Security News
Qihoo 360, one of the most prominent cybersecurity firms, today published a new report accusing the U.S. Central Intelligence Agency to be behind an 11-year-long hacking campaign against several Chinese industries and government agencies. The claims made by the company are based on the evidential connection between tools, tactics, and procedures used by a hacking group, dubbed 'APT-C-39' against Chinese industries, and the 'Vault 7' hacking tools developed by the CIA. As you may remember, the massive collection of Vault 7 hacking tools was leaked to the public in 2017 by the whistleblower website Wikileaks, which it received from Joshua Adam Schulte, a former CIA employee who is currently facing charges for leaking classified information.
Starting in the 1970s and continuing through the 1990s, the U.S. Central Intelligence Agency and the German BND intelligence service secretly controlled the majority of the Swiss firm Crypto AG, giving the two agencies access to the company's communication equipment, which was used around the world for top-secret government messages, according to the reports. A former Crypto AG worker told Switzerland's SRF television station that he would find two sets of encryption algorithms within the company's devices.
Swiss authorities said Tuesday they have opened an investigation into allegations a Zug, Switzerland-based maker of encryption devices was a front operated by the CIA and West German intelligence that enabled them to break the codes of the countries that used their products. A joint investigation published Tuesday by Germany's ZDF public broadcaster and The Washington Post based on documents from the CIA and Germany's BND foreign intelligence agency revealed that Crypto AG made millions of dollars for the two agencies, while providing them with access to the encrypted communications of more than 120 countries for decades.
You appear to be a knowledgable individual, however I just think is a disservice to humanity to iterate Donald Rumsfelds saying about unknown unknowns, and so to clarify, it was you that brought along the saying about 'known knows', 'unknowns knowns' and 'unknown unknowns'. A danger here imo, in having this exclusive way of describing things, in thinking that the very things projected in a theory, are real, such that doubts or questions about their existence becomes something of an impossibility because they are not only speculatively assumed, but they presumably become something like an existential, like an tangible emotion or required thinking, a very powerful influencing moment in thinking, because of how such actualizes your understanding of the world, even when confronted with say objections.
A prosecutor told a jury at the opening of an espionage trial Tuesday that an angry CIA employee got his vengeance by committing the agency's biggest leak of classified information ever, but a defense lawyer said her client was innocent. Assistant U.S. Attorney David Denton pointed at 30-year-old Joshua Adam Schulte in a Manhattan courtroom as he blamed him for the massive leak of secrets that was published by WikiLeaks in March 2017.
Saudi Arabia's King Salman hosted the Central Intelligence Agency's director Thursday, state media said, after three people were charged in the US with spying on Twitter users critical of the...
A Spanish private security firm, which is under investigation in Madrid, spied on Wikileaks founder Julian Assange on behalf of the CIA while he was inside the Ecudoran embassy in London, El Pais...
Kaspersky warns of fake 'dirty agent' scam circulating Fraudsters are posing as CIA investigators gone rogue in emails to marks, offering to take bribes to drop bogus investigations into the...
...And more from the world of infosec this week Roundup Here's a quick catch-up of all things infosec beyond what we've already reported this week.…
Or so claims Symantec Months before CIA-built hacking tools were leaked to the public by a group calling itself the Shadow Brokers, the exploit code was apparently being used by Chinese state...