In a few days we have heard of a couple of satellite attacks by hackers meanwhile surfing on the web I came across more than one occasion in satellite photos reporting strange structures that we asked the real intended use. The successful attacks occurred in 2007 and 2008. The more serious of the two happened […]
““If you open the window for fresh air, you have to expect some flies to blow in” this is the Deng Xiaoping’s phrase, which summarizes the essence of the “Golden Shield Project” also Known as the “Great Firewall of China”. The project is related to the development of the most efficient system of censorship and surveillance in the world of the People’sRepublic of China. The project was started in 1998 and officially began in 2003 driven by the government to operate the control of […]
In recent years social networks have succeeded in the historic feat of bringing to the web a growing number of users. Jupiter users, the elderly, individuals and businesses all within the large network, many, too much, share the total awareness of what happens when they put their credentials or when attracted by a novice or by a video click on a link. Or this behavior often blind managers of the major social platforms do not provide useful information because it can spread real awareness of the threat they face. Social networks have […]
Once upon a time the espionage made by agents who essentially lived in complete anonymity and free of the past were able to recover the greatest amount of information about their objectives by building dangerous relationships with the reality of interest. Over the years, and the overwhelming technological evolution, scenarios are profoundly changed. Access to information most often passes through the circuits of a mobile device or a personal computer and this led to an increasing focus of many companies and government agencies in […]
Few days ago I have partecipated to an open discussion started by Stefano Mele, a security and cyber-terrorism expert, on the development of Internet Content Monitor System by the Soviet government. In April, the “Russian Federal Service for Supervision Telecoms” has announced it that it has launched a tender for developing a Content Monitor System with a budget of $ 530,000. Following the tender the development phase was started in august and have […]
As always support social networks are now the ideal carrier for an abnormal amount of information and this is the main reason why many governments have invested and are investing in sophisticated analysis tools that can implement intelligent search within an ocean seemingly unrelated data. An unit part of the CIA’s Open Source Center is responsible for monitoring the vast and various social networks, local and international news, radio, and television, Internet chat rooms, and pretty much anything from […]