Showing posts with label wikileaks. Show all posts
Showing posts with label wikileaks. Show all posts

GCIS/MSS INTELLIGENCE BRIEFING: WikiLeaks: Suleiman promised to stop Gaza elections

ISSUED BY: GCIS Communications Command Center

SOURCE: JPost

11February2011 7:46pmEST

GCIS/MSS INTELLIGENCE UPDATE: Egyptian Vice President Omar Suleiman promised Israel in Omar Suleiman2005 that he would prevent Hamas from gaining control over Gaza, according to a US diplomatic cable released on Friday.

According to the cable, which was leaked to WikiLeaks and published by Norweigan newspaper Aftenposten, Maj.-Gen. (res.) Amos Gilad, head of the Defense Ministry's Diplomatic-Security Bureau, secretly visited Suleiman, then the head of Egyptian intelligence, in September 2005. Gilad then reported on the visit to US diplomats in Tel Aviv. (read full report)

 

 

"GCIS/MSS INTELLIGENCE UPDATE" is a cooperative intelligence briefing presented by Griffith Colson Intelligence Service and Machaseh Security Service, and provided to the public for informative purposes only. All subject matter is credited to it's source of origin, and is not intended to represent original content authored by GCIS, MSS or it's advertisers or affiliates.

GCIS INTELLIGENCE BRIEFING: Wikileaks: 3 previously unknown 9/11 plotters revealed

ISSUED BY: GCIS Communications Command Center

SOURCE: JPOST

02February2011 1:06pmEST

GCIS INTELLIGENCE UPDATE: A newly released US diplomatic cable discloses the existence of Plane flying into WTC Sept. 11, 2001previously undisclosed participants in the Sept. 11, 2001, plot: a group of Qatari men who conducted surveillance of targets in New York and the Washington area before leaving the United States on the eve of the attacks.

The three men flew into the United States on Aug. 15, 2001, and "visited the World Trade Center, the Statue of Liberty, the White House, and various areas in Virginia" before flying on to Los Angeles, according to the cable, part of the cache of documents obtained by the antisecrecy group WikiLeaks.

But a US official, speaking on the condition of anonymity in order to comment on classified material made public by WikiLeaks, said that the three men were "looked at" within days of the attacks and that investigators concluded they could not be charged.

"There is no manhunt," said the official, playing down a report in Britain's Daily Telegraph newspaper that disclosed the contents of the cable. "There is no active case. They were looked at, but it washed out." (read full report)

GCIS INTELLIGENCE BRIEFING: Search Warrants Executed in the United States as Part of Ongoing Cyber Investigation

ISSUED BY: GCIS Communications Command Center

SOURCE: FBI

28January2011 2:16pmEST

GCIS INTELLIGENCE UPDATE: FBI agents today executed more than 40 search warrants throughout the United States as part of an ongoing investigation into recent coordinated cyber attacks against major companies and organizations. Also today, the United Kingdom’s Metropolitan Police Service executed additional search warrants and arrested five people for their alleged role in the attacks.

DDoS attack leaves IP addresses exposedThese distributed denial of service attacks (DDoS) are facilitated by software tools designed to damage a computer network’s ability to function by flooding it with useless commands and information, thus denying service to legitimate users. A group calling itself “Anonymous” has claimed responsibility for the attacks, saying they conducted them in protest of the companies’ and organizations’ actions. The attacks were facilitated by the software tools the group makes available for free download on the Internet. The victims included major U.S. companies across several industries.

The FBI also is reminding the public that facilitating or conducting a DDoS attack is illegal, punishable by up to 10 years in prison, as well as exposing participants to significant civil liability.

The FBI is working closely with its international law enforcement partners and others to mitigate these threats. Authorities in the Netherlands, Germany, and France have also taken their own investigative and enforcement actions. The National Cyber-Forensics and Training Alliance (NCFTA) also is providing assistance. The NCFTA is a public-private partnership that works to identify, mitigate, and neutralize cyber crime. The NCFTA has advised that software from any untrustworthy source represents a potential threat and should be removed. Major Internet security (anti-virus) software providers have instituted updates so they will detect the so-called “Low Orbit Ion Canon” tools used in these attacks.

(Source Page)