espionage   3399

« earlier    

Huawei Sting Offers Rare Glimpse of U.S. Targeting Chinese Giant - Bloomberg
The article kinda lightly brushed over this, but where is Huawei/it's associates getting a 100KW laser for such destructive testing?
diamond  thin  film  coating  industrial  espionage  Huawei 
2 days ago by asteroza
What is SS7 and is China Using It To Spy on Trump’s Cell Phone?
In 1980, the International Telecommunications Union codified Signaling System 7 as the international standard protocol for telephone signaling. Signaling is the technical term for giving information to a network that tells it how to route a call, such as dialing a phone number. When SS7 was adopted as a standard protocol for routing telephone calls, it marked a revolution in telephony.

Prior to SS7, signaling information was sent on the same channel as the call itself: A user would dial a number (signal) and talk on the same wires, so to speak. SS7, on the other hand, established separate channels for signalling and the actual call. This not only allowed for remarkably higher data transmission rates, but it also allowed for signalling to occur at any point during the call instead of just at the beginning. This drastically improved the quality and reliability of phone calls.

By the new millennium, however, the cracks in the SS7 protocol were starting to show. The main problem with the SS7 network was that it treats all information sent over the network as legitimate. Thus, if a bad actor gains access to the network they can prey on this system of trust and use it to manipulate or intercept the signaling information that is sent. In 1999, the Third Generation Partnership Project (3GPP), a consortium of organizations that deal with telecom standards, issued a distressing warning about vulnerabilities found in SS7.
telecommunications  infosec  espionage 
12 days ago by campylobacter
What Keeps the Spies Up at Night
This year’s “Worldwide Threat Assessment” — compiled by the country’s 17 intelligence agencies — is lengthy and growing: terrorism, climate change, hostile foreign powers, rising nationalism, illegal drugs, cyberattacks and organized crime. Those threats will “expand and diversify” in 2019, the director of national intelligence, Dan Coats, told the Senate Intelligence Committee at a hearing on Tuesday.

Many critics were quick to note where the consensus judgments of the intelligence community differed with the statements and policies of the Trump administration.
And while Mr. Trump and his populist fellow travelers may cheer chaos in the European Union, Brexit and the rise of nationalism across Europe, the report notes that those are also all major objectives of Russian foreign policy.
by:TheNewYorkTimes  from:TheNewYorkTimes  espionage  realpolitik  politics  geo:UnitedStates  geo:UnitedKingdom  geo:Russia 
17 days ago by owenblacker
Huawei offered bonuses to employees for stealing trade secrets: DOJ - Business Insider
The Chinese electronics giant Huawei offered bonuses to its employees for stealing confidential information from outside companies, according to an indictment of the company on fraud charges issued Monday by the US Department of Justice. - OUCH!
China  Trade  Espionage 
18 days ago by neuralmarket
Black Cube | Creative Intelligence | BlackCube
A select group of elite Israeli intelligence community who specializes in tailored solutions to complex business and litigation challenges
spy  intel  espionage  corporate 
21 days ago by dcowhig
The Offbeat Genius of a Great American Spy - WSJ
By Sam Walker
Jan. 26, 2019

this experiment in deception and illusion became the central pillar of a unique operational mindset known as “the Moscow Rules.” By learning to outfox the KGB, the Moscow station not only connected with TRIGON, it scored some the biggest espionage coups in American history.
CIA  deception  espionage  illusions  obituaries  security_&_intelligence  spycraft 
21 days ago by jerryking
The Messy Truth About Infiltrating Computer Supply Chains
The danger of China compromising hardware supply chains is very real, judging from classified intelligence documents, even if a Bloomberg story on the matter is highly disputed.
manufacturing  espionage  hardware  security  electronics 
22 days ago by basemaly
Cyberwarfare by China - Wikipedia
Foreign Policy magazine puts the size of China's "hacker army" at anywhere from 50,000 to 100,000 individuals.[2]
awareness  cyber  warfare  espionage  politics 
4 weeks ago by dandv
Your Boss NEEDS To Read This WSJ Article About Our Power Grid And How The Russians Hacked It With Phishing
Russian hackers use malicious emails to steal credentials from utility company employees

Using stolen credentials, hackers remotely access power utility workstations & run malicious code

From the compromised workstation can gain access to the utility's Supervisory Control And Data Acquisition System (SCADA)

SCADA controls utility assets, including substations and power generation facilities

"America’s Electric Grid Has a Vulnerable Back Door—and Russia Walked Through It"
espionage  Russia  infrastructure  infosec  security 
4 weeks ago by campylobacter

« earlier    

related tags

-  12  2009  2013  2018  2devon  5g  a  abudhabi  action  activemeasures  advertising  amazon  americana  analysis  and  apple  apt  apt10  are  articles  artificial_intelligence  attack  au—thieves  awareness  aws  badtech  be  bloomberg  book  books  breached  british-empire  bug  bureucracy  by:thenewyorktimes  canpoli  charged  china  chinese  cia  cina  clemency  clippings  clothing  coating  cold-war  collection  colleges_&_universities  communications  communism  complete  computer_security  congress  corporate  counterintelligence  countries  cse  csis  current  cyber  cyber_security  cyberattacks  cyberwar  d:2018.10.22  data_breaches  david_sanger  deaths  deception  democracy  diamond  diplomacy  disguise  dod  doping  drama  dual-use  dubai  durhamuniversity  ebook  echelon  electronics  elemental  ethics  executive  facebook  failure  fakenews  falseflag  film  five_eyes  fiveeyes  for  former  from:bloomberg  from:thenewyorktimes  gameresearch  gear  geo:russia  geo:unitedkingdom  geo:unitedstates  getting  google  government.corruption  government  group  gru  hack  hackers  hacking  harder  hardware  hedgesmatthew  heuristics  historic  history  huawei  hurt/comfort  illusions  implant  in  industrial  industrial_espionage  infosec  infrastructure  inspectorgeneral  intel  intellectual_property  intelligence-gathering  intelligence  interesting-people  international_trade  internet  iphone  iran  irvinmcculough  it/information-technology  jerrylee  johnreidy  journalism  judiciary  landofthefree  leak  lilythief  lrb_project  manufacturing  marriott  material  measures  memory  mi6  military  misinformation  mobile+phones  mobile  movies  navy  netherlands  news  newsblur  niall.horan/zayn.malik  novelette  npr  nuclearweapons  nyt  nytimes  obituaries  obituary  officials  on  only  opcw  opsec  organizations  over  p:wired★★  plot-ideas  poland  politics  prison  privacy  process  propaganda.wars  propaganda  psychology  quantum_computing  read-later  realpolitik  recruiting  reference  reports  research  romania  root  rps  russia  russian  saic  salisbury  saudi-arabia  scandal  secrey  security  security_&_intelligence  securitybreach  seek  shows  skripalsergei  slash  social-engineering  social_media  socialmedia  sources  soviet-union  spies  spy  spycraft  spygear  spying  spymasters  steganography  stem  story  strategy  supermicro(super_micro_computer)  supermicro  supply_chain  supply_chain_attach  surveillance  systems  tech  technology  telecom  telecommunications  terrorism  thedonald  thehague  thin  time  tips-and-tricks  to  torture  tough  trade  travel  trump  twitter  u.s.  uae  uk  us  usa  uspoli  vg  video  violence  warfare  warfighting  web  whistleblower  white+house  wired  wireless  with  yahoo  yemen  youtube  zeynep_tufekci 

Copy this bookmark: