Hacked: Hacking Finance

Hacked: Hacking Finance


Navigation
Tagedward snowden
Featured

Cybersecurity

Snowden Leak Exposes UK Government’s Citizen Spying, Links to GCHQ

Posted on October 17th, 2016.

In a classified document leaked by NSA whistleblower Edward Snowden five of the U.K.’s ‘intercepting law enforcement agencies’ have accessed millions of U.K. citizens phone records and Internet activity. Dated March 9, 2011, the leaked document, published by The Intercept, identifies the MI5, the National Crime Agency previously known as...

Featured

Cybersecurity

Edward Snowden Ties? FBI Arrests Maryland Man For Stealing NSA Documents

Posted on October 5th, 2016.

Sometime in the last several weeks, FBI agents secretly arrested Harold Martin, of Glen Burnie, Maryland, and conducted a search of his house. Martin, a 51-year-old contractor who worked for the same NSA contractor as Edward Snowden, was found in possession of documents and classified computer files. Additional data and documents were...

Featured

Communication

Mystery Circulates Edward Snowden After Cryptic Tweet

Posted on August 11th, 2016.

Edward Snowden has left a cryptic tweet sparking concern among the masses that his safety is in question. The whistleblower recently tweeted a 64-character hex code that was traced to a bitcoin transaction amounting to 0.000911, leading many to question whether or not this was a dead man’s switch, which is an automatic message that...

Featured

Cybersecurity

FBI’s Claim That Only Apple Can Unlock the iPhone Is “Horseshit”, Says Edward Snowden

Posted on March 9th, 2016.

NSA whistleblower and former NSA employee Edward Snowden has claimed that the FBI’s claim that only Apple can unlock the iPhone belonging to the dead terrorist from the San Bernardino shooting is simply untrue. Speaking from Moscow, Snowden was a part of a discussion at Common Cause’s conference called Blueprint for a Great Democracy,...

Featured

Cybersecurity

Former Director: NSA Are the Best Thieving Hackers in the World

Posted on January 13th, 2016.

General Michael Hayden had some interesting things to say about his former employers, the National Security Agency (NSA). The former director of the NSA made no qualms while speaking about cyberespionage operations at a recent cybersecurity conference in Miami Beach. Hayden delivered the keynote address at the S4X16 conference, with the...

Featured

Activism

Top Secret Document Indicates NSA Knew Of Juniper Vulnerabilities In 2011

Posted on December 24th, 2015.

Juniper Networks, a Sunnyvale, Calif-based network hardware manufacturer that last week reported finding an unauthorized code in its firmware making it possible for hackers to access its devices, could have been vulnerable for several years, based on a top-secret document released by Intercept, a website dedicated to transparency in...

Featured

Business

Giant German Web Publisher Axel Springer Is Suing an Ad-Blocker

Posted on November 24th, 2015.

It’s a wonder web publishers are able to make a living anymore, in that most people unapologetically use some form of ad-blocking software. The conscientious visitor to a given website will turn off the blocker for that site, in hopes that the site is able to continue to produce the content that brings them there. There is also the...

Featured

Cybersecurity

Is the NSA Using Zero-Day Exploits before Reporting Them?

Posted on November 10th, 2015.

According to the NSA, it will report zero-day security vulnerabilities to software vendors “9 out of 10 times.” The other 10% of the time, it won’t say what it does with them, but it does say there are times when the military and national security benefits outweigh the benefit to disclosing vulnerabilities to vendors. The leaks of...

Featured

Eavesdropping

Google Stores Your Voice Searches

Posted on October 27th, 2015.

Google users probably are aware that Google keeps a record of all searches made by a given logged-in user. Likely enough, they also keep track of the data by other means, such as IP address, though this is not advertised. Google does its best to make the tracking into a feature. Occasionally one might actually forget what they’d...

Featured

Artificial Intelligence

Whistleblower Releases Documents About Secret US Drone Assassination Program

Posted on October 16th, 2015.

Paradoxically, the United States, which has engaged itself in a conflict in nearly every decade for the past century, does not condone assassinations. Congress has refused time and again to do anything to define or outlaw the practice, but generally American exceptionalism prevents the word “assassination” from being used in terms of the...

Featured

Cybersecurity

Cyber Warfare: The New Arms Race

Posted on October 13th, 2015.

After spending billions to build nuclear weapons, a different arms race has emerged in cyber warfare. Where the nuclear arms race pits the larger countries against each other, the cyber arms race includes a much larger number of combatants since it is open to almost anyone with cash and a computer, according to a front-page article in...

Featured

Cybersecurity

Snowden: Cisco Routers a Pakistani National Security Risk

Posted on October 7th, 2015.

British GHCQ used hacked Cisco routers to spy on Pakistan, according to NSA whistleblower Edward Snowden. The purpose of the router exploits was to help identify Middle Eastern terrorists operating in Pakistan. The UK government did not provide comment on Snowden’s claims.  Cisco routers have been known to ship with bugs in the...

Featured

Hacking

Smurf Suite: Edward Snowden Claims GCHQ Has Total Control of Tracking Smartphone Users

Posted on October 6th, 2015.

The infamous whistleblower claims that the UK Intelligence Agency GCHQ can use secret technology (Smurf Suite) to track and control any Smartphone in the country. In a recent interview with BBC (video below), Edward Snowden talked about how a new GCHQ technology is secretly hacking phones. According to him, they can access photos, steal...

Featured

Activism

Edward Snowden Joins Twitter and Follows the NSA

Posted on September 29th, 2015.

10 thousand new followers every three minutes. Edward Snowden’s foray into Twitter has gone viral. Edward Snowden was and is a wanted man. He is, however, not being subtle about it. The NSA whistleblower just joined Twitter and had this to say: A former employee of the CIA, Snowden, now living in Russia after seeking asylum has also...

Featured

Science

We wouldn’t be able to decrypt SETI messages from aliens, says Edward Snowden

Posted on September 28th, 2015.

Whistleblower Edward Snowden appeared last week on the StarTalk podcast hosted by astrophysicist and superstar science communicator Neil DeGrasse Tyson. Snowden, via robotic telepresence from Moscow, discussed a lot of interesting issues with Tyson, including not only data compression, encryption, and privacy, but also science,...

Featured

Cybersecurity

Karma Police: UK’s GCHQ Probably Monitored You on the Internet

Posted on September 25th, 2015.

Newly published documents reveal that UK’s intelligence agency, the Government Communications Headquarters (GCHQ) undertook an operation titled “Karma Police”, a program set up to track the browsing habits of “every visible user on the internet.” In a startling revelation unearthed in documents published today by the Intercept, the GCHQ...

Featured

Activism

White House Responds to Edward Snowden Petition

Posted on July 30th, 2015.

More than a 165,000 people signed a petition asking for Edward Snowden to be pardoned. A White House official responded to the petition recently, saying that the Snowden advocates forgot crucial elements of what he had done. According to Lisa Monaco, Snowden did not illuminate us all about the sinister elements at work within our...

Featured

Communication

Metadata Doesn’t Always Mean Metadata: New Snowden Revelations Reveal Government Spying Went Much Deeper

Posted on July 4th, 2015.

Many were not surprised when NSA-contracted analyst Edward Snowden blew the whistle on the government organization, revealing massive, likely illegal domestic spying programs. As the details came out, the government went into full damage control, and one keyword that surfaced was “metadata.” It was just metadata they were...

Featured

Business

Department of Homeland Security Desperately Wants Greater Co-operation From Silicon Valley

Posted on April 27th, 2015.

At the RSA conference, Secretary of Homeland Security Jeh Johnson addressed hundreds of security professionals, delivering a message that was perhaps not well-received. There were two very important notes in the speech. One, that DHS will be building a satellite office in somewhere near the San Francisco valley, “to strengthen...

Featured

Eavesdropping

Senate Compiling Database of US Spy Programs

Posted on April 10th, 2015.

Democratic Senator Dianne Feinstein, who has served 25 years for the state of California and is best known for her crusade against guns and violence, particularly violence in video games, has given a rather candid interview to the Associated Press. She explained that the Senate Intelligence Committee has been so overwhelmed by the...