nsa Archives | Hacked: Hacking Finance
Hacked: Hacking Finance

Hacked: Hacking Finance


Archives


Navigation
Tagnsa
Featured

Cybersecurity

Edward Snowden Ties? FBI Arrests Maryland Man For Stealing NSA Documents

Posted on October 5th, 2016.

Sometime in the last several weeks, FBI agents secretly arrested Harold Martin, of Glen Burnie, Maryland, and conducted a search of his house. Martin, a 51-year-old contractor who worked for the same NSA contractor as Edward Snowden, was found in possession of documents and classified computer files. Additional data and documents were...

Featured

Cybersecurity

Former Director: NSA Are the Best Thieving Hackers in the World

Posted on January 13th, 2016.

General Michael Hayden had some interesting things to say about his former employers, the National Security Agency (NSA). The former director of the NSA made no qualms while speaking about cyberespionage operations at a recent cybersecurity conference in Miami Beach. Hayden delivered the keynote address at the S4X16 conference, with the...

Featured

Cybersecurity

Is the NSA Using Zero-Day Exploits before Reporting Them?

Posted on November 10th, 2015.

According to the NSA, it will report zero-day security vulnerabilities to software vendors “9 out of 10 times.” The other 10% of the time, it won’t say what it does with them, but it does say there are times when the military and national security benefits outweigh the benefit to disclosing vulnerabilities to vendors. The leaks of...

Featured

Eavesdropping

Google Stores Your Voice Searches

Posted on October 27th, 2015.

Google users probably are aware that Google keeps a record of all searches made by a given logged-in user. Likely enough, they also keep track of the data by other means, such as IP address, though this is not advertised. Google does its best to make the tracking into a feature. Occasionally one might actually forget what they’d...

Featured

Cybersecurity

Snowden: Cisco Routers a Pakistani National Security Risk

Posted on October 7th, 2015.

British GHCQ used hacked Cisco routers to spy on Pakistan, according to NSA whistleblower Edward Snowden. The purpose of the router exploits was to help identify Middle Eastern terrorists operating in Pakistan. The UK government did not provide comment on Snowden’s claims.  Cisco routers have been known to ship with bugs in the...

Featured

Cybersecurity

Quantum Cryptography Uses Fundamental Physics to Protect Secret Data

Posted on September 1st, 2015.

In August, the NSA updated its list of encryption algorithms approved for government use, with specific references to the emerging threat of future quantum computers able to break the best encryption methods used today. Last week, quantum physicists confirmed the solid foundations of quantum cryptography, which offers total security...

Featured

Companies

At&T Partnered With The NSA To Spy

Posted on August 18th, 2015.

A newly released document by Edward Snowden has revealed that AT&T has been collaborating with the NSA by helping them to spy on US internet traffic for many years, reported the New York Times.  Holistically, AT&T isn’t the only telecom company that assisted the NSA but the company’s desire and willingness to go the extra mile,...

Featured

Breaches

US Targets By China Cyber Attacks Shown On Secret NSA Map

Posted on August 3rd, 2015.

NBC News has been able to exclusively obtain a secret NSA map which indicates massive cyber assault by the Chinese government on the United States of America’s economy. The assaults were directed at all sectors of the economy of the United States of America including defense contractors like Lockheed Martin and international...

Featured

Cybersecurity

NSA Summer Camp Trains Horde of Script Kiddies

Posted on July 20th, 2015.

GenCyber is the NSA Summer Camp program taking place across America co-sponsored by the National Science Foundation. The partnership is working with 29 university campuses in 18 states to expose middle and high school students to the problems of cyber security. The camps are free to participate and the NSA hopes to expand the program to...

Featured

Communication

Metadata Doesn’t Always Mean Metadata: New Snowden Revelations Reveal Government Spying Went Much Deeper

Posted on July 4th, 2015.

Many were not surprised when NSA-contracted analyst Edward Snowden blew the whistle on the government organization, revealing massive, likely illegal domestic spying programs. As the details came out, the government went into full damage control, and one keyword that surfaced was “metadata.” It was just metadata they were...

Featured

Breaches

GCHQ Spies Given License to Hack

Posted on June 29th, 2015.

Britain recently permitted spies to disassemble and reverse engineer a wide range of popular software. The products range from online bulletin board systems to commercial encryption and anti-virus programs. Such activity violates copyright law. GHCQ purported sought warrants to protect itself from such scrutiny. Despite its effort to...

Featured

Cybersecurity

TrueCrypt Passes Security Audit, Project’s Future Still Unclear

Posted on April 8th, 2015.

Last year, the developers of popular disk encryption software TrueCrypt, used by Edward Snowden and countless other privacy advocates, abruptly abandoned the project, stating,

Featured

Cybersecurity

UK Government Authorized GHCQ to Hack Any Device

Posted on March 28th, 2015.

Last year, Privacy International legally challenged the UK government for information on its hacking powers via GHCQ. The request was based on documents leaked by Edward Snowden which alleged state-sponsored hacking. Not on the part of governments like the Democratic People’s Republic of Korea, but on the part of western...

Featured

Breaches

Another Air-Gap Bridge Discovered, Using Heat

Posted on March 24th, 2015.

A fairly common set up for air-gap security, the set up which cuts a system off from all networking on a permanent basis, is to have air-gapped computers near regular workstations so that they are easily accessible. For a long time, the common wisdom has been that this is the only way to be truly secure from remote attacks. Local...

Featured

Breaches

ISIS Has Allegedly Doxed 100 US Military Personnel

Posted on March 23rd, 2015.

Normally, when a hacker doxes an individual, it is to make them uncomfortable or in some cases to shame them, as in the case of exposing the secretive e-mails of public officials or corporations. It has traditionally not been done with the express intent of getting someone killed. There have been cases where a snitch has done so much...

Featured

Cybersecurity

China Has “Penetrated Every Major Corporation,” Says Intelligence Expert

Posted on March 17th, 2015.

John Michael McConnell was the director of the NSA under Bill Clinton and later the Director of National Intelligence under George W. Bush, and during a speech in Missouri on Thursday, he said that the Chinese have systematically infiltrated organizations in the US, from the Department of Defense to major corporation US Steel.

Featured

Breaches

NSA Spying Goes Deeper, to Hard Drive Firmware

Posted on February 17th, 2015.

Reuters is reporting on a chilling, recent discovery by Russian cyber-security firm Kaspersky Labs that spy agencies have reached a milestone in the ability to spy on PCs. In examining computers from Iran, Russia, China, and others, the company discovered that the Stuxnet-like malware was embedded deeper than ever before, in the firmware...

Featured

Breaches

US Still Convinced North Korea Attacked Sony

Posted on January 28th, 2015.

While several security researchers have come out with evidence linking groups such as the Lizard Squad to the Sony Pictures attack last year, the government is sticking to its guns in its accusation that the Democratic People’s Republic of North Korea is in fact directly responsible.

Featured

Communication

42 Years Before Edward Snowden Leak Finishes

Posted on January 20th, 2015.

The files leaked to the press by former NSA contractor and international fugitive Edward Snowden will take 42 years to reach the light of day, one website that tracks the matter estimates. Since the documents were dumped on Guardian journalist Glenn Greenwald and filmmaker Laura Poitras in June, 2013, only around 3,400 of the estimated...

Featured

Breaches

Snowden Documentary, Citizenfour, Nominated for Best Documentary Oscar

Posted on January 18th, 2015.

In the recent years, documentaries have been making a big impact on the topics of discussion we have in our daily life. Last year, Blackfish made headlines for highlighting the mistreatment of Orca whales, also known as “killer whales,” at SeaWorld. This year, it looks like the Edward Snowden documentary called Citizenfour, directed by...

The team:
Dmitriy Lavrov
Analyst
Dmitriy Lavrov is a professional trader, technical analyst and money manager with 10 years of trading experience. He covers Forex, Commodities and Cryptocurrencies. He is among the top 10 most Read More
Jonas Borchgrevink
Founder
Jonas Borchgrevink is the founder of Hacked.com and CryptoCoinsNews.com. He is a serial entrepreneur, trader and investor. He shares his own personal journey on Hacked.com.
P.H. Madore
ICO Analyst
P. H. Madore lives in Arkansas with his wife and children. He has covered the cryptocurrency beat over the course of hundreds of articles for Hacked’s sister site, CryptoCoinsNews, as Read More
Mate Csar
Analyst
Trader and financial analyst, with 10 years of experience in the field. An expert in technical analysis and risk management, but also an avid practitioner of value investment and passive Read More
Justin O’Connell
Journalist
Justin O’Connell is a cryptocurrency journalist who works have appeared in the U.S.’s third largest weekly, the San Diego Reader & VICE.
Mati Greenspan
Analyst
Senior Market Analyst at Etoro.com.
Rakesh Upadhyay
Analyst
Rakesh Upadhyay is a Technical Analyst and Portfolio Consultant for The Summit Group. He has more than a decade of experience as a private trader. His philosophy is to use Read More
Pamela Meropiali
Account Manager
Pamela Meropiali is responsible for users on Hacked.com.
Joseph Young
Journalist
Joseph Young is a finance and tech journalist & analyst based in Hong Kong. He has worked with leading media and news agencies in the technology and finance industries, offering Read More