NSA

Pierluigi Paganini November 03, 2014
ISIS issued a manual for a safe use of Twitter and other media

The ISIS has released a manual for its militants, titled “How to Tweet Safely Without Giving out Your Location to NSA”, that explain how avoid surveillance. Security and media consider the ISIS a group with great cyber capabilities, last news of the IS is related to the diffusion of a Training Guide for its members to prevent the NSA spying. The […]

Pierluigi Paganini October 25, 2014
Hacking air gapped networks by using lasers and drones

A group of Israeli researchers has demonstrated at the last Black Hat Conference how to hack air gapped networks by using lasers and drones. A lot of people believe that it is possible to secure a computer keeping it off, security specialists define a network separated by the Internet, or by any other unsecure networks, as “Air gapped […]

Pierluigi Paganini September 27, 2014
NSA spies on UN in Vienna – The Leaked photos

The journalist Erich Möchel leaked photos reported alleged NSA monitoring stations in Vienna which are used by the Intelligence to spy on UN. Photos published by the journalist Erich Möchel in a blog post seems to confirm the presence of an NSA surveillance infrastructure, mentioned in the Snowden’s leaked documents “Vienna Annex”, in the attics of IZD Towers […]

Pierluigi Paganini September 21, 2014
DoJ proposal wants legitimate FBI hacking ops against anonymity

DoJ proposal is trying to legitimate FBI hacking operations against Internet users that make use of any kind of anonymizing technology. The FBI wants greater authority to hack overseas computers, according to a law professor. The Department of Justice (DoJ) is declaring war to online anonymity, its proposal to amend Rule 41 of the Federal […]

Pierluigi Paganini September 15, 2014
Treasure Map – Fiveeyes tap into German telco networks to map end devices

Documents leaked by Snowden reveal the existence of the Treasure Map program run by FiveEyes Intelligence agencies to control the global network. Treasure Map is the name of the last program of intelligence revealed by documents leaked by the whistleblower Edward Snowden. Treasure Map is a program to map every device exposed on the Internet, […]

Pierluigi Paganini August 26, 2014
ICREACH program, NSA Search Engine for communications analysis

ICREACH is the codename for the NSA’s Secret Google-Like Search Engine for Metadata Analysis disclosed by a new collection of documents leaked by Snowden. ICREACH is the name of a Google-like search engine designed by the National Security Agency (NSA) that provides metadata related to individuals living in US to more than two dozen US government agencies. The Intercept […]

Pierluigi Paganini August 25, 2014
A dark wing of the intelligence supports the Tor Project

Experts working at US and UK Intelligence agencies on monthly base leak Tor vulnerabilities to the developers at the Tor Project. The BBC reported that the executive director of the Tor Project revealed that both US and UK intelligence agencies share bugs anonymously with Tor developers. The circumstance is quite surprising considering that both NSA and GCHQ […]

Pierluigi Paganini August 15, 2014
MonsterMind – Snowden reveals the US proactive defense system

Snowden revealed the existence of the MonsterMind system developed by the NSA to automatically mitigate and respond cyber attacks. In his last interview, Edward Snowden explained the risks related to use of automated attacks in response to the offensive against the US. Many experts identify with the term proactive defense the possibility to respond instantaneously […]

Pierluigi Paganini August 14, 2014
NSA accidentally caused the 2012 Syrian Internet blackout

Edward Snowden revealed that NSA hacking elite team TAO accidentally caused Syria’s internet blackout in 2012 during a cyber espionage operation. Two years ago Syria suffered a huge Internet blackout, the entire country was disconnected from the Internet for three days. Security experts attributed the responsibility for the Internet blackout to the Syrian government that […]

Pierluigi Paganini August 12, 2014
Is the Blackphone really so easy to root? Probably no.

A security researcher claimed to have rooted the super secure Smartphone Blackphone in just five minutes. Is it true? What’s happened? Recently we read about the Blackphone, a super secure smartphone designed by SGP Technologies, a joint venture between Silent Circle and Spanish Geekphone, which is able to avoid surveillance of the NSA. The designer of Blackphone […]