spies

now browsing by tag

 
 

Israeli Spies Hacked ISIS Computer Networks, Exposed Their “Laptop Bomb” Plans

Source: National Cyber Security – Produced By Gregory Evans

Israeli Spies Hacked ISIS Computer Networks, Exposed Their “Laptop Bomb” Plans

Israeli cyber researchers recently decoded ISIS’s attack plan. The terror group had built a laptop computer bomb that could have exploded the commercial aircraft to the US. But Israeli government cyber security broke into ISIS’s computer networks months ago and revealed the terror group’s plan. According to The New York…

The post Israeli Spies Hacked ISIS Computer Networks, Exposed Their “Laptop Bomb” Plans appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Child abuse inquiry: MPs, churches and spies among those examined for historic investigation

Current and former MPs, local councils and the Anglican and Roman Catholic Churches are among the 12 sections of investigation during the “unprecedented” government inquiry into child abuse. Lambeth, Rochdale and Nottinghamshire councils will also be investigated over their failure toRead More

The post Child abuse inquiry: MPs, churches and spies among those examined for historic investigation appeared first on Parent Security Online.

View full post on Parent Security Online

An Entire City Trolled NSA Spies Using an Art Project

Source: National Cyber Security – Produced By Gregory Evans

An Entire City Trolled NSA Spies Using an Art Project

When it was revealed in 2013 that the NSA and its UK equivalent, GCHQ, routinely spied on the German government, artists Mathias Jud and Christoph Wachter came up with a plan. They installed a series of antennas on the roof of the Swiss Embassy in Berlin and another giant antenna on the roof of the Academy of Arts, which is located exactly between the listening posts of the NSA and GCHQ. This created an open communication network, meaning that with the use of any wifi-enabled device, anyone could send anything (text messages, voice calls, photos and files) anonymously for those listening to hear. “If people are spying on us, it stands to reason that they have to listen to what we are saying,” Mr. Jud said in a TED Talk on the subject that was filmed at TED Global London in September and uploaded onto Ted.com today. This was perfectly legal, and they named the project “Can You Hear Me?” To no surprise, there was a ton of trolling. One message read, “This is the NSA. In God we trust. In all others we track!!!!!” Another said, “Agents, what twisted story of yourself will you tell your grandchildren?” One particularly humorous message jokingly pleaded, “@NSA My […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post An Entire City Trolled NSA Spies Using an Art Project appeared first on National Cyber Security.

View full post on National Cyber Security

China and Russia are using hacked data to target U.S. spies, officials say

Source: National Cyber Security – Produced By Gregory Evans

Foreign spy services, especially in China and Russia, are aggressively aggregating and cross-indexing hacked U.S. computer databases — including security clearance applications, airline records and medical insurance forms — to identify U.S. intelligence officers and agents, U.S. officials said. At least one clandestine network of American engineers and scientists who provide technical assistance to U.S. undercover operatives and agents overseas has been compromised as a result, according to two U.S. officials. The Obama administration has scrambled to boost cyberdefenses for federal agencies and crucial infrastructure as foreign-based attacks have penetrated government websites and email systems, social media accounts and, most important, vast data troves containing Social Security numbers, financial information, medical records and other personal data on millions of Americans. Counterintelligence officials say their adversaries combine those immense data files and then employ sophisticated software to try to isolate disparate clues that can be used to identify and track — or worse, blackmail and recruit — U.S. intelligence operatives. Digital analysis can reveal “who is an intelligence officer, who travels where, when, who’s got financial difficulties, who’s got medical issues, [to] put together a common picture,” William Evanina, the top counterintelligence official for the U.S. intelligence community, said in an […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post China and Russia are using hacked data to target U.S. spies, officials say appeared first on National Cyber Security.

View full post on National Cyber Security

US wants to hack your phone because it doesn’t have real spies it needs

index

Source: National Cyber Security – Produced By Gregory Evans

 Powered by Max Banner Ads  As Google’s Android smartphone operating system was coming under attack in fall 2012 from malware with the colorful names of “Loozfon” and “FinFisher,” the FBI’s Internet Crime Complaint Center issued an alert to help defend against the threat. “Depending on the type of phone,” the FBI said, “the operating system may have encryption available. This can be used to protect the user’s personal data.” How times have changed. Last fall, when Apple and Google announced they were cleaning up their operating systems to ensure that their users’ information was encrypted to prevent hacking and potential data loss, FBI Director James Comey attacked both companies. He claimed the encryption would cause the users to “place themselves above the law.” The tech community fired back. “The only actions that have undermined the rule of law,” Ken Gude wrote in “Wired,” “are the government’s deceptive and secret mass-surveillance programs.” The battle resumed in February 2015. Michael Steinbach, FBI assistant director for counterterrorism, said it is “irresponsible” for companies like Google and Apple to use software that denies the FBI lawful means to intercept data. Yet the FBI does have a lawful means to intercept it: the Foreign Intelligence […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post US wants to hack your phone because it doesn’t have real spies it needs appeared first on National Cyber Security.

View full post on National Cyber Security

Apple’s Encryption Will Slow, Not Stop, Cops And Spies National Cyber Security

nationalcybersecurity.com – While the newest Apple Inc. (AAPL) and Google Inc. (GOOGL) smartphones will automatically encrypt data stored on them, that won’t keep U.S. law enforcement and intelligence agencies from obtaining …

View full post on Hi-Tech Crime Solutions Weekly

Apple’s Encryption Will Slow, Not Stop, Cops And Spies

Apple’s Encryption Will Slow, Not Stop, Cops And Spies

While the newest Apple Inc. (AAPL) and Google Inc. (GOOGL) smartphones will automatically encrypt data stored on them, that won’t keep U.S. law enforcement and intelligence agencies from obtaining evidence linked to the devices. Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

California man spies on cops through surveillance drones

While the Los Angeles Police Department (LAPD) is still awaiting approvals to use its recently acquired pairs of unmanned aerial vehicles to monitor Southern California, a civilian has been using it almost for a month! Daniel Saulmon, a 42-year old resident of Torrance, CA, and quite famous for his unusual passion of photographing police activities, has been using his own camera-equipped

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post California man spies on cops through surveillance drones appeared first on National Cyber Security.

View full post on National Cyber Security