> Yellowstone END
Showing posts with label espionage. Show all posts
Showing posts with label espionage. Show all posts

Tuesday, 5 August 2025

Mossad is no longer just for men: for the first time, Israeli intelligence is openly looking for women to serve

Imagine this: an elite spy agency, known for its top secrecy, publishes advertisements on social networks, websites, and even universities. This is not a new blockbuster scenario — it's a reality. For the first time in its history, Mossad, the legendary Israeli foreign intelligence service, is launching a public campaign to recruit women into the national service. And this is a huge breakthrough for an organization that has preferred to remain in the shadows for decades.

Previously, the Mossad only knew about the national service program by hearsay. It existed for more than 20 years, but it worked quietly: several talented girls were selected every year, not knowing exactly where they were going. It was like in a spy movie — a call, a secret meeting, logic tests, stress tolerance, and, of course, a polygraph. No ads, no open vacancies.

But now everything is changing. The Mossad is officially opening its doors — and it's doing it in a big way. The goal is to attract more young women from different backgrounds so that they can take on practical roles in a variety of fields, from cyber intelligence and data analysis to field operations and technology projects.

Why now? The answer is simple: the world has changed, and so has intelligence. Modern challenges — cyber attacks, disinformation, and complex international networks — require not only strength, but also flexibility, creativity, and a different perspective on the problem. And women, as practice shows, are often better at analyzing, communicating, and working under stressful conditions. "We realized that talent is not a matter of gender, but a matter of potential," the agency said, without naming specific names.

What started as a small pilot project with a couple dozen participants per year has now turned into a large-scale program involving hundreds of girls. They undergo intensive training, work in multidisciplinary teams, and participate in real—world operations - albeit not always with guns in their hands. Someone is hacking into servers, someone is analyzing satellite images, someone is conducting surveillance in Europe under cover.

It is also interesting that the Mossad is now actively looking for candidates in universities, technology parks and startup centers. They are looking not only for those who want to be "Agent 007", but also for programmers, mathematicians, psychologists, and translators. The main thing is intelligence, discipline and dedication to the country.

This step is not just a personnel initiative. It is a symbol of change in one of the most closed organizations in the world. The Mossad recognizes that in order to stay one step ahead of its enemies, it is necessary to use the full potential of society. Even if this potential is in a woman who never thought that she would be scouted.

Of course, serving in the Mossad is not a 9-to-5 job. These are years of secrecy, stress, moral dilemmas, and risk. But for many girls, this is a chance to make a real contribution to the security of the country, undergo unique training and become a part of something bigger.

Thailand is on alert: the military has discovered spy drones over strategic facilities — who is behind this?

The Royal Thai Air Force (RTAF) said it has recently recorded mass flights of reconnaissance drones over military bases, government buildings and other important facilities across the country. We are talking about several key regions, including the capital Bangkok, the southern provinces and the border areas. According to the Air Force, these drones are clearly not just being used for amateur photography — they are conducting targeted reconnaissance.

The Thai military has already called what is happening a "serious threat to national security." Experts suggest that drones can be equipped with high-precision optics, thermal imagers and even means of intercepting radio signals. The goal is to collect data on the location of troops, air defense systems, patrol routes and the mode of operation of critical infrastructure.

What is especially disturbing is that drones appear in the sky at night, often near objects that are closed to outsiders. Some of them were seen at an altitude of up to 3 km, which indicates the professional training of operators and the use of military or semi-professional equipment rather than amateur equipment.

In response to the threat, the RTAF command issued clear instructions: all military units and national security services are allowed to use signal suppression systems, drone locators, and even physical interception devices such as lasers or interceptor drones. If the drone does not respond to warnings, it may be shot down or disabled.

The Thai government emphasizes that any use of drones near prohibited areas without permission will now be regarded as a potential act of espionage. And this is a criminal offense with extremely severe consequences. Under current Thai law, charges of espionage can result in life imprisonment. In particularly serious cases, especially if a threat to the sovereignty of the country is proven, even the death penalty is possible.

The countries or organizations behind these flights have not yet been officially named, but there are rumors in military circles about the possible involvement of foreign intelligence services. Some experts point to an increase in activity in this region on the part of States interested in the military and political situation in Southeast Asia.

Meanwhile, the authorities urge citizens to be vigilant: if you notice a suspicious drone, especially at night or near military installations, immediately inform the police or the Air Force hotline. Any attempts to take videos or photographs of such drones can also be perceived as suspicious activity.

The situation remains tense. Thailand, traditionally known as a stable country in the region, is now facing new challenges — in the era of drones and digital espionage, even the skies are no longer considered safe.

Wednesday, 23 July 2025

Chinese spy in the United States pleads guilty: Stole blueprints for super-secret missile sensors

A major scandal in the world of high technology and national security: a citizen of the United States and China, Chengguan Gong (59 years old), officially pleaded guilty to espionage in favor of China. In fact, he stole what is worth billions — the smart brains of the American missile defense system.

That's how it was. Gong worked as an engineer for some secret scientific company in Los Angeles (the name is not called, but it is clear that it is serious). And last year, he simply collected more than 3,600 files — an entire digital library of secrets — and transferred them to his personal flash drives and external drives. And these are not just any notes: the files were clearly marked as strictly confidential, and their total value is estimated at hundreds of millions of dollars.

What exactly did he steal? The most advanced developments in infrared sensors that protect the United States:

* Missile detection systems in space — these sensors should capture the very moment of launching nuclear missiles and track their flight, including ultrafast hypersonic ones.

* Aircraft protection systems — sensors that sense when heat—seeking missiles are aimed at a military aircraft (the ones that "see" the engine heat), and allow you to turn on protection - for example, to launch a false target or suppress the missile signal.

* The development of the "next generation" — technologies that will be able to detect even very  inconspicuous targets  that previously could have escaped the radar.

* Mounting and cooling designs — even how these super-sensitive sensors are physically installed and cooled also ended up in the package.

All this stuff was found at Goon's house in Southern California. The US Department of Justice emphasizes that it acted to help China develop its own military technology. This is not just a theft of intellectual property, it is a direct interference in the strategic defense power of the United States. The trial continues, and such a confession of guilt is usually followed by a serious sentence. History is a classic example of how one person with access to secrets can cause enormous damage.

Wednesday, 9 July 2025

Israel stops the supply of Chinese BYD electric vehicles due to suspected espionage

 

Vehicle object detection system


The Israeli Ministry of Defense has officially suspended the supply of Chinese BYD electric vehicles to officers of the country's Defense Army. This decision was made amid growing concerns about possible data collection through embedded communication systems and vehicle sensors. Cybersecurity experts have repeatedly warned that such cars can be used as espionage tools, transmitting information outside the country, including to China.

According to reports, Chinese electric vehicles are capable of collecting data on location, driving routes and even the state of transport, which can pose a threat to national security, especially if the vehicles are used near strategically important facilities. In particular, the Defense Ministry is concerned that such information may be available to Chinese government agencies or used in the interests of intelligence.

Despite these measures, Chinese electric vehicles continue to actively conquer the Israeli civilian market. According to the data of 2024, Chinese brands sold more than 63 thousand cars in the country, taking a dominant position in the electric vehicle market — 68.69% of the total volume. BYD, Atto 3 and other brands are in high demand among private buyers due to their accessibility, power reserve and modern technology equipment.

Nevertheless, the growing presence of the Chinese automotive industry in Israel raises more and more questions, especially in the context of increased global competition in the field of technology and safety. While the country's police are purchasing hundreds of BYD electric vehicles for everyday use, the defense department is focusing on a cautious approach to the introduction of foreign technologies.

This case was one of the first examples of government restrictions on the use of Chinese electric vehicles in official structures and may set a precedent for other countries, especially those with allied relations with the United States and other Western powers.

Friday, 27 June 2025

The UK has launched a large-scale operation to find an alleged Russian double agent in MI6

British intelligence has launched one of the most sensitive and lengthy operations in its history, Operation Bucket, aimed at finding an alleged Russian double agent in the MI6 foreign intelligence service. The operation lasted for about 20 years and involved MI5 employees around the world, which indicates the seriousness of concerns about the possible penetration of a "mole" at a high level.

Suspicions about a high-ranking MI6 officer arose amid fears that the situation could repeat one of the most notorious scandals of the Cold War — the case of Kim Philby, who worked for Soviet intelligence for many years. A special group of 35 MI5 officers was involved in the investigation, which is engaged in surveillance, information gathering and coordination of actions around the world.

The history of British intelligence knows many examples of double agents, among which Viktor Bogomolets stands out, a Soviet spy who for 30 years passed secrets of MI6 to Moscow. His activities remained undisclosed for a long time, and the scale of the betrayal turned out to be significant. Another famous example is the Cambridge Five, including Kim Philby, who have become a symbol of treason in the British intelligence services.

Despite many years of efforts, Operation Bucket has not yet yielded definitive results. However, the scale and duration of the investigation indicate that British intelligence takes the threat of double agent infiltration very seriously and is ready to use significant resources to neutralize it.

Detecting and eliminating the "mole" in MI6 is key to maintaining trust between allies and ensuring the security of national interests. In the context of modern geopolitical challenges and increased intelligence activity on the part of Russia, such investigations are becoming priorities for the British intelligence services.

Featured Post

The expected escalation of the conflict in Ukraine: Europe is strengthening its military presence, Russia is preparing retaliatory measures and an analysis of the situation as a whole

The situation around the conflict in Ukraine is expected to significantly escalate in the next 5-12 days, according to intelligence reports ...

⥥ Help the author-

- the choice is yours ⥣

The author's blog

realm

Kir Dykoff

Author

News, forecasting and analysis of the geopolitical situation in the world

Books by the author

Contact the author

Archive

Search This Blog

Labels

USA China NATO Ukraine Israel drones Russia Iran UFO Trump US Navy contract Intelligence France Lockheed Martin United States drone Germany electronic warfare South Korea Military Technology Turkey US Air Force UAV Pentagon Defense Europe Japan Putin Zelensky Syria Great Britain Middle East conflict F-35 Testing India Ministry of Defense North Korea AI Donald Trump United Kingdom BAE Systems Rheinmetall Tests UFOs Boeing Indo-Pacific Region Sweden UK Yellowstone nuclear weapons weapons California Ukrainian Armed Forces F-16 General Atomics NORWAY US U.S. Army tanks Australia British Army Spain Airstrikes Bundeswehr EU Sabotage South China Sea THAAD UAVs US Department of Defense Yellowstone supervolcano hypersonic missiles Arctic CANADA Kiev Satellite images UAP laser weapons military Analysis F-35B military cooperation DARPA EVACUATION started Hypersonic Weapons Incident Kursk Region Red Sea Romania U.S. Air Force army autonomous systems Baltic Sea Control Egypt Greece Italy KNDS Saudi Arabia Trump Administration weapon Airbus Black Sea Combat Operations Denmark FPV drones General Dynamics Los Angeles Pacific Ocean Patriot ASELSAN Alaska Armed Forces B-21 Raider Elon Musk F-35A FPV Finland Ground Forces Hamas Istanbul Thales U.S. Navy US Space Force Apocalyptic seismic Asia-Pacific region Assad CIA Gaza Strip Helicopters Hezbollah Hypersonic Missile Mexico NASA Philippines Sikorsky Support combat aircraft combat drones medium strategy Brazil British Ministry of Defense Chile Chinese Defense Budget Gaza Iron Dome Military Modernization Norinco helicopter nuclear submarine warship "Oreshnik" AUKUS Bunker Communications French Air Force Israel Defense Forces MI6 Ministry of Defense of the Russian Federation Moscow Police Program Shooting Su-57 White House anti-drone systems bunkers fires military strategy missile defense system nuclear nuclear power plants test Antarctica Area 51 Black Hawk Bomber Crash French army Inauguration Kursk Protests Starlink World War II X-37B mystery Advanced Technology Algeria Ankara Anti-Drone System Biden DeepSeek Earthquake East China Sea England European Union F-22 Raptor FBI Guam Hivemind Hypersonic Israeli Navy JMSDF Lebanon London MATRIX New York P-8 Poseidon Project Secret Turkish UH-60 Black Hawk USS Harry S. Truman Ukrainian conflict Vatican War in Ukraine Washington hackers mysterious drones terrorist attack tested Apocalypse Arrest Bradley British Armed Forces British Navy Bryansk region Conclave Denver Erdogan European defense F-15 General Dynamics Electric Boat IISS Macron Microsoft Moon NORAD North Sea Pacific region Partnership Portugal Quantum Systems Robots San Andreas Submarine Fleet Symbol TRIDENT Tulsi Gabbard U.S. Marine Corps UAP / UFO USAID Ukrainian Army Ukrainian Forces Ukrainian crisis United States Space Force anti-tank weapons bombs fleet military aircraft nuclear strike plane crash plans problems special operations forces unidentified objects Air Power America Armageddon Arrow 3 Autonomous Submarine B-52 bombers Bitcoin British weapons Cape Canaveral Car Civil War Collision Congress Cuba Elohim F-18 F-35I Forecast for 2025 Future GHOST Game German Armed Forces German Ministry of Defense German company Google Hungary Iranian Army Israeli Drones Israeli-Palestinian conflict Joe Biden John F. Kennedy KNDS Germany Killing Las Vegas Leclerc XLR Libya Long Valley Mysterious Nazi Germany New York City New Zealand Polish Ministry of National Defense Russian Oil Russian forces S-97 Raider South Korean Air Force Space Force Stealth Aircraft Stryker Turkish army U.S. U.S. intelligence U.S. military US Armed Forces US Navy ship US military base US military bases USSR Volodymyr Zelensky Werner von Braun World War III Yuzhmash accident aerospace forces anti-submarine aircraft assassinations attacks contacts crashed demilitarization detonate firefighters gas pipeline global conflicts modernization program modernizing nuclear aircraft carrier pilot plane special military operation suicide drone unidentified drones unmanned helicopter "chemical fog" "five eyes" 11 books 72 hours AI Tool AI singularity AI-Powered ASSN Aga Khan Air Force Bomber Fleet Air Force Viper fleet Airport in Las Vegas Al system Al-Qaeda Alibaba Alien Alien Creatures Alien Technology American aircraft carrier American corporations American intelligence agencies American military bases Analysis and Prospects Anti-Aircraft Defense Anti-Submarine Defense Feature Apache Helicopters Apocalyptic map Arache Assassination Documents Assassination Files Atak helicopter B-1B Lancer bombers B-52H Stratofortress Battlefield is Earth Baykar Technologies Bayraktar TB2T-AI Black Death Black Hawk Helicopter Blekinge-class submarine Boeing 737 Boeing 767 British Royal Mint British intelligence officers British weapons systems CETUS Cable Break Chaos in Syria Chinese Army Chinese People's Liberation Army (PLA) Naval Forces Chinese Scientists Chinese cyberwar plan Chinese hacking Chinese military Chinese space station Chinese state Commercial Vessel Cyberlux Corporation Czech Tatra Defense Vehicle Drone Ship Dutch Air Force Eagle Earl Naval Weapons Base Earth's rotation East Asia Economic Transformation Electric Electromagnetic Wars Enigma Labs European country European leaders European nations European war Evacuations F-16C Viper F-18 Hornet FEMA FRP Fairford Air Base Financial support Fire Department Five Eyes Flying Discs Framework Documents Freedom of Navigation Operations (FONOP) French company Friendly Fire Future Fast Interceptors Gabriel 5 Galaxy Gas Attack Gaza Conflict Genasys Inc. General Atomics Aeronautical Systems General Dynamics Land Systems (GDLS) Generation Z George W. Bush Gerald R. Ford Class Nuclear Aircraft Carriers Gerald R. Ford class German Defense Ministry Ghost UAS Global Hawk Greek Ministry of National Defense Groom Lake Guantanamo Guaranteed destruction HELP Hamas or Hezbollah Hillary Clinton Hollywood Hostage Crisis Hypersonic Milestone Hysteria IDEX Innovations Invasion Ireland Islamic Revolutionary Guard Corps (IRGC) Israeli Defense Forces Israeli Military Israeli company Israeli forces Italian Army J. D. Vance JFK Janet KF-16 KNDS-France Kabbalah fleet Kimbаl Musk King Charles Kursk area LOWUS Leopard 2A7HU Luxury Properties Masonic symbols Meteor Military Satellite System Missile Base Moroccan Army Morocco Mystery Drones Nanotechnology Naval Strikes Nazi Collaborators Nevada Desert New World Order Next Generation Air Dominance (NGAD) Nuclear Detonation Nuclear Winter Obama Orange Flag Order of Assassins Orders Oumuamua Oval Office Panic Pope Francis Pratt & Whitney Military Engines Prospects for 2025 Protecting Psyonix RFK ROMAN STYLE Reagan Airport Rheinmetall Electronics GmbH Risk of Escalation Robert Dean Robert F. Kennedy Rospotrebnadzor Royal Navy's Coastal Force Royal Swedish Navy Russia's military intelligence Russian Defense Ministry Russian Ministry of Defense Russian base Russian military base Russian military campaigns Russian naval base Russian nuclear weapons Russian propaganda Secret Operations Secret Space Program September 11 terrorist attack Sergei Lavrov Shoot Down Shot Dead Sixth-Generation Soviet Stalin Star Wars Stealth Submarines Stratofortress aircraft Stryker AFV Swedish Army Switchblade Systems Symbolic Syrian conflict T-90MS TRIDENT Drill Tank Defense Systems Taurus KEPD-350 missile Terrorist Attacks The F-35 fighters The Geopolitical Standoff The Kellogg Plan Thunderforge project Top Secret Intelligence Trump's Inauguratio Tu-95 Tucker Carlson Turkish Aerospace Industries (TAI) Turkish aircraft U-2 U. S. Navy U.S. Administration U.S. Capitol U.S. DoD U.S. House of Representatives U.S. Marine Corps.Japan U.S. Navy and Army U.S. Space Force U.S. Technology U.S. military bases U.S. naval air base U.S.-Ukraine UFO " SPHERE " UK MoD US Air Force Base US Army' US Army's exercises US Cybersecurity US Department of Defense Funds US Marines US Navy missile cruiser USS Gettysburg US Nuclear Arsenal Protection US President US Ramstein Air Base US Secretary of Defense US Secretary of State US Special Operations Command US-Japan alliance US-UK Strategic Collaboration USAID-sponsored USS Fitzgerald destroyer USS Harry S. Truman (CVN-75) Ukraine War Ukraine as Poland in 1939 Ukraine conflict Ukrainian President Ukrainian generals Ukrainian units Under Obama Administration United Kingdom-led Expeditionary Force United States Agency for International Development United States Navy United States and Russia Universal Flight System Unmanned combat aerial vehicle (UCAV) Vance Virginia-class Voice Control of Drones Washington State Western Europe Western intelligence Western intelligence services Yellowstone Caldera Yellowstone's volcanic Zhirinovsky airport in Houston aliens aliens to visit artificial intelligence system artillery detection blue ray carrier chip cooperate democratic globalists electromagnetic attacks escalated escalations evil aliens falsification fighter drones fleet of Humanity fleet of the Ellohim future of Ukraine genocide geopolitical trap global global challenges global effect global interest heavy aerial bombs heavy tactical jets hypersonic tests hypersonic weapon system incidents intelligence cooperation intelligence services intensified security invasion of Iraq investing jihadists laser anti-drone weapon laser technology laser weapon systems (LWS) lethal weapons liberation long-range radar detection aircraft luxury bunker massive strike mystical aircraft new drones new laser technology new weapons nuclear aircraft carriers nuclear attack nuclear crisis nuclear threats nuclear weapons control objects occupation of the Earth paradigm plane crashed planet planet Mufasail platforms red lines revolutionary technology robotics industry satellite photos secret materials sixth-generation fighter jets submarine of the Royal Navy symbolism telepathy terrorist thermobaric weapons top-secret status ultimatum underground reactor unidentified aerial phenomena unidentified aircraft unidentified drone unmanned robots unmanned stealth fighter weapons and unmanned systems

News of the hour

BREAKING NEWS

Find out your Arcana

Gematria Calculator

CALCULATE

News subscription