Tag: espionage

The Spy Files – The Whole Story Behind the Spy Files

“The Espionage Act of 1917 is a powerful instrument that can be used to target even people with minor to non-existent political opinions,” explains Alex Jones, founder of InfoWars, in this interview with Michael Salla. “The Espionage Act was put in place to protect the U. government from disclosure of any information related to espionage…

Read More

Federal Election Security Grants – What Are They Really Worth?

Security researchers at the University of Washington have spent the last five years tracking the money that federal candidates spend on their campaigns, and have come to a startling conclusion: That money is still being squandered. The Seattle Times reports “[t]he total amount of money the campaigns of about a dozen presidential candidates are spending…

Read More

The German Army’s Mobile Intelligence Agency

This is a collection of articles written in English, with some contributions in Dutch. The language used is English with some Dutch words. The articles are generally short and are meant to be accessible for people with no or little programming background. We have worked on our software for more than a year now. We…

Read More

The Most Popular Smartphones for Spying

A new survey by security firm Symantec also found that the most popular smartphones for espionage purposes are the Nexus 6 and the Galaxy Nexus. Not surprisingly, the devices most used for spying are Android devices. Symantec also says that the most common method of spying is using the device’s camera. The survey found that…

Read More

The Silent Theft of the Week: Attacks on Pulse Secure Devices

“The security of millions of devices connected to the internet are at risk from malware that has the ability to steal sensitive information or impersonate a computer or device — including the Sony PlayStation 4 and Apple iMac computers — without access to private data. ” “CISA is a collaboration between IT organisations from around…

Read More

IoT Malware Attacks – An Overview

In this paper, we point out that IoT malware is developing new and advanced attacks against computer networks. IoT malware is often used by its authors for espionage, for instance to obtain the credentials of a remote organization where the malware has been installed and then to access its network in order to send information…

Read More

Financial Inclusion Guidelines

On August 8, 2009, the National Institute for Standards and Technology (NIST) published an advisory published as a part of the NIST Public Advisory Policy Framework for Financial Services, “Financial Inclusion: Developing Tools to Help Access to Tools and Services (‘Financial Inclusion Guidelines’),” as a response to the need for developing financial tools that help…

Read More

Hacking Disinformation Surveillance

“Companies, especially large ones, know that a secure and reliable network increases the likelihood of their products being successfully deployed, and in turn, the chance that consumers will buy their products or pay their workers a wage that makes them feel secure. However, what they really don’t want is for their competitors to know that…

Read More

The Impact of China-Ukraine Relationship on Geopolitical Security

This paper analyzes the impact of China-Ukraine relationship on geopolitical security, focusing on the political economy of infrastructure-related trade and investment relations. China’s geopolitical influence in Ukraine in 2012-2013 (both in the form of direct and indirect) is considered, as well as the changing patterns of strategic relationships with other countries. The paper argues that…

Read More

Mobile Network Security: A Security Issue in 5G-Slicing Networks

Today’s smart phones are constantly connected to the internet. With this, you can have access to all kinds of information and services. Unfortunately, no matter what is on your phone, you probably don’t have much control of it. In terms of security, mobile network security becomes important to guarantee that you are protected. 5G is…

Read More