English: FBI Mobile Command Center in Washington DC. (Photo credit: Wikipedia)
By: Amanda Vicinanzo, Senior Editor
10/20/2014 ( 9:57am)
Against the backdrop of notorious defense contractor Edward Snowden’s massive leak of classified documents last year, the Department of Homeland Security (DHS) recently published a report revealing the threat posed by malicious insiders who threaten the security of the sensitive information that US businesses rely on.
The DHS report identified a significant increase of disgruntled or former employees sabotaging company networks. Lockheed Martin—an American global aerospace, defense, security and advanced technology company—indicates that investigations conducted by the Federal Bureau of Investigation reveal that 59 percent of employees admit to taking proprietary information upon termination.
Moreover, the report stated , “A review of recent FBI cyber investigations revealed victim businesses incur significant costs ranging from $5,000 to $3 million due to cyber incidents involving disgruntled or former employees.” Continue reading
The mysterious vanishing of the Malaysian flight raised a startling amount of rumors and theories of all kinds. While most are at least somewhat feasible, the recent cyber attack theory is closer to science fiction
By Maty Kishinevsky and Natalie Novitski
Over the last few days a new thoery concerning the disappearance of the Malaysian flight popped up: Hostile elements managed to take over a cellular phone on the plane, using it to connect to the plane’s avionics and bring the aircraft down. This feat is almost impossible even when the target is a ground vehicle, and when the target is airborne things get even more complicated.The plane itself uses radio to communicate with ground stations, but mobile devices use other means of communications. “There’s a way to control a phone remotely, but the device has to be connected to a network – cellular or internet.” This according to Avi Rosen, CEO and co-founder of cellular security developer Kaymera. “If you’re outside cellular reception range, or if you don’t have a stable internet connection on the plane, there’s no way to infiltrate the phone and remotely control it.” Continue reading
Posted in Analysis, Cyber security, Malaysian Plane, News
- Tagged Altitude, Fixed-wing aircraft, Malaysia, Michael Hastings, Mobile phone, National Security Agency, United States, University of Texas at Austin
21 January 2014, 19:40
ASTANA. January 21. KAZINFORM – Today at the National Space Agency (NSA) the Head of Kazkosmos Talgat Musabayev has met with Joachim Klein, the Head of IABG mbH German company representative office in Kazakhstan.
IABG mbH company is one of the leading companies in Germany in the space industry and it has one of the largest testing centers for spacecraft, aircraft and vehicles. The company was established in 1961 by the Federal Republic of Germany as a central organization for testing in aerospace industry as well as analysing defense and security systems.
Posted in ASIA, Middle East, Military, Politics, Security, Technology
- Tagged Air Astana, Astana, Business, Germany, Kazakhstan, List of diplomatic missions in Kazakhstan, National Security Agency, Talgat Musabayev
Friday, January 17, 2014 – 09:20 AM
By Jody Avirgan : Associate Producer, The Brian Lehrer Show
National Security Agency (NSA) (Chris Hardie/flickr)
→ Update: Shane Harris, Senior Writer at Foreign Policy and author of The Watchers, joined Brian Lehrer to discuss the list and provide context. Audio available to stream and download above.
The trove of documents leaked by Edward Snowden has revealed the elaborate tricks the NSA can use to monitor communications and data around the world. Here, a running list of things we now know the NSA can do, based on media reports and other publicly available documents — so far. If we missed any, let us know in the comments page or by tweeting @brianlehrer.
- It can track the numbers of both parties on a phone call, as well location, time and duration. (More)
- It can hack Chinese phones and text messages. (More)
- It can set up fake internet cafes. (More)
- It can spy on foreign leaders’ cell phones. (More)
september 12, 2013 by Joseph Fitsanakis
By JOSEPH FITSANAKIS | intelNews.org |
The United States National Security Agency (NSA) shares raw intercepted data with Israeli intelligence without first deleting information pertaining to American citizens, according to a leaked document. British newspaper The Guardian published on Wednesday an informal memorandum of understanding between the NSA and the Israel SIGINT National Unit (ISNU). The five-page document was supplied to the newspaper by Edward Snowden, a technical contractor for the NSA who defected to Russia this past summer. It outlines an agreement reached in 2009 between the NSA and the ISNU, under which the American side provides the Israelis with raw intercepts, which often contain telephone and email data belonging to American citizens. The memorandum describes this type intelligence sharing as a “routine” aspect of a broader “SIGINT relationship between the two organizations”.