surveillance

Pierluigi Paganini September 17, 2014
WikiLeaks publicly disclosed copies of FinFisher surveillance software

WikiLeaks has published copies of the criticized FinFisher surveillance software, claiming that the malware is sold to the most “abusive” regimes in the world. Copies of the surveillance software “FinFisher” were made available for public scrutiny by WikiLeaks early this week. The international, online journalistic organization has decided to publish the public disclose the criticized software online to allow […]

Pierluigi Paganini September 02, 2014
Bogus cellphone towers found in the US

CryptoPhone 500 security firm has found 17 bogus cellphone towers in the US with a heavily customized handset exploited for surveillance activities. Seventeen mysterious cellphone towers have been discovered in the USA, they are identical to legitimate towers, the unique difference is related a heavily customized handset built for Android security. According to the Popular Science, […]

Pierluigi Paganini August 26, 2014
ICREACH program, NSA Search Engine for communications analysis

ICREACH is the codename for the NSA’s Secret Google-Like Search Engine for Metadata Analysis disclosed by a new collection of documents leaked by Snowden. ICREACH is the name of a Google-like search engine designed by the National Security Agency (NSA) that provides metadata related to individuals living in US to more than two dozen US government agencies. The Intercept […]

Pierluigi Paganini August 25, 2014
A dark wing of the intelligence supports the Tor Project

Experts working at US and UK Intelligence agencies on monthly base leak Tor vulnerabilities to the developers at the Tor Project. The BBC reported that the executive director of the Tor Project revealed that both US and UK intelligence agencies share bugs anonymously with Tor developers. The circumstance is quite surprising considering that both NSA and GCHQ […]

Pierluigi Paganini August 18, 2014
New powers for the Russian surveillance system SORM-2

The Russian Prime Minister Dmitry Medvedev has signed a decree that will extend the use of SORM-2 to social network surveillance. It’s known that the Russian Government is applying a strict surveillance on the Internet within the country, the Kremlin has developed a system code named “SORM-2” to monitor Russian citizens. The Russian Government has […]

Pierluigi Paganini August 16, 2014
HACIENDA, GCHQ Port Scanning Program on a wide-scale

New revelation on British GCHQ confirms the existence of the HACIENDA Port Scanning Program which is targeting systems in 27 countries. In the last years the British GCHQ has conducted numerous hacking operation against systems in 27 countries, through a massive port scanning the intelligence agency was searching for vulnerability to exploit in cyber attacks. […]

Pierluigi Paganini August 12, 2014
Is the Blackphone really so easy to root? Probably no.

A security researcher claimed to have rooted the super secure Smartphone Blackphone in just five minutes. Is it true? What’s happened? Recently we read about the Blackphone, a super secure smartphone designed by SGP Technologies, a joint venture between Silent Circle and Spanish Geekphone, which is able to avoid surveillance of the NSA. The designer of Blackphone […]

Pierluigi Paganini August 05, 2014
China bans Symantec & Kaspersky from the list of antivirus suppliers

China has excluded Symantec Corp and Kaspersky Lab from a list of approved antivirus software suppliers to limit the use of foreign technology. Cyber espionage is the first concern of government, China and US exchanged in the months reciprocal accusations on a series of hacking campaign conducted with the purpose of stealing sensitive information. According to the People’s Daily […]

Pierluigi Paganini July 24, 2014
Tails live OS affected by critical zero-day vulnerabilities … Exodux disclosed the details

A researchers at the Exodus Intelligence firm has discovered a series of zero day vulnerabilities in the popular Tails Linux-based distribution. A researcher at Exodus Intelligence has discovered critical zero-day vulnerabilities in the popular Tails live operating system. Tails is considered by security experts an indispensable tool to preserve the privacy and security of users that intend to […]

Pierluigi Paganini July 15, 2014
GCHQ JTRIG Tools and Techniques for propaganda and internet deception

Edward Snowden leaked a top-secret GCHQ document which details the operations and the techniques used by JTRIG unit for propaganda and internet deception. The JTRIG unit of the British GCHQ intelligence agency has designed a collection of applications that were used to manipulate for internet deception and surveillance, including the modification of the results of the […]