IT

The Developer Behind Latest Augmented Reality Craze

A company with a questionable pedigree, sporting the next step in technology already used to destabilize and destroy countries, has wrapped its latest creation in decidedly disarming cartoon characters. July 18, 2016 (Tony Cartalucci - LD) - Pokemon Go, a location-based interactive augmented reality (AR) game, has been portrayed as a triumph for video game giant Nintendo. However, it is not entirely Nintendo's doing.

Information Warfare is not "Optional"

Nations without information warfare capabilities in the 21st century are like nations without armies and navies in the 20th century. They are defenseless. May 29, 2016 (Ulson Gunnar - NEO) - Imagine a nation without an army, a navy or an air force. What would its prospects be of defending itself against even moderate aggression? What if it had an army, even a formidable one, but was missing an air force and/or navy?

The Lingering Danger of Google & Facebook

How two tech-giants helped destabilize the entire MENA region, and how they are far from finished.April 30, 2016 (Ulson Gunnar - NEO) - During the 2011 Arab Spring, it was clear to those who bothered to look, that the US State Department and the various arms of soft power attached to it were directly responsible for what was otherwise initially passed off as a spontaneous, region-wide uprising.

The Information War on a Whole New Level: Space

April 12, 2015 (Ulson Gunnar - NEO) - The information war can be quickly lost if one cannot get their assets onto the "battlefield." For the US, UK or Europe, the constant din of their propaganda spread across the planet via their impressive and immense media networks has recently run into a few snags.In nations like Russia, China or Iran, ruling gove

IT Independence is National Security

March 29, 2015 (Ulson Gunnar - NEO) - The NSA's "Equation Group" is apparently behind the infection with malware of hard drive firmware on computers used by nations considered "enemies" by the United State. The installation of the malware is believed to have required access to trade secrets of IT manufacturers as well as physical access to the soon-to-be infected computers.

How Many of These Secret Surveillance Programs Do you Know About?

US Social Surveillance Abuse Puts Civil Liberties in Jeopardy. January 4, 2015 (Vladimir Platov -NEO) - According to various publications in the American and foreign media, the United States has created a global system of cyber espionage that allows the interception and processing of personal data around the globe in violation of fundamental human right