Citizenfour, the new film on Edward Snowden, shows journalist Greenwald discussing with a second source which is disclosing classified information. There is another whistleblower inside the US Intelligence, according to the popular journalist Glenn Greenwald Edward Snowden was not alone as revealed in the new documentary about Edward Snowden that premiered in New York last week. […]
The journalist Erich Möchel leaked photos reported alleged NSA monitoring stations in Vienna which are used by the Intelligence to spy on UN. Photos published by the journalist Erich Möchel in a blog post seems to confirm the presence of an NSA surveillance infrastructure, mentioned in the Snowden’s leaked documents “Vienna Annex”, in the attics of IZD Towers […]
Using the proper surveillance systems available on the market it is easy and quick to track cellphone and the movements of targets everywhere on the globe. We recently discussed the decision of Wikileaks to publish copies of the criticized surveillance software FinFisher, highlighting the dangers for the militarization of the cyberspace and in particular for […]
ICREACH is the codename for the NSA’s Secret Google-Like Search Engine for Metadata Analysis disclosed by a new collection of documents leaked by Snowden. ICREACH is the name of a Google-like search engine designed by the National Security Agency (NSA) that provides metadata related to individuals living in US to more than two dozen US government agencies. The Intercept […]
Experts working at US and UK Intelligence agencies on monthly base leak Tor vulnerabilities to the developers at the Tor Project. The BBC reported that the executive director of the Tor Project revealed that both US and UK intelligence agencies share bugs anonymously with Tor developers. The circumstance is quite surprising considering that both NSA and GCHQ […]
Snowden revealed the existence of the MonsterMind system developed by the NSA to automatically mitigate and respond cyber attacks. In his last interview, Edward Snowden explained the risks related to use of automated attacks in response to the offensive against the US. Many experts identify with the term proactive defense the possibility to respond instantaneously […]
Edward Snowden revealed that NSA hacking elite team TAO accidentally caused Syria’s internet blackout in 2012 during a cyber espionage operation. Two years ago Syria suffered a huge Internet blackout, the entire country was disconnected from the Internet for three days. Security experts attributed the responsibility for the Internet blackout to the Syrian government that […]
Cyber weapons like Stuxnet will only grow in prevalence, use and sophistication and it is therefore in the interest of national security to develop advanced mitigation techniques and capabilities. The progenitor of Duqu, Flame and Gauss are reported as the authors of STUXNET. As illustrated, the trend of advancements between these four cyber weapons suggests […]
A popular security researcher revealed that bad actors can tap into USB Devices to conduct attacks non detectable with known security defenses. Security experts demonstrated that USB devices can be used to compromise personal computers in a potential new type of attacks that evade all actual security protections. Karsten Nohl, chief scientist with Berlin’s SR Labs, discovered that […]
The Russian government has launched a public competition, reserved to Russian entities, offering $111,000 to break Tor encryption. As anticipated in my previous post, law enforcement agencies and intelligence all over the world are investing to de-anonymize users in the deepweb, and in particular on Tor networks. Hacking Tor is a goal for many Intelligence agencies as […]