CIA

Stratfor on Iran, Palantir and Goldman Sachs

It is impossible to argue otherwise, after one days from the publication of mail stolen during the hack to Stratfor,…

14 years ago

Wikileaks & Anonymous, new alliance against dirty affairs

The day has come, WikiLeaks began publishing more than five million emails from Texas-based global security think tank company Stratfor, a…

14 years ago

Illustrious victim, Cia.gov Tango Down by Anonymous

Just this morning I wrote in my article the ability of the Anonymous group that stands out in my assessment…

14 years ago

Social Media, exercise or not exercise the control

Exercise or not exercise the control, that is the question that divides major governments on the social networks surveillance and…

14 years ago

Cyber ​​chess, a game just begun

So far this year we have witnessed an escalation of attacks against those who are considered the major superpowers on…

14 years ago

MASINT discipline & critical infrastructures

Every intelligence discipline is used to acquire information concerning specifc subjects, the common categories of these methodologies include human intelligence…

14 years ago

“Cyber China” From Operation Aurora to China Cyber attacks Syndrome

Cyber China is considered the most active persistent collector of Western intelligence and intellectual property, is it a syndrome or…

14 years ago

The nightmare backdoor , reflections on the case Huawei

Just at this time I came across an interesting discussion proposed by a colleague on the possible presence of a…

14 years ago

A Distributed Satellite Ground Station Network for internet freedom

The news that I desire to discuss with you is the will to put into orbit a satellite system to…

14 years ago

Hardware qualification, a must in a cyber strategy

We live in the era of free technology market , devices and appliances of all kinds can be found on…

14 years ago

This website uses cookies.