Trump Revokes US Signature from Global Arms Trade Treaty, Which Bans The Sale of Arms/Munitions Into Known Conflict Areas

Less than 2 weeks after vetoing a resolution from US Congress that would ban the sale of weapons and munitions to Saudi Arabia, Donald Trump announced that he would be ending the United States membership as a signatory to the the United Nations Arms Trade Treaty of 2014. According to the UN, the Arms Trade Treaty (ATT) was first established with the intent of reducing “human suffering caused by illegal and irresponsible arms transfers” by enforcing “common standards for the international trade of conventional weapons” and thus reducing “illicit arms trade” around the world. To date, the treaty has signatories in 130 countries worldwide – 129 after the removal of the US’s signature today.

Though disappointing, the move should come as no surprise. Under Commander In Chief Donald Trump US led bombing have increased worldwide, the DoD’s budget has increased at a rate greater than the combined defense budget of Russia every year annually since Donald Trump assumed office and the President has only continued to increase arm sales/transfers to countries actively engaged in armed conflict since 2016, including tp countries such as Qatar, Saudi Arabia and the United Nations Emirates – whom have each been sold billions of dollars worth of military equipment individually under Donald Trump.

Donald Trump did his best to spin his decision today as an attempt to protect American’s Second Amendment rights domestically here in the United States, even though the intent of the treaty itself has absolutely nothing to do with that – instead focusing on the movement of arms into known areas conflict or War around the world. Nonetheless, you can see Trumps full speech justifying his decision today via the video provided below.

Trumps Speech, Removing US Signature from ATT:

Full Treaty Text: http://disarmament.un.org/treaties/t/att/text

Browse Treaty:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/04/ATT_English.pdf”%5D

Pryzraky Hackers Responsible for 39 International Hacks, Leaks & DDoS Attacks Over The Last 4 Days

Dating back to the weekend, “Pryzraky” hackers have been extremely active in a number of hacks, leaks and DDoS attacks targeting Government institutions in and around Europe, United States, United Kingdom and South America. However, while their hacks have primarily been carried out under the banners of #OpAssange, #OpEcuador and #OpUK, Pryzraky is doing as much as possible to distance themselves from the Anonymous hacker collective, whom been extremely active in publicizing these operations online.

All told, group members “Mecz1nho Markov” (@Mecz1nho), “Alne3737” (@Al1ne3737) and “PopTart” are responsible for a 39 cyber attacks over the last 4 days, including attacks targeting the Association of Police Investigators (Brasil), International Police (France), Department of Defense (USA) and National Police Association of the United Kingdom – with some attack bringing websites down for days at a time. A full list of their attacks is chronicled below.

Hacked/Leaked:

Association of Civilian Police Investigators: hxxp://sinpol-assinpol.com.br/
Faculdade Integrada Tiradentes: hxxp://fits.edu.br/
Data Download: https://anonfile.com/fem19fd4n9/PryzrakyLeaks_-_14.04.2019_zip

[Target]: hxxps://www.correosdelecuador.gob.ec/
[Database]: https://pastebin.com/raw/KQXRbqCQ

DDoS Attacks:

International Police (INTERPOL) – hxxp://interpol.int/ (Tango Down’d)
US Department of Defense (DoD) – hxxp://defense.gov/ (Tango Down’d)
UK National Police – hxxp://police.uk/ (Tango Down’d)
Supreme Court of The United Kingdom – hxxp://supremecourt.uk/ (Tango Down’d)

SQLi Injection Vulnerabilities:

hxxp://bedale-tc.gov.uk/
hxxp://www.exning-pc.gov.uk/
hxxp://www.rosstc-herefordshire.gov.uk/

.GOV
hxxp://www.wraysburyparishcouncil.gov.uk/cllr-profile.php?id=24%27
hxxp://www.localplan.charnwood.gov.uk/content/index.php?id=1%27

.CO
hxxp://www.thelexington.co.uk/event.php?id=311%27
hxxp://chatterboxvoices.co.uk/profile.php?id=351%27
hxxp://www.mexicolore.co.uk/can.php?id=1%27
hxxp://fieh.co.uk/index.php?Id=51%27
hxxp://www.facetpublishing.co.uk/title.php?id=301829%27#.XLPCxuhKjIU
hxxps://www.ileswastesystems.co.uk/index.php?id=1%27
hxxp://www.mcstone.co.uk/kitchens.php?id=11%27
hxxp://www.elmslie.co.uk/project.php?id=61%27
hxxp://www.sequoia.co.uk/news.php?id=134%27
hxxp://www.mwnuk.co.uk/resourcesDetail.php?id=97%27
hxxp://www.windowfrance.co.uk/about_infos.php?id=1%27
hxxp://emjplastics.co.uk/project.php?id=14%27
hxxp://dementiabuddy.co.uk/event.php?id=162%27
hxxps://www.fusionworcs.co.uk/news/article.php?id=579%27
hxxps://www.nottspeed.co.uk/news_item.php?ID=243%27
hxxp://www.falkirklocalhistorysociety.co.uk/home/index.php?id=124%27
hxxps://www.trinitycollege.com/news/viewarticle.php?id=502%27
hxxps://www.restons.co.uk/index.php?id=79%27

.ORG
hxxps://www.pysc.org.uk/new/article.php?id=426%27
hxxp://www.bicga.org.uk/hub.php?ID=41%27
hxxps://www.lmc.org.uk/page.php?id=17%27
hxxp://www.linksparkct.org.uk/course.php?id=47%27
hxxp://www.gracechurchgreenwich.org.uk/churchbuilder/medialib.php?id=384
hxxps://garyhall.org.uk/maths-resource.php?id=80
hxxps://www.outward.org.uk/vacancy.php?id=104%27

https://twitter.com/al1ne3737/status/1117578169496866816

Recently Declassified Files from The DoD & CIA Paint an Interesting Portrayal of Middle Eastern History & The Bible

This article isn’t really “news,” so to speak, but rather an opportunity to consume some recently declassified files from the United States Department of Defense (DoD) and Central Intelligence Agency (CIA). More specifically, below you can find declassified files which contain information on ancient historical buildings, landmarks, infrastructure and mythology – including the Bible itself. Honestly, who isn’t interested in that? And if that doesn’t draw you in to want to read more then honestly, what are you even doing on my site?

The first document I would like to share is a release from the Department of Defense  yesterday, actually, showcasing aerial footage and photography of historical architecture and world heritage sites across Iraq – ancient Babylon. While the photos were originally assembled in the 1950’s to track enemy ground movements across the country, they do provide an interesting and unique perspective in terms of Middle Eastern history. Perhaps some of this is even more interesting given the fact that many world heritage sites across Iraq have since been lost forever – destroyed by the Islamic State over the course of the last decade.

Download Full Declassified Release/Study from DoD: https://roguemedia.co/wp-content/uploads/2019/04/near_eastern_landscapes_and_declassified_u2_aerial_imagery.pdf

Browse Release:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/04/near_eastern_landscapes_and_declassified_u2_aerial_imagery.pdf”%5D

The second release of documents I would like to share were included in a treasure trove of leaked documents released by the CIA in 2017 – the result of a Freedom of Information Act (FOIA) lawsuit. However, the subject of these particular documents is extremely peculiar. For example, they discuss the stories of Genesis, Adam and Eve and the Great Flood of Noah in terms of both history and climatology. Honestly, I have never come across anything like them in all of my years of academic study or online activism. Consequentially, this is why I am featuring them here today – simply to share interesting information with the world – you’re welcome!

Full CIA Reading Room Database: https://www.cia.gov/library/readingroom/home
Download Release from CIA: https://roguemedia.co/wp-content/uploads/2019/04/CIA-RDP79B00752A000300070001-8.pdf

Browse Documents:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/04/CIA-RDP79B00752A000300070001-8.pdf”%5D

Understanding The Weaponization of Modern Cyberspace & The ‘Secret World’ of International Corporate Espionage

This is a concept which needs some explaining, because no one has really ever taken the time to break it down – at least from what I have seen. What you need to understand is that we live in a unique time in world history, and we are all headed towards an equally unique and uncertain future.

What I mean to say is that the 21st century is an exceptionally prosperous time in human history, there is no mass global Wars, there’s no great plague, the majority of us all have running water, plumbing, electricity, refrigeration and the like, we have bikes, cars, automobiles and planes and the entire world can theoretically be accessible/connectable with the click of a button. Not only is the modern 21st century perhaps the single easiest and most peaceful time in human history, but the human race is now also interconnected in ways that prior generations could have never imagined possible.

With that established however, not all is right as rain. For example, over the course of the last several years the United States, Germany, NATO and the like have all gone on to officially declare “cyber space” and “the internet” as the 5th domain/relm of Warfare – joining more traditions domains of Warfare such land, sea, air and space.

Learn More – NATO’s Recognition of Cyberspace As New Domain of Warfare: https://apps.dtic.mil/dtic/tr/fulltext/u2/1029776.pdf

However, as humanity continues to grapple with its understanding and regulation of our new technologies, we are only just now beginning to see/realize the weaponizing of the internet, internet conglomerates and their infrastructure – and this phenomenon is slowly beginning to rear its ugly head across nearly every other aspect of society these days. For example, consider the following evidence.

Google & The Department of Defense

I start off with Google for a number of reasons, chief among them is the fact that they are the single largest and highest grossing firm on the net. As Google is an American business, what you should know is that the company has a number of active contracts with the United States Government – particularly the United States military industrial complex. If you would like an example, look no further than “Project Maven,” a joint military operation currently underway with the help of Google researchers, developers, staff and Artificial Intelligence algorithms – some of which have recently made international headlines.

It should therefore go without saying, but you can not have a contract with the United States military without your full loyalties belonging to them. For this very reason, this also means that enemies of the US Government, or any other international Government agency for that matter, cannot rely on or trust Google to ensure their full security, privacy or look out for their best interests – especially in regards to contentious geo-political issues/events. In other words, as an American-based business and active military contractor, Google is loyal to the US military and for better or worse, has become a de facto branch of/for it – even if no one actually admits this out loud.

Consequentially enough, this is also why Google has always been restricted by “The Great Firewall of China,” and has recently faced banishment from Russia entirely as recently as just a few weeks ago.

Microsoft, Encryption Back-doors & Government Espionage

Similar to Google, Microsoft is yet another American based business with deep running ties to the United States military industrial complex. For example, every computer owned by the US Army and US Cyber Command is now literally mandated to run exclusively on Microsoft Windows 10 software and Operating Systems.

https://twitter.com/MSinDOD/status/770962514406313986

Now, I want you to notice the dates of those two Tweets above – August 29th and 31st, 2016. I bring this up because just a few weeks prior to this, on August 10th 2016, the Kremlin came out with a press release announcing how it was their immediate intention to begin switching all government/military computing systems off Microsoft and on onto domestically produced software – directly because of Microsoft‘s deep running ties with the US Government and US military.

It wasn’t until just a few months after this, in November 2016, that the Kremlin literally called switching over all their software away from Microsofta matter of national security.” Going on to explain how the Kremlin now believes that “software developed by American companies, such as Microsoft, could hide back-doors and bugs that could help other nations spy on their plans.” Also going as far as to say “not replacing foreign IT would be equivalent to dismissing the army.

Read More – Russia’s Plan To Abandon Microsoft & Foreign Software 9/17/2016: https://news.softpedia.com/news/president-elect-donald-trump-can-t-stop-russia-s-war-against-american-software-510294.shtml

If you think this conundrum is unique to Russia, you are mistaken. Believe it or not, Microsoft has similarly been banned from all Government systems in China dating back to 2013. This is when the country first interrogated then political asylum seeker/NSA contractor Edward Snowden, whom revealed that the United States has been secretly using Microsoft to conduct espionage on the Chinese Government and its companies for decades. Not only this, but Microsoft‘s own search engine, Bing, was also banned in China as recently as January 2019 – for essentially all the same reasons.

ZTE & Corporate Espionage

Consequentially enough, this sets me up perfectly for my next bit – America’s banning of the Chinese-based telecommunications conglomerate known as Zhongxing Telecommunication Equipment – otherwise simply referred to as ZTE. Truth be told, I first learned of this news after attempting to go into an AT&T in store in downtown New York City for repairs on my phone, only to find out that AT&T refused to fix my screen because it was a ZTE product – based out of China. They informed me that it was no longer their policy to service and/or fix any Chinese based phone, and advised me to purchase a new American phone – to which I declined, and not respectfully.

Regardless, similar in many ways to to the complaints international Government agencies have been levying against American tech giants for years now, the US has now started levying against other international tech giants/conglomerates. It is just a shame that this information is generally not available or public knowledge to the average American hopelessly wandering around our society.

Kaspersky & US Election Hacking

Along the same lines, throughout the course of 2017, the US Department of Homeland Security (DHS) made it a top priority to ban Kaspersky Lab anti-virus and other software from all Government systems around the United States. This is because, upon investigation, the US Federal Bureau of Investigation had come to believe that US government employees and personnel were originally compromised via the Kaspersky Lab products they had installed on their devices, which granted the Russian based software conglomerate root access over all their systems. Put more directly, the US Government had come to believe that Kaspersky Lab roots were the whole reason that Russia was able to hack the 2016 Presidential election and US Government employees so easily in the months just before it – especially considering Russian laws requires Russian companies to make all of their data freely accessible to the Kremlin. These laws are also why Kasperky later moved all of their severs out of Russia and into Switzerland by 2018, even though the public damage to the company had already been done.

However, it must also be stated while there was never any cut and dry evidence released indicating that this was indeed the case, at least publicly, and there are still technically court cases ongoing surrounding these allegations, the US Governments ban of Kaspersky has been implemented nonetheless. As a result, Kaspersky has also faced similar bans throughout Europe.

I also don’t know what it says about me, but I just bought a new computer two weeks ago and the first thing I did was install Kaspersky Lab software on it. I also own a ZTE phone 😉.

Facebook & Psychological Warfare

The last two sections of this article are almost exclusive to Rogue Media Labs, at least I have not seen anyone else reporting on these issues outside of Russia. The first is the fact that Facebook has quite literally become a military weapon – and no, I am not talking about Russia’s use of fake news, fake advertisements or propaganda either. While yes, those were huge problems in their own right throughout 2015/2016, new developments as of 2018/2019 are far more troubling and grotesque. More specifically, I am talking about the US Governments use of Facebook as a means of waging so-called “Psychological Warfare” against our adversaries.

Learn More – Russia Bans Military Personnel from Using Social Media To Counter-Act US Sponsored Psych-Ops: https://roguemedia.co/2018/11/09/russia-bans-active-duty-military-personnel-from-sharing-on-social-media/

You may recall a 2017 statement by James Mattis in which he personally stated how, as a result of complacency and improper funding of the US Department of Defense (DoD) under the previous administration, the United States has now fallen behind the rest of the world in several realms of Warfare – such as cyberspace, ultimately allowing the US elections to be hacked in the first place. Regardless, in an effort to ‘catch back up with the rest of the world,’ not only has Trump begun heavily investing back in the US military industrial complex, but we as a nation have also begun experimenting with new, unconventional forms of Warfare. For the purposes of this particular article I would like to talk specifically about Psychological Warfare and our use of Psych-Ops, as well as how these operations can be and are already actively being carried out online – in some instances, exclusively through Facebook.

Read More – US Military Field Manual on Unconventional Warfare: https://roguemedia.co/wp-content/uploads/2019/03/US_Army_Field_Manual_Unconventional_Warfare_2008.pdf

If you were previously unaware, in November of 2018 the Kremlin signed a new piece of legislation into law officially banning all active duty military personnel from owning social media accounts or sharing across social platforms. This is because, at the time, according to the Kremlin itself, social platforms such as Facebook had begun being used to collect “analysis of the activities of the Russian military.” Explaining how “The data shared by the servicemen online is used to apply psychological and information pressure on Russia and its military as well as forming biased opinions on state policies of Russian authorities in society.” Not only this, but the US Government had also taken it a step further by using platforms like Facebook to wage psychological Warfare against Russian soldiers serving abroad in locations such as Syria and Africa.

For example, given that Facebook hosts its servers inside the United States, the US Government has started hijacking their platform in order to pretend to be friends or family members of Russian troops serving abroad. Not only does the US Government do this to organize psychological profiles on individual members of Russia’s military, but in some instances they also use Facebook accounts to cause Russian troops “distress” back home – by faking/fabricating conflicts, arguments or unfortunate circumstances with friends and family back in Russia.This was done to make Russian troops feel as though aspects of their lives were completely falling apart outside of their control back home, thus taking away pride/focus from their military efforts as they served abroad. It may have taken a few months to figure out, but the Kremlin did eventually catch on.

Despite however low down and “dirty” of a trick that is, this remains our current reality – at least under our new Commander In Chief Donald Trump as we continue to exploit American businesses internationally.

Twitter & Spying

I am proud to say that this last bit is exclusive to Rogue Media Labs, because it features research I have personally pieced together over recent months. They say that some of the worlds greatest discoveries were made by accident, and this last bit of news is no different.

The first bit of information I would like to share is something I have already shared a few months ago, which is the fact that Twitter is absolutely using their service to spy on its users. Not only can this be evidenced by the fact that every deleted Tweet attached to an owners account is secretly sent directly to Twitters internal servers, but also by the fact that I have personally caught the service recording one of my private messages with a famous hacker known as Nama Tikure. As previously reported, as I was physically typing it out on screen, a custom key logger built by yours truly accidentally caught Twitter bots clicking on my URL address literally 19 times in a 17 second time period. For some perspective on this, I never even pressed ‘enter’ onto the chat. Meaning that all of these clicks were recorded on my end, with all 19 IP Address ranges listed assigned exclusively to Twitter bots. In other words, I accidentally caught Twitter red hand trying to secretly record and log every last aspect of my private messages – and I am certain this isn’t or wasn’t an isolated incident.

Learn More- Twitter Caught Clandestinely Intercepting The Messages of Its Users: https://roguemedia.co/2019/01/15/twitter-bots-caught-clandestinely-logging-the-private-messages-of-their-users/

The second bit of research is something I accidentally discovered last night, completely unrelated to this article and also 100% accidentally. I could describe it in more detail, but this article is already long enough. So ironically, I instead direct you to the following Tweet…..

Wrapping Things Up

I’m almost embarrassed to admit it, but the whole reason I got riled up enough to write this article was the fact that, upon buying my computer, I was immediately offered 25 GB of free storage from DropBox. Sounds like an amazing deal – right? Who wouldn’t want to jump all over that – right? How generous and caring of a company Dropbox must be! Right?

Well, I’m sorry to 💩 on your parade, so to speak, but that just isn’t exactly the reality of the situation at hand here. I know it’s getting a bit redundant at this point, but the fact of the matter is that Dropbox is a subsidiary – an American subsidiary. Moreover, as the US Governments Supreme Court case with Microsoft proves, as an American company, the US Government has the right to any/all data owned by that company if the Government truly wants it.

See where I am going here? The reason why Dropbox is offering 25 GB of free space to anyone who wants it is so that ignorant sheeple, I mean citizens, will upload all of their data to it – so that the US Government can own all that data themselves. The worst part is the fact that Dropbox is subsidized to mislead you to do exactly this, which is also why they can afford to offer up some much free storage space to so many people for free. I know, yay Capitalism – right? 😏.

US Department of Defense Expans Up ‘Hack The Pentagon’ Initiative

WASHINGTON, DC — The Department of Defense announced today efforts to expand its successful ‘Hack the Pentagon’ crowdsourced security program. DOD awarded contracts to three private-sector Silicon Valley firms to boost the Department’s capacity to run bug bounties aimed at strengthening security for internal DOD assets.

Hack the Pentagon bug bounties are designed to identify and resolve security vulnerabilities across targeted DOD websites and assets and pay cash to highly vetted security researchers or ‘ethical hackers’ to discover and disclose bugs. DOD will continue to build out bug bounties for public-facing websites and pursue other crowdsourced security tactics.

As cyber threats persist, the Defense Department is working to identify innovative approaches to bolster security, combat malicious activities, and build trusted private sector partnerships to counter threats. Many of the nation’s largest technology firms and Fortune 500 companies use crowdsourced hacking programs as a low-cost tool to augment and strengthen the security and delivery of digital services.

Finding innovative ways to identify vulnerabilities and strengthen security has never been more important,” said Chris Lynch, Director of the Defense Digital Service. “When our adversaries carry out malicious attacks, they don’t hold back and aren’t afraid to be creative. Expanding our crowdsourced security work allows up to build a deeper bench of tech talent and bring more diverse perspectives to protect and defend our assets. We’re excited to see the program continue to grow and deliver value across the Department.

The Defense Department launched Hack the Pentagon in 2016 as the federal government’s first bug bounty program. Several months later, as part of the crowdsourced security initiative, DOD launched its Vulnerability Disclosure Policy, which provides a legal avenue for security researchers to find and disclosure vulnerabilities in any DOD public facing systems. The Hack the Pentagon program has since enabled DOD to identify and remedy thousands of security vulnerabilities.

New Private Sector Partnerships to Enhance Bug Bounties Targeting Internal Assets

In 2016, Hack the Pentagon established two contract vehicles that allow the department to run bug bounty assessments: one is aimed at public-facing web sites and applications, while the other focuses on more sensitive, internal systems. The contract awards announced today will expand the program scope and capacity for bounties targeting private DOD assets which include the tailored and bespoke products and systems for meeting defense mission needs.

The private sector partnerships will allow DOD to leverage the collective hacking communities and platforms of three Silicon Valley crowdsourced security firms: Bugcrowd, HackerOne and Synack. Including the three firms on the new contract enables the Department to tap into a wide variety of expertise and technical specialization as security assessments scale in type and complexity. The contract will enable vetted hackers to simulate real and insider threats to certain systems, bringing in valuable new security perspectives to emulate combat adversaries and mitigate risk.

New features of the enhanced program will enable DOD components to run continuous, year-long assessments of high-value assets. Through this model, DOD can maintain an open dialogue with vetted hacker participants throughout the development life cycle of a system, which is particularly valuable as software and other assets are regularly updated. The expanded program will also allow the DOD to run assessments on broader range of assets such as hardware and physical systems.

Hack the Pentagon

Hack the Pentagon is spearheaded by the Defense Digital Service (DDS), a DOD team charged with bringing in private sector talent and best practices to transform the way the Department approaches technology. Through Hack the Pentagon, DDS works with DOD components and external government agencies to advise on bug bounties, crowdsourced security, vulnerability disclosure policies, and private sector best practices and approaches.

Since the launch of the crowdsourced security program, thousands of talented ethical hackers have engaged with the DOD, and more than 8,000 valid vulnerabilities have been reported.

Promoting Crowdsourced Digital Defense 

DOD’s Cyber Strategy emphasizes the importance of identifying crowdsourcing opportunities to identify and mitigate vulnerabilities more effectively: The Department will continue to identify crowdsourcing opportunities, such as hack-a-thons and bug-bounties, in order to identify and mitigate vulnerabilities more effectively and to foster innovation.

In addition to expanding and enhancing DOD’s private bug bounties, the DDS is working to bring the benefits of crowdsourced security approaches across the DOD and build on the success of Hack the Pentagon as a valuable tool for enhancing security.

DDS has promoted a strong dialogue among ethical hackers, the security researcher community, and cyber experts across the DOD to exchange ideas, share perspectives and security approaches, and identify new training opportunities for military cyber talent. DDS has also begun to focus recruitment efforts toward the security research community with the aim of bringing in technical talent with unique security perspectives.

DDS continues to serve as a resource to other government agencies tasked with developing and launching their own disclosure policies and bug bounty programs. DOD agencies, services or other interested parties can send contract inquiries to hackthepentagon@dds.mil.


The article was originally published by the US Department of Defense on October 24th 2018. It was republished, with permission, in accordance with the Terms & Conditions of defense.gov | Formatting edits and Tweets added by Rogue Media Labs