GlobalIntelHub2

CIA stops spying on friendly nations in W. Europe

WASHINGTON (AP) — Stung by the backlash over a German caught selling secrets to the U.S. and the revelations of surveillance by the National Security Agency, the CIA has stopped spying on friendly governments in Western Europe, according to current and former U.S. officials. The pause in decades of espionage was designed to give CIA […]

Continue Reading
GlobalIntelHub2

Governments spy on journalists with weaponized malware – WikiLeaks

Journalists and dissidents are under the microscope of intelligence agencies, Wikileaks revealed in its fourth SpyFiles series. A German software company that produces computer intrusion systems has supplied many secret agencies worldwide. The weaponized surveillance malware, popular among intelligence agencies for spying on “journalists, activists and political dissidents,” is produced by FinFisher, a German company. […]

Continue Reading
GlobalIntelHub2

China wants explanation on allegations of US spying

China has demanded a clear explanation from the United States following reports that it infiltrated the servers of the Chinese telecoms giant, Huawei. The company said it would condemn the invasion of its networks if the reports in the New York Times were true. The newspaper quoted documents, allegedly from the US National Security Agency […]

Continue Reading
GlobalIntelHub2

Busted! – U.S. Tech Giants Knew Of NSA Spying Says Agency’s Senior Lawyer

GIH: As it turns out, tech giants were in fact working with the NSA to collect user data electronically.  They have vehemently denied this.  It seemed to make more sense, that NSA had worked with them, compared to NSA being able to hack on multiple levels their systems.  Although the NSA has developed many technologies […]

Continue Reading
GlobalIntelHub2

Why HTTPS and SSL are not as secure as you think

GIH: We are led to believe that by installing a certificate, or by other common security practices, we are safe.  The following shows that this may not be the case, especially considering the vulnerabilities of HTTPS protocol, the commonly accepted ‘safe’ way to browse: In this day and age of well-known NSA spying, everyone keeps […]

Continue Reading
GlobalIntelHub2

‘What does ISP mean?’

GIH: Shocking information has come forth that government officials responsible for cybersecurity initiatives do not have basic knowledge about the internet, such as what an “ISP” is.  How can those who know nothing about a topic regulate or execute it? One of the world’s leading cyberwarfare experts has warned of the damaging lack of government […]

Continue Reading
GlobalIntelHub2

How the NSA Plans to Infect ‘Millions’ of Computers with Malware

GIH:  As more information comes out about various spy agencies and their cyber divisions, it seems that those such as the NSA pose a larger threat to internet security than the hackers they are supposedly protecting us from.  The following information should make any user of the internet, be it a business or individual or […]

Continue Reading
GlobalIntelHub2

ALERT: Point of Sale RAM scraper malware

Advances in technology have led to more sophisticated crimes by exploiting security vulnerabilities of new technologies.  This is exacerbated by the fact that understanding of these technologies and their use is only by a few, while the majority of end-users are unaware.  Generally speaking, following standard security practices will thwart 95% of electronic crimes such […]

Continue Reading
GlobalIntelHub2

FBI moves from policy of Law Enforcement to National Security

The FBI’s creeping advance into the world of counterterrorism is nothing new. But quietly and without notice, the agency has finally decided to make it official in one of its organizational fact sheets. Instead of declaring “law enforcement” as its “primary function,” as it has for years, the FBI fact sheet now lists “national security” […]

Continue Reading
GlobalIntelHub2

Inside TAO: Documents Reveal Top NSA Hacking Unit

More leaked documents reveal a secret NSA hacking operation, with techniques ranging from physical implants of malware (sometimes hardware) to infiltrating Telecom networks, and even exploiting Microsoft updates to infect the target machine.  TAO has existed since 1997, but recently interest in the program is exploding, as seen by the drastic increase in the number […]

Continue Reading