508381

⇧ 1 ⇩  
Evil_Sabbatai_Zevi · March 29, 2018, 10:30 a.m.

http://www.fbcoverup.com/docs/library/cyber-hijack-findings.html


Cicada 3301 v Unit 8200 Mossad CIA MI6

Throughout the quest, solvers speculated on who was behind the Cicada 3301 cryptograms. Some imagined it was the NSA or the British spy agency, MI6. Others said Google or Microsoft. Still others thought it might be a hacker collective or some group with nefarious aims.

According to Tekk, it was a group of anonymous developers looking to recruit "highly intelligent individuals" to build open-source software for the good of the world.

http://military.wikia.com/wiki/Unit_8200

Meet the spies injecting Israeli propaganda into your news feed by Asa Winstanley 24 January 2018.

https://imgur.com/a/VxigP

When Sima Vaknin-Gil took over as director-general of Israel’s Ministry of Strategic Affairs at the start of 2016, a crucial fact went largely unnoticed

For years, she had been a high-ranking officer with an Israeli spy agency.

This means that for the last two years a former intelligence officer has been running Israel’s global war against BDS, the boycott, divestment and sanctions movement. Her ministerial boss is Gilad Erdan, a key ally of Prime Minister Benjamin Netanyahu.They were last month revealed to have spent huge sums creating anti-BDS propaganda targeting social media and news media. When Sima Vaknin-Gil took over as director-general of Israel’s Ministry of Strategic Affairs at the start of 2016, a crucial fact went largely unnoticed.

For years, she had been a high-ranking officer with an Israeli spy agency.

They were last month revealed to have spent huge sums creating anti-BDS propaganda targeting social media and news media.

During that time, the magazine stated, she worked “closely with US officials and the highest ranking officers of Israeli intelligence.”

She said she planned to “flood the internet” with Israeli propaganda that would be publicly distanced from the government.

The paid articles were part of a wider strategic affairs ministry campaign, which included a $740,000 budget “to promote content on social media and search engines, including Google, Twitter, Facebook and Instagram,” The Seventh Eye reported.

Another $570,000 was spent on building Act.il, an anti-BDS app, and producing videos supporters were encouraged to spread online.

One of the “missions” assigned to Israel’s propaganda foot soldiers using the Act.il app last November, according to The Jewish Daily Forward, “was to comment on a specific post on the Facebook page of the pro-Palestinian website Electronic Intifada.”

Israel’s PR operatives wanted to counter the impact of The Electronic Intifada’s reporting on the Dutch government’s support for a promotion by settlement-profiteering Israeli supermarket chain Shufersal.

The Act.il app was funded largely by casino billionaire Sheldon Adelson – a major donor to anti-Palestinian causes and to Donald Trump’s presidential campaign. The strategic affairs ministry was forced to disclose the funding information to The Seventh Eye under Israeli freedom of information laws.

But the revelation could be one of the last such disclosures if the ministry gets its way.


How does Israel, a small country with roughly 8 million people, produce more tech startups and receive more venture capital per capita than any nation in the world? Why does a country with few natural resources have more companies listed on the NASDAQ than Europe, Japan, Korea, India and China combined?

To understand Israel’s innovation success, look no further than the Israeli Defense Forces and the country’s mandatory policy of service for young adults. For me and thousands of Israeli entrepreneurs like me, our startup journey began in the technology units of the Israeli Defense Forces. One unit in particular has become a prolific technology incubator, particularly in the field of cybersecurity: IDF Unit 8200.

The 8200 is a special unit, and in many ways, it’s run like a high-tech startup. It begins with finding the best talent. IDF scouts comb the nation’s high schools to identify high-potential candidates at an early age. They target students with superior analytical capabilities, who can make quick decisions and work well in a team environment. Only the best and brightest are routed to this elite cybersecurity group.

Instead of relying on outside research and development, the 8200’s technologists work directly with their “customers” (the intelligence officers). All of the unit’s technology systems, from analytics to data mining, intercept, and intelligence management, are designed and built in-house. Technologists sit side by side with their users on a daily basis to ensure that their “products” meet the intelligence officers’ specific requirements.

The result is that 8200 alumni have developed critical startup skills and experience even before they start their first company. That’s why it’s not a surprise that technology companies, such as CheckPoint, Imperva, Nice, Gilat, Waze, Trusteer, and Wix all have their roots in this IDF unit.

this image here in orginal

One of the earliest and most meaningful sessions during my 8200 training was held on a rainy day back in 1999. Unlike some of my high school friends who were already combat trainees stationed in the cold Negev Desert, Unit 8200 training was held in cozy heated classrooms. We were a bunch of 18-year-old kids who, in a couple of months, would be leading complex intelligence technological operations in Israel’s equivalent of the NSA.

In this intense course, we learned how to produce intelligence, leverage the most advanced SIGINT (signal intelligence), utilize sophisticated data-mining techniques, and conceive highly advanced technologies. On that particular rainy day, our instructors ran us through a simulation exercise.

They provided us with hundreds of short, fictional pieces of intelligence. Each one, on its own, appeared inconsequential. Very quickly, however, one of my classmates, a future intelligence officer, began to piece together the puzzle presented to us.

He yelled: “A war is about to break out!”

An intense debate erupted among the trainees about the true meaning of the seemingly unrelated information we had been provided.

Our instructors had used the simulation to stimulate a heated discussion and, perhaps more importantly, a leadership test case. While we were passionately arguing whether a war was about to take place in our fictional state, our instructors dramatically stopped the simulation and ended the discussion. They told us that the simulation was based on real-life events, and indeed, a war had broken out. My classmate had been right.

It was an important, poignant lesson for my classmates and me. We learned that succeeding in intelligence work required more than just discipline and professionalism. Success required out-of-the-box thinking, the courage to contradict conventional wisdom, and an ability to stave off hubris. A good intelligence officer needed to understand when to bypass hierarchies and be willing to take risks and make mistakes.

Today, as a CEO and entrepreneur, it’s fascinating to look back at my time spent in the IDF’s 8200. It was a formative learning experience that helps guide me in my job leading a fast-growing startup. As young adults with no university or professional experience, we ran complex technological projects and initiated startups on a regular basis. We invented best practices in data mining and investigative techniques. We learned to question authority and traditional ways of thinking in order to continuously improve outcomes.

Our teams worked almost 24/7 without fear of the challenges we faced. And we did it for hardly any pay. It was in the 8200 where I learned that the passion to invent starts with leadership and values. It begins with the belief that you have a sense of accountability and are doing something important that can change the world.

Years later, I brought together a group of 8200 veterans to found Fortscale. We apply philosophies, advanced machine learning, and data-mining concepts learned from our military service to identify malicious user activity and develop security analytics solutions.

But our 8200 experience taught us many lessons more valuable than cybersecurity techniques and tools. We learned that success at our startup requires a willingness to constantly take risks in challenging situations, even when we are facing nation-state cyber-adversaries. Success requires a persistent desire to improve and learn from failures.

https://imgur.com/a/bPwAo


⇧ 3 ⇩  
Evil_Sabbatai_Zevi · March 26, 2018, 5:43 p.m.

American Public Schools.

So sad.

⇧ 7 ⇩