InfiniteEyes News

  • Home
  • InfiniteEyes News

InfiniteEyes News Information Arm of InfiniteEyes Collective. Journalists, cypherpunks, researchers, Bitcoin miners, o

——infiniteeyesnews.substack.com/InfiniteEyes wouldn’t be InfiniteEyes without attempting to get the ten thousand foot vi...
09/01/2025

——infiniteeyesnews.substack.com/

InfiniteEyes wouldn’t be InfiniteEyes without attempting to get the ten thousand foot view, not to mention the two million foot view of low-earth orbit. It’s good to know what’s in your skies. Last night, July 6 at approximately 11:30 PM, a Russian GLONASS-M series satellite flew directly over Los Angeles. As Canadian fire-bombers assist Californian firefighting efforts against a wildfire that is still less than 10% contained at the point of writing, costing Californians an estimated dozens of billions of dollars, after only a few days of burn. All eyes are on LA, including the short predecessor to the next-generation GLONASS-K satellite classification used by the Russian military. So the story goes, in 1963 an R&D project on the first Soviet low-orbit “Cicada” system was developed. In 1967 the first navigation Soviet satellite “Cosmos-192” was launched. The navigation satellite provided continuous radio navigation signal transmission on 150 and 400 MHz during its active lifetime. It now broadcasts on restricted and unrestricted frequencies.
The “Cicada” space navigation system (and its “Cicada-M” modernization) was designed for navigation support of military users and had been in use since 1976. In 2008 “Cicada” and “Cicada-M” users started to use GLONASS system and the operation of those systems was allegedly halted.
“Nowadays there is an increasingly broad range of GNSS technologies applications”, according to displayed information at glonass-iac.ru. These include “defense, security, and economic prosperity”.
This system has also been internationally integrated and also provides an alternative to Global Positioning System (GPS) , being the second comparable navigational system in operation with global coverage.

——/1

——/ A short Christmas Eve post before a few goodies next week. A new expose on Serbian authorities using no-click (0day)...
24/12/2024

——/ A short Christmas Eve post before a few goodies next week. A new expose on Serbian authorities using no-click (0day) spyware against journalists and activists, by a company with ties to IDF’s Unit 8200 and used to stifle dissent in South America. Happy holidays to all my followers, thank you for joining this project on its journey. -z

——infiniteeyesnews.substack.com——

UVB-76, also known as “The Buzzer,” is a shortwave radio station that has been broadcasting continuously since the 1970s. Located in Russia, it transmits a unique signal consisting of a repetitive buzzing sound, approximately 25 tones per minute, 24 hours a day. The signal is often interrupted by occasional voice transmissions in Russian.

UVB-76 was quite active in the lead-up to Russia’s February 24, 2022 invasion of Ukraine. Komsomolskaya Pravda reported that it broadcast messages throughout January and February, with
“a particularly large number of codes” sent in the days just before the start of the full-scale war. On February 22, the words
“nyukhostikh” and “neuderzhimy”
(unstoppable) were transmitted, while on February 23, messages included
“muzhoshchelk,” “chaykhana” (teahouse), and “shikonast.” On the day the invasion began, however, the station transmitted no messages at all.

Now, you will hear the “nyukhostikh” and “neuderzhimy” sequences again, at increasing frequency between December 16 - 24.
Some theories suggest that UVB-76 is a key component of the “Dead Hand” system, serving as a central node for transmitting attack orders to nuclear missiles and submarines. This theory posits that the station’s broadcasts are part of a fail-safe mechanism, designed to trigger a nuclear response in the event of a catastrophic event, such as a nuclear attack on the Kremlin.

Other theories about UVB-76’s purpose include:
    •    A numbers station, transmitting coded messages to Russian spies.
    •    A testing ground for new communication technologies.
    •    A backup system for Russian military communications.
    •    A psychological warfare tool, broadcasting disinformation to NATO forces.

——/1

For sources and full narrative matrix analysis, visit InfiniteEyesNews.substack.com——Narratives were a powerful force in...
15/11/2024

For sources and full narrative matrix analysis, visit InfiniteEyesNews.substack.com
——
Narratives were a powerful force in shaping the 2024 U.S. election. Key narratives emerged across social media, traditional media, and AI-powered platforms, each working to influence voter perceptions. This is the first time we have seen narrative control play such a pivotal in the US election, to the point of nearing presidential assassinations. We are seeing how the information we ingest is influencing us deeper, on conscious and subconscious levels, using simple methods of plot devices, sentiment analysis, information asymmetry, and the Goebbel’s Big Lie, also known as the gift that keeps on giving. As hacktivist groups that love to take advantage of the US election to conduct hack & leak or website defacement campaigns for publicity, these largely took to the bench while state actors and corporate entities ran the playing field. Individuals have reacted in irrational, unpredictable, and even dangerous ways as a result. We will be exploring DARPa’s SemaFor, INCAS, and Narrative Network programs and their role in mass information dispersion and dissection. We will also discuss how neuroethics is more necessary, yet less discussed, than ever.
Neuroethics discusses jurisdiction and monitoring ability of the human brain, focusing on ethics of cognitive monitoring, cognitive enhancement, and cognitive liberty. In the past, mental privacy could be taken for granted: the first-person accessibility of the contents of consciousness ensured that the contents of one’s mind remained hidden to the outside world, until and unless they were voluntarily disclosed. Now, they are being disclosed regardless.
——/1

———InfiniteEyesNews.substack.comThe US government has faced numerous cyberattacks in recent years, compromising national...
18/10/2024

———InfiniteEyesNews.substack.com

The US government has faced numerous cyberattacks in recent years, compromising national security and sensitive information. What are first attributed to entire nation states and advanced persistent threat actors have now been attributed to lone individuals that have compromised US critical infrastructure, military, and intelligence entities such as the FBI, US CENTCOM, SOCOM, STRATCOM, and contractors such as Lockheed Martin. Anonymous Sudan is a “hacktivist group” of two individuals believed to be based in Sudan, emerging in 2020. This week, US Department of Justice has indicted two Sudanese nationals for their alleged involvement in the notorious hacktivist group, Anonymous Sudan. The group is known for its devastating cyberattacks on hospitals, government facilities, and other critical infrastructure.
The group has claimed responsibility for breaching:
US Federal Emergency Management Agency (FEMA) systems, National Institutes of Health (NIH) databases , US Department of Agriculture (USDA) networks. The FBI, the State Department, Cedars-Sinai Medical Center in Los Angeles, and government websites for the state of Alabama also made the list.  Tech victims also included Microsoft Corp. and Riot Games Inc., along with network service providers. The attacks resulted in reported network outages affecting thousands of customers.
Anonymous Sudan’s DCAT tool (allegedly repurposed open-source tools), “Godzilla,” “Skynet,” and “InfraShutdown,” were also seized. The individuals implicated Ahmed Salah Yousif Omer, 22, and Alaa Salah Yusuuf Omer, 27, Sudanese nationals both charged with one count of conspiracy to damage protected computers. Ahmed Salah is also charged with three counts of damaging protected computers.
——/1

Western nations, through international institutions like the United Nations and the World Bank, have long sought to shap...
03/10/2024

Western nations, through international institutions like the United Nations and the World Bank, have long sought to shape Africa’s development trajectory. These organizations are key pillars of Western soft power, promoting governance reforms, sustainable development, and humanitarian aid. The West’s approach usually hinges on institutional capacity building, human rights promotion, and democratic norms. This has led to significant funding for health, education, and digital initiatives along with financial restructuring through IMF & the World Bank, using soft power when possible, and hard power when necessary.
UN (specifically UNECA- the United Nations Economic Commission for Africa) & the World Bank are essential entities to countries that would benefit greatly from a more transparent and decentralized digital infrastructure. Centralization has led to ideas like a “Good Digital ID Framework” (UNECA) and biometric surveillance targeting refugees and individuals in crisis. The geopolitical motive underlying these projects is the maintenance of a liberal international order. Africa, as a rising demographic and economic force, is increasingly vital to countering BRICS, and Chinese Belt & Road interests. By investing in digital infrastructure and governance reforms, the West hopes to create stable, democratic allies that are more integrated into global trade and less susceptible to Chinese & Russian influence. While lack of civil databases in some countries create ordeals for citizens looking for services, plans to implement them have been plagued by secret deals, shell companies, and diverted funds to certain VIPs. Meanwhile, the Chinese Communist Party has its own plans, using the lemons of multiple coups in multiple Western African nations for their own lemonade.
A $126 million deal with Huawei has given Uganda the capacity to deploy facial and number plate recognition technology, as well as AI capabilities. Sensitive personal data, required to register a SIM card or make a bank transaction, can be accessed at will by state actors with no due process.
——
View full sources from UNECA, Lighthouse Reports, Biometric Update, and more at infiniteeyesnews.substack.com

Address


Alerts

Be the first to know and let us send you an email when InfiniteEyes News posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to InfiniteEyes News:

Videos

Shortcuts

  • Address
  • Alerts
  • Contact The Business
  • Videos
  • Claim ownership or report listing
  • Want your business to be the top-listed Media Company?

Share