Espionage

Pierluigi Paganini January 25, 2012
MASINT discipline & critical infrastructures

Every intelligence discipline is used to acquire information concerning specifc subjects, the common categories of these methodologies include human intelligence (HUMINT), signals intelligence (SIGINT), imagery intelligence (IMINT), measurement and signatures intelligence (MASINT), and open source intelligence (OSINT) and Geospatial Intelligence. Each disciplines is used by governments to collect data on their adversaries and competitors. Similar […]

Pierluigi Paganini January 23, 2012
Iran – China Axis and the dangerous alliances

If you were to ask me what is the most frightened nation in terms of cyber offense without a doubt I say it is China. The Beijing government has distinguished itself in recent years in the field of warfare demonstrating extraordinary abilities. It is among the first nations to have understood the importance of the […]

Pierluigi Paganini January 20, 2012
Which is the main cyber threat? The violated freedom

In these days we have witnessed the escalation of attacks who took the state of Israel as a target. Groups of hackers have coalesced to express their dissent against the policy government. I mention this case because I consider emblematic the answer provided by the Israeli government officials, they have declared infact that attacks like […]

Pierluigi Paganini January 15, 2012
Japan Aerospace Exploration Agency hit by malware

To news like this we are dangerously getting used, the scenarios change but the dynamics are often the same, viruses used such as cyber weapon that infect critical structures, causing loss of valuable information and that block system of target systems. The news has been announced  by the same “Japan Aerospace Exploration Agency (JAXA)” that […]

Pierluigi Paganini January 14, 2012
Sykipot attacks U.S PKI infrastructures based on smart cards

In these hours on the web is turning the news of a cyber attack performed by a group of Chinese hackers against some U.S. Government Agencies. Once again, the weapon used against the strategic objectives is a cyber weapon, in particular it has been used a new version of the trojan Sykipot. Chinese hackers have […]

Pierluigi Paganini January 13, 2012
Critical infrastructures – Main threats for 2G and 3G mobile networks

Which is the critical infrastructure of a country that is most exposed to cyber threat?  The question is difficult to answer, without doubts. Communication infrastructure is a vital component of every country and we add that unlike other infrastructure it could be targeted in an attack also with the only destructive purpose with the intent […]

Pierluigi Paganini January 09, 2012
Rim, Nokia and Apple. Monitoring, interferences and violated privacy

What I want to discuss today is the interference of governments in what should be the private business and what are the consequences of an attitude so invasive. The news of this hour is that Nokia, RIM and Apple have provided to the Indian government, particularly its militia, a backdoor that provides the ability to control […]

Pierluigi Paganini January 06, 2012
The nightmare backdoor , reflections on the case Huawei

Just at this time I came across an interesting discussion proposed by a colleague on the possible presence of a backdoor in the devices of Huawei company. The news in itself is terrifying, even if it is discussed for years. The presence of a backdoor once again raises the issue of qualification of the hardware, […]

Pierluigi Paganini January 05, 2012
2012, the threat of malware. Evolution in the mobile scenario

Wanting to try out hypotheses about the future of the spread of malware, we cannot help but examine the mobile scenarios. For those who develop viruses and similar mobile platforms are a favorite target. The main causes are: The ubiquity of mobile phones such as smartphones of the latest generation. The technology evolution and the […]

Pierluigi Paganini January 03, 2012
The strategic importance of censorship in search engines

Every day, billions of people making an unimaginable number of searches through search engines. Complex algorithms seek to recover in the shortest possible time and with greater sorrowfulness the requested information. We may venture that a good 80% of Internet users interact with the web through these powerful applications. But the engines are much more, […]