The first rule in Internet #business is: Nothing is for #free! It’s only free for a little fee. You pay with your private #information. This information will be monitored and sold – it’s called #BigData.source: https://anonsurvivalguide.wordpress.com/2017/12/02/free-email-where-you-dont-pay-with-the-lose-of-your-privacy/
The Israeli officials who had hacked into Kaspersky’s own network alerted the United States to the broad Russian intrusion, which has not been previously reported, leading to a decision just last month to order #Kaspersky #software removed from #government computers....
But experts on #Russia say that under President Vladimir V. #Putin, a former #KGB. officer, businesses asked for assistance by Russian #spy agencies may feel they have no choice but to give it.WTF?! - I know that #Trump's U.S. has a #NSA, who does the same and all is called national #security! -> U.S. Agencies Said to Swap Data With Thousands of Firms - source: https://www.bloomberg.com/news/articles/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms
The modular malware UNITEDRAKE is compatible with systems running on Microsoft Windows XP, Vista, 7, 8 up to Windows Server 2012. UNITEDRAKE is described as a “fully extensible” data collection tool that is specifically developed for Windows machines to allow operators the chance of controlling a device completely.#security #news #windows #microsoft #surveillance #spy #intelligence
WikiLeaks just released internal documentation of the CIA’s massive arsenal of hacking tools and techniques. These 8,761 documents — called “Vault 7” — show how their operatives can remotely monitor and control devices, such as phones, TVs, and cars. And what’s worse, this archive of techniques seems to be out in the open, where all manner of hackers can use it to attack us.
Councils were given permission to carry out more than 55,000 days of covert surveillance over five years, including spying on people walking dogs, feeding pigeons and fly-tipping, the #Guardian can reveal.
That evidence is best summarized in a 2014 blog post by the #security firm #FireEye. APT 28 attacks governments and militaries hostile to #Russia or strategically important for it. #APT28 appears professional and well-financed. APT 28 uses Russian in its malware. The #malware is compiled during working hours in the #Moscow time zone.
In the real world outside of soap operas and spy novels, however, any conclusions concerning the hackers' #identity, motives and goals need to be based on solid, demonstrable #evidence. At this point, it's inadequate. This is particularly unfortunate given that the #DNC hacks were among the defining events of the raging #propaganda wars of 2016.
Secret aerial stations on the ground could intercept the signal as it transited through a satellite. The simple fact that the telephone was switched on was enough to give away its position; the interception could then be cross-referenced with the list of known passengers on the flight, the flight number, and the airline code to determine the name of the smartphone user.
The classified rules, obtained by The Intercept and dating from 2013, govern the FBI’s use of national #security letters, which allow the bureau to obtain information about journalists’ calls without going to a judge or informing the #news organization being targeted.
In a stunning twist in a long-running Medicare fraud case, both the Miami U.S. Attorney’s office and the FBI stand accused of spying on a defendant’s lawyer by illegally and secretly obtaining copies of confidential defense documents.