Forwarded from BlackBox (Security) Archiv
Project DREAD: White House veterans helped Gulf monarchy build secret surveillance unit
In the years after 9/11, former U.S. counterterrorism czar Richard Clarke warned Congress that the country needed more expansive spying powers to prevent another catastrophe. Five years after leaving government, he shopped the same idea to an enthusiastic partner: an Arab monarchy with deep pockets.
In 2008, Clarke went to work as a consultant guiding the United Arab Emirates as it created a cyber surveillance capability that would utilize top American intelligence contractors to help monitor threats against the tiny nation.
The secret unit Clarke helped create had an ominous acronym: #DREAD, short for #Development #Research #Exploitation and #Analysis #Department. In the years that followed, the #UAE unit expanded its hunt far beyond suspected extremists to include a #Saudi women’s rights activist, diplomats at the United Nations and personnel at #FIFA, the world soccer body. By 2012, the program would be known among its #American operatives by a codename: #Project #Raven.
Reuters reports this year revealed how a group of former National Security Agency operatives and other elite American intelligence veterans helped the UAE spy on a wide range of targets through the previously undisclosed program — from terrorists to human rights activists, journalists and dissidents.
Now, an examination of the origins of DREAD, reported here for the first time, shows how a pair of former senior White House leaders, working with ex-#NSA #spies and #Beltway contractors, played pivotal roles in building a program whose actions are now under scrutiny by federal authorities.
To chart the UAE spying mission’s evolution, #Reuters examined more than 10,000 DREAD program documents and interviewed more than a dozen contractors, intelligence operatives and former government insiders with direct knowledge of the program. The documents Reuters reviewed span nearly a decade of the DREAD program, starting in 2008, and include internal memos describing the project’s logistics, operational plans and targets.
Clarke was the first in a string of former White House and U.S. defense executives who arrived in the UAE after 9/11 to build the spying unit. Utilizing his close relationship to the country’s rulers, forged through decades of experience as a senior U.S. decision-maker, Clarke won numerous security consulting contracts in the UAE. One of them was to help build the secret spying unit in an unused airport facility in Abu Dhabi.
👉🏼 Read more:
https://www.reuters.com/investigates/special-report/usa-raven-whitehouse/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
In the years after 9/11, former U.S. counterterrorism czar Richard Clarke warned Congress that the country needed more expansive spying powers to prevent another catastrophe. Five years after leaving government, he shopped the same idea to an enthusiastic partner: an Arab monarchy with deep pockets.
In 2008, Clarke went to work as a consultant guiding the United Arab Emirates as it created a cyber surveillance capability that would utilize top American intelligence contractors to help monitor threats against the tiny nation.
The secret unit Clarke helped create had an ominous acronym: #DREAD, short for #Development #Research #Exploitation and #Analysis #Department. In the years that followed, the #UAE unit expanded its hunt far beyond suspected extremists to include a #Saudi women’s rights activist, diplomats at the United Nations and personnel at #FIFA, the world soccer body. By 2012, the program would be known among its #American operatives by a codename: #Project #Raven.
Reuters reports this year revealed how a group of former National Security Agency operatives and other elite American intelligence veterans helped the UAE spy on a wide range of targets through the previously undisclosed program — from terrorists to human rights activists, journalists and dissidents.
Now, an examination of the origins of DREAD, reported here for the first time, shows how a pair of former senior White House leaders, working with ex-#NSA #spies and #Beltway contractors, played pivotal roles in building a program whose actions are now under scrutiny by federal authorities.
To chart the UAE spying mission’s evolution, #Reuters examined more than 10,000 DREAD program documents and interviewed more than a dozen contractors, intelligence operatives and former government insiders with direct knowledge of the program. The documents Reuters reviewed span nearly a decade of the DREAD program, starting in 2008, and include internal memos describing the project’s logistics, operational plans and targets.
Clarke was the first in a string of former White House and U.S. defense executives who arrived in the UAE after 9/11 to build the spying unit. Utilizing his close relationship to the country’s rulers, forged through decades of experience as a senior U.S. decision-maker, Clarke won numerous security consulting contracts in the UAE. One of them was to help build the secret spying unit in an unused airport facility in Abu Dhabi.
👉🏼 Read more:
https://www.reuters.com/investigates/special-report/usa-raven-whitehouse/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
NoGoolag
microG developer will be back in 1-2 weeks https://gist.github.com/mar-v-in/c8254168c63361c5094de13a7afea344 Hello everyone, As many of you have noticed there had been very little involvement of me with microG over the last months. tl;dr: I'll be back…
Here are some ways to support microg development economically
All issues that have [$] in the title have the price already paid to Bountysource, not just promised.
Bountysource is the site where you pay the bounty, and when someone fix/implement the issue then the site will pay him/her.
https://github.com/microg/android_packages_apps_GmsCore/issues?q=label%3Abounty
https://www.bountysource.com/teams/microg/issues
microG also accepts donations via Liberapay:
https://liberapay.com/microG
https://microg.org
https://github.com/microg
Issues
https://github.com/microg/android_packages_apps_GmsCore/issues
Pull requests
https://github.com/microg/android_packages_apps_GmsCore/pulls
#microg #bounty #donate #development
All issues that have [$] in the title have the price already paid to Bountysource, not just promised.
Bountysource is the site where you pay the bounty, and when someone fix/implement the issue then the site will pay him/her.
https://github.com/microg/android_packages_apps_GmsCore/issues?q=label%3Abounty
https://www.bountysource.com/teams/microg/issues
microG also accepts donations via Liberapay:
https://liberapay.com/microG
https://microg.org
https://github.com/microg
Issues
https://github.com/microg/android_packages_apps_GmsCore/issues
Pull requests
https://github.com/microg/android_packages_apps_GmsCore/pulls
#microg #bounty #donate #development
GitHub
microg/android_packages_apps_GmsCore
Free implementation of Play Services. Contribute to microg/android_packages_apps_GmsCore development by creating an account on GitHub.
Mask Mandates Causing Over 350% Surge In Childhood Speech Delays
https://thenationalpulse.com/2022/01/20/mask-mandates-causing-speech-delays/
#mask #child #development
https://thenationalpulse.com/2022/01/20/mask-mandates-causing-speech-delays/
#mask #child #development
The National Pulse+
REPORT: Mask Mandates Causing Over 350% Surge In Childhood Speech Delays.
Mask mandates implemented by the government amidst the COVID-19 appear to be causing speech delays in young children. The regulations, which are still in effect in Democrat-led cities including Washington D.C. and New York City, have had adverse effects on…