Cyber Espionage

The Rise of the Securocrats


book

book

Publicado el 14 de ene. de 2015

The South African government led by the ANC’s president, Jacob Gedleyihlekisa Zuma, stands accused of having fallen under the sway of the securocrats. Who, or what, are they? Securocrats are officials located in the security establishment – the police, intelligence services or the military – that have the power to influence government policy in their favour.

 


#
The Spy Cables: A glimpse into the murky world of espionage

Publicado el 14 de ene. de 2015
The South African government led by the ANC’s president, Jacob Gedleyihlekisa Zuma, stands accused of having fallen under the sway of the securocrats. Who, or what, are they? Securocrats are officials located in the security establishment – the police, intelligence services or the military – that have the power to influence government policy in their favour.

Advertisements

MOBILE WORLD CONGRESS #mobile


http://www.mobileworldcongress.com/

666

666

Location, Dates & Times

MOBILE WORLD CONGRESS 2015

Mobile World Congress 2015 will take place 2-5 March 2015. The event will once again take place at Fira Gran Via in Barcelona, Spain.

The physical address of the venue is:

Fira Gran Via
Av. Joan Carles I,
64 08908 L’Hospitalet de Llobregat,
Barcelona

Unless otherwise noted, all events take place at Fira Gran Via. However, selected events will take place at Fira Montjuïc, a venue 4 km down the road.

Fira Montjuïc
Avda. Reina Maria Cristina,
s/n 08004
Barcelona

Please do not send any MWC materials or shipments to these addresses as they will be refused.
#

PDF: Partnering for Cyber Resilience Towards the Quantification of Cyber Threats


Partnering for Cyber
Resilience
Towards the Quantification
of Cyber Threats

PDF

PDF

 

http://www3.weforum.org/docs/WEFUSA_QuantificationofCyberThreats_Report2015.pdf PDF

MEDIA CONVENTION Berlin 2014: Out of the Dark


Publicado el 13/5/2014

Jacob Appelbaum, freier Journalist beim SPIEGEL spricht mit Ole Reißmann von SPIEGEL ONLINE über den Stand der Pressefreiheit in Deutschland und den USA, insbesondere in Bezug auf die NSA-Enthüllungen.

 

NEWSNIGHT: Glenn Greenwald full interview on Snowden, NSA, GCHQ and spying #mass #surveillance #PRISM


BBC Newsnight exclusive interview with journalist Glenn Greenwald on Edward Snowden, the PRISM revelations and mass surveillance.

Glenn Greenwald (left) walks

Glenn Greenwald (left) walks

 

 

 

 

 

 

 

 

 

 

 

 

Jacob Applebaum, Brussels 2013-09-05 #TOR #CivilLiberties


In the European Parliament Civil Liberties committee hearing on USA Spying

El derecho a respirar

El derecho a respirar

The Border Is a Back Door for U.S. Device Searches


From: InfoSec News <alerts () infosecnews org>
Date: Tue, 10 Sep 2013 06:39:56 +0000 (UTC)


http://www.nytimes.com/2013/09/10/business/the-border-is-a-back-door-for-us-device-searches.html

By SUSAN STELLIN
The New York Times
September 9, 2013

Newly released documents reveal how the government uses border crossings to seize and examine travelers’ electronic devices instead of obtaining a search warrant to gain access to the data.


The documents detail what until now has been a largely secretive process that enables the government to create a travel alert for a person, who may not be a suspect in an investigation, then detain that individual at a border crossing and confiscate or copy any electronic devices that person is carrying.


To critics, the documents show how the government can avert Americans’ constitutional protections against unreasonable search and seizure, but the confiscations have largely been allowed by courts as a tool to battle illegal activities like drug smuggling, child pornography and terrorism.


The documents were turned over to David House, a fund-raiser for the legal defense of Chelsea Manning, formerly known as Pfc. Bradley Manning, as part of a legal settlement with the Department of Homeland Security. Mr. House had sued the agency after his laptop, camera, thumb drive and cellphone were seized when he returned from a trip to Mexico in November 2010. The data from the devices was then examined over seven months.

[...]

--
Find the best InfoSec talent without breaking your
recruiting budget! Post a Job, $99 for 31 days.
Hot InfoSec Jobs - http://www.hotinfosecjobs.com/

Report: UK and US spies have cracked BlackBerry’s BES encryption


http://news.techworld.com/security/3467695/report-uk-and-us-spies-have-cracked-blackberrys-bes-encryption/

By Peter Sayer
Techworld
09 September 2013

The U.S. National Security Agency is able to read messages sent via a corporate BlackBerry Enterprise Server (BES), according to a report by German news magazine Der Spiegel. The purpose of this spying is economic or political, and not to counter terrorism, the magazine hints.


The report, published in English on Monday, cites internal documents leaked by former NSA contractor Edward Snowden.


Governments have long demanded that BlackBerry provide access to encrypted messages carried by its email and BlackBerry Messenger (BBM) services, to allow them to monitor for terrorist activity.


BlackBerry has complied in the case of its consumer-grade BlackBerry Internet Service (BIS), notably providing the Indian government with access to consumer messages. Indeed, Der Spiegel cited NSA documents claiming that since 2009, analysts have been able to see and read

[...]

--
Find the best InfoSec talent without breaking your
recruiting budget! Post a Job, $99 for 31 days.
Hot InfoSec Jobs - http://www.hotinfosecjobs.com/

US Mounted 231 Offensive Cyber-operations In 2011, Runs Worldwide Botnet


An anonymous reader sends this news from the Washington Post:”U.S. intelligence services carried out 231 offensive cyber-operations in 2011, the leading edge of a clandestine campaign that embraces the Internet as a theater of spying, sabotage and war, according to top-secret documents [from Edward Snowden]. Additionally, under an extensive effort code-named GENIE, U.S. computer specialists break into foreign networks so that they can be put under surreptitious U.S. control. Budget documents say the $652 million project has placed ‘covert implants,’ sophisticated malware transmitted from far away, in computers, routers and firewalls on tens of thousands of machines every year, with plans to expand those numbers into the millions. … The implants that [an NSA group called Tailored Access Operations (TAO)] creates are intended to persist through software and equipment upgrades, to copy stored data, ‘harvest’ communications and tunnel into other connected networks. This year TAO is working on implants that “can identify select voice conversations of interest within a target network and exfiltrate select cuts,” or excerpts, according to one budget document. In some cases, a single compromised device opens the door to hundreds or thousands of others.”

via: http://yro.slashdot.org/story/13/08/31/2223212/us-mounted-231-offensive-cyber-operations-in-2011-runs-worldwide-botnet

Überwachungsstaat – Was ist das?


Was ist ein Überwachungsstaat?
Seit den Enthüllungen von Prism und Tempora, den Überwachungs-Programmen der USA und Großbritannien, hört man die Warnung vor einem Überwachungsstaat.
Doch, was hat es damit auf sich?

5645

5645

Wenn du dich gegen Überwachung engagieren willst, nimm an einer dieser Petitionen teil:
http://www.stopsurveillance.org/
http://www.change.org/prism

Diese Animation zeigt die Gefahren von Überwachung auf, und erklärt, warum der oft gehörte Spruch “Wer nichts zu verbergen hat, hat auch nichts zu befürchten” ein großer Irrtum ist.

Weitere Themen aus dem Video: NSA, George Orwell und 1984, Big Brother, Vorratsdatenspeicherung und Geheimdienst

Untertitel:
Danke an die freiwilligen Helfer vonhttps://prism.titanpad.com/ueberwachu…

Wenn’s dir gefallen hat, abonnier meinen Kanal! :-)
http://www.youtube.com/subscription_c…

… oder folg mir hier:
http://twitter.com/manniac
http://facebook.com/manniac
http://manniac.tumblr.com

456436

456436

FBI Taps Hacker Tactics to Spy on Suspects


Law-Enforcement Officials Expand Use of Tools Such as Spyware as People Under Investigation ‘Go Dark,’ Evading Wiretaps

MORE: http://online.wsj.com/article_email/SB10001424127887323997004578641993388259674-lMyQjAxMTAzMDAwMTEwNDEyWj.html?mod=wsj_valettop_email

http://europe.wsj.com/home-page

 

Edificio FBI

Edificio FBI

Edward Snowden Seeking to Join KGB Veterans Group


http://freebeacon.com/edward-snowden-seeking-to-join-kgb-veterans-group/

new_adventures-of-edward-snowden

new_adventures-of-edward-snowden

http://freebeacon.com/edward-snowden-seeking-to-join-kgb-veterans-group/

By Bill Gertz
Washington Free Beacon
July 24, 2013

Renegade National Security Agency contractor Edward Snowden has applied to join a group of former Russian intelligence and security officials, according to the group's director.


Participation in a union of former KGB security, intelligence, and police officials, would likely change Snowden’s status from that of a whistleblower seeking to expose wrongdoing, to an intelligence defector who has changed sides.


Alexei Lobarev, chairman of the group called "Veterans of the Siloviki" -- literally "men of power" -- told a Russian news outlet on Monday that Snowden, who has been staying in a Moscow airport transit lounge for a month, applied for membership in the group.


The state-run RIA Novosti news agency reported Wednesday that the Russian Federal Migration Service issued an official paper to Snowden that will allow him to leave the transit zone of Moscow's Sheremetyevo airport as part of an agreement with the Border Guard Service.

[...]

--
Find the best InfoSec talent without breaking your budget!
Post a Job! $99 for 31 days
http://www.hotinfosecjobs.com/
The Siloviki in Charge

Download PDF

The Siloviki in Charge

From: Journal of Democracy

SILOVIKI’S PYRAMID OF POWER REVEALED

 

By Anatoly Medetsky

Staff Writer

Published: January 20, 2004 (Issue # 936)

http://sptimes.ru/index.php?action_id=2&story_id=12039

 

DOCUMENT: 2013 EEUU Data Protection #1984 #1776


http://ep00.epimg.net/descargables/2013/07/21/849c9e0486f3300b007ba7cd1c9b6412.pdf  USA

#data

#data

http://europa.eu/rapid/press-release_EDPS-13-4_en.htm

DOCUMENT : general data protection regulation #data #1984 #1776


#Data

#Data

http://ep00.epimg.net/descargables/2013/07/21/d9d751c9b66cad403d4d2903c993cc63.pdf USA

REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf EUROPA