Tag: espionage
The Spy Files – The Whole Story Behind the Spy Files
- by Team
“The Espionage Act of 1917 is a powerful instrument that can be used to target even people with minor to non-existent political opinions,” explains Alex Jones, founder of InfoWars, in this interview with Michael Salla. “The Espionage Act was put in place to protect the U. government from disclosure of any information related to espionage…
Read MoreFederal Election Security Grants – What Are They Really Worth?
- by Team
Security researchers at the University of Washington have spent the last five years tracking the money that federal candidates spend on their campaigns, and have come to a startling conclusion: That money is still being squandered. The Seattle Times reports “[t]he total amount of money the campaigns of about a dozen presidential candidates are spending…
Read MoreThe German Army’s Mobile Intelligence Agency
- by Team
This is a collection of articles written in English, with some contributions in Dutch. The language used is English with some Dutch words. The articles are generally short and are meant to be accessible for people with no or little programming background. We have worked on our software for more than a year now. We…
Read MoreThe Most Popular Smartphones for Spying
- by Team
A new survey by security firm Symantec also found that the most popular smartphones for espionage purposes are the Nexus 6 and the Galaxy Nexus. Not surprisingly, the devices most used for spying are Android devices. Symantec also says that the most common method of spying is using the device’s camera. The survey found that…
Read MoreThe Silent Theft of the Week: Attacks on Pulse Secure Devices
- by Team
“The security of millions of devices connected to the internet are at risk from malware that has the ability to steal sensitive information or impersonate a computer or device — including the Sony PlayStation 4 and Apple iMac computers — without access to private data. ” “CISA is a collaboration between IT organisations from around…
Read MoreIoT Malware Attacks – An Overview
- by Team
In this paper, we point out that IoT malware is developing new and advanced attacks against computer networks. IoT malware is often used by its authors for espionage, for instance to obtain the credentials of a remote organization where the malware has been installed and then to access its network in order to send information…
Read MoreFinancial Inclusion Guidelines
- by Team
On August 8, 2009, the National Institute for Standards and Technology (NIST) published an advisory published as a part of the NIST Public Advisory Policy Framework for Financial Services, “Financial Inclusion: Developing Tools to Help Access to Tools and Services (‘Financial Inclusion Guidelines’),” as a response to the need for developing financial tools that help…
Read MoreHacking Disinformation Surveillance
- by Team
“Companies, especially large ones, know that a secure and reliable network increases the likelihood of their products being successfully deployed, and in turn, the chance that consumers will buy their products or pay their workers a wage that makes them feel secure. However, what they really don’t want is for their competitors to know that…
Read MoreThe Impact of China-Ukraine Relationship on Geopolitical Security
- by Team
This paper analyzes the impact of China-Ukraine relationship on geopolitical security, focusing on the political economy of infrastructure-related trade and investment relations. China’s geopolitical influence in Ukraine in 2012-2013 (both in the form of direct and indirect) is considered, as well as the changing patterns of strategic relationships with other countries. The paper argues that…
Read MoreMobile Network Security: A Security Issue in 5G-Slicing Networks
- by Team
Today’s smart phones are constantly connected to the internet. With this, you can have access to all kinds of information and services. Unfortunately, no matter what is on your phone, you probably don’t have much control of it. In terms of security, mobile network security becomes important to guarantee that you are protected. 5G is…
Read MoreRecent Posts
- CyberNative.AI: The Future of AI Social Networking and Cybersecurity
- CyberNative.AI: The Future of Social Networking is Here!
- The Future of Cyber Security: A Reaction to CyberNative.AI’s Insightful Article
- Grave dancing on the cryptocurrency market. (See? I told you this would happen)
- Why You Should Buy Memecoins Right Now (Especially $BUYAI)
Recent Comments