Intelligence

Pierluigi Paganini January 30, 2012
Social Media, exercise or not exercise the control

Exercise or not exercise the control, that is the question that divides major governments on the social networks surveillance and social media, at the center of heated debates. Always consider myself an avid supporter of freedom of expression and free access to the network, but what I want to do in this post is to […]

Pierluigi Paganini January 27, 2012
Cyber ​​chess, a game just begun

So far this year we have witnessed an escalation of attacks against those who are considered the major superpowers on cyber warfare, U.S. and Israel. Real motivated attacks in cyberspace capable of paralyzing the critical services of the target countries and after this offensive is lawful expect a reply first under warfare matter and of […]

Pierluigi Paganini January 25, 2012
MASINT discipline & critical infrastructures

Every intelligence discipline is used to acquire information concerning specifc subjects, the common categories of these methodologies include human intelligence (HUMINT), signals intelligence (SIGINT), imagery intelligence (IMINT), measurement and signatures intelligence (MASINT), and open source intelligence (OSINT) and Geospatial Intelligence. Each disciplines is used by governments to collect data on their adversaries and competitors. Similar […]

Pierluigi Paganini January 14, 2012
Sykipot attacks U.S PKI infrastructures based on smart cards

In these hours on the web is turning the news of a cyber attack performed by a group of Chinese hackers against some U.S. Government Agencies. Once again, the weapon used against the strategic objectives is a cyber weapon, in particular it has been used a new version of the trojan Sykipot. Chinese hackers have […]

Pierluigi Paganini January 10, 2012
North Korea, why too many see it as a cyber threat?

In the recent years we have seen increasing attention from governments in the presidium of the cyber space. The concept of cyber warfare has become reality with the materialization of new threats that can strike unpredictably with a real destructive power like conventional weapons. In a period of radical changes are narrow new alliances and […]

Pierluigi Paganini January 09, 2012
Rim, Nokia and Apple. Monitoring, interferences and violated privacy

What I want to discuss today is the interference of governments in what should be the private business and what are the consequences of an attitude so invasive. The news of this hour is that Nokia, RIM and Apple have provided to the Indian government, particularly its militia, a backdoor that provides the ability to control […]

Pierluigi Paganini January 08, 2012
“Cyber China” From Operation Aurora to China Cyber attacks Syndrome

Cyber China is considered the most active persistent collector of Western intelligence and intellectual property, is it a syndrome or China represents a real threat? When we think of China in relation to cyber warfare, we imagine an army of hackers hired by the government in a computer room ready to successfully attack any potential target. China […]

Pierluigi Paganini January 06, 2012
The nightmare backdoor , reflections on the case Huawei

Just at this time I came across an interesting discussion proposed by a colleague on the possible presence of a backdoor in the devices of Huawei company. The news in itself is terrifying, even if it is discussed for years. The presence of a backdoor once again raises the issue of qualification of the hardware, […]

Pierluigi Paganini January 04, 2012
Why the use of a cyber weapon has proved a winner?

In recent months one of the topics of greatest interest in the international scientific community has been the development of new cyber weapons to use against hostile countries. What dominates, without any doubt, was the use of viruses and other malware to attack critical infrastructure of the opponents. The Stuxnet case did school, for sure […]

Pierluigi Paganini January 03, 2012
The strategic importance of censorship in search engines

Every day, billions of people making an unimaginable number of searches through search engines. Complex algorithms seek to recover in the shortest possible time and with greater sorrowfulness the requested information. We may venture that a good 80% of Internet users interact with the web through these powerful applications. But the engines are much more, […]