Blog Posts Tagged with "WikiLeaks"

03b2ceb73723f8b53cd533e4fba898ee

Anonymous vs Wikileaks...you can condemn a man but not wipe out an ideology

October 18, 2012 Added by:Pierluigi Paganini

Hacktivism is considered one of the main cyber threats and its operations have created serious problems to private businesses and governments, for this reason security expert all over the world are trying to deeply analyze the different movements of dissent and their mutual relationships...

Comments  (0)

Ee5e595fc2be8a24327ce7cefe0f7b2c

Breaches: Digital Transparency, WARPs, and Collective Intelligence

September 19, 2012 Added by:Christopher Laing

For collective intelligence directed at security breaches, I would argue, that an effective means of transparently sharing details without fear of recrimination and embarrassment would greatly reduce the impact of such breaches. Fine idea, but how can this be achieved?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Judge Upholds Charges Against WikiLeaker Bradley Manning

June 12, 2012 Added by:Headlines

Manning is accused of the largest intelligence leak in U.S. history while deployed to Iraq as a military intelligence analyst, including installing unauthorized software onto government computers to extract classified information and transmitting the data to the whistle-blowing group WikiLeaks...

Comments  (0)

6f11dfa37d387cd7c2099ebcd00bccdd

Meet a Cyber Special Ops Warrior: th3j35t3r

June 05, 2012 Added by:Laura Walker

Although the Jester is often described as a cyber vigilante, his operations tend to steer shy of retributive justice and drive more toward disruption of enemy operations. His targets are researched, specific, and his mission is consistent. There is also the psychological component to PWNing the enemy...

Comments  (0)

4777ea0d573c51027a097399006f228a

Not Totally Sure What Just Happened...

May 16, 2012 Added by:ʞɔopuooq ʇuıɐs

As I watched, the conspiracies mounted – one of my favorites is that Smedley is in fact me and I am cashing out or something, so I decided to up the ante. I (probably stupidly in hindsight) unpublished my blog posts and deactivated my twitter to lend credibility to Smedley's claims...

Comments  (1)

6d117b57d55f63febe392e40a478011f

Transcript: Patriot Hacker th3j35t3r Addresses USM Students

April 10, 2012 Added by:Anthony M. Freed

The hacktivist opened himself up to questions regarding his operations, methodologies and motivations - including his campaigns against radical militant websites, his take down of WikiLeaks, his tussles with Anonymous, his military service, and a variety of security issues...

Comments  (4)

7fef78c47060974e0b8392e305f0daf0

AntiSec, Stratfor, WikiLeaks, and Much Ado about Nothing

February 29, 2012 Added by:Infosec Island Admin

Some of us out there know a little bit about how intelligence works. While the likes of WikiLeaks rail about how some are using money and perhaps even sex to sway their sources, the reality is that this game has always been played this way. Intelligence is a dirty business...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

On 2011: The Year of System Failure

December 30, 2011 Added by:Infosec Island Admin

If you really want to see why so much has happened with Anonymous, WikiLeaks, Manning, and OWS you need only look toward Capitol Hill and smell the rank problem that is our governing body. We have are at an apex that has reached the lows of the Roman empire in its decline...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Anonymous: Conflation, Synergy, Diffusion, and Spin

October 11, 2011 Added by:Infosec Island Admin

Anonymous’ use of technology comes naturally, as they formed online. It is with the growth of connectivity that the movement went viral. Some may say it was the targeting. I say the targeting was always there, but those who were feeling the miasma weren’t able to express it in normal ways...

Comments  (7)

39728eff8ac87a48cfb050f0df29ceaa

WikiLeaks: An Insider's Perspective

September 08, 2011 Added by:John Linkous

Many asked why, given that Agencies had the latest incident and event management technologies, the breach had not at least been spotted sooner - even if they were unable to prevent it completely. What followed is a response unlike any I've seen to date in the commercial sector...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Another Suspected Anonymous Member Arrested in UK

August 25, 2011 Added by:Headlines

Scotland Yard has announced the arrest of Peter David Gibson, 22, on charges that the student participated in distributed denial of service (DDoS) attacks organized by the rogue hacktivist group Anonymous, particularly an attack on the online payment processor Pay Pal late last year...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anonymous Spokesman 'Topiary' Arrested in Scotland

July 27, 2011 Added by:Headlines

Scotland Yard says officers from its specialist cybercrime unit have arrested the suspected spokesman of the LulzSec hacking group. In a statement Wednesday the police force says that the 19-year-old was arrested at an address in Scotland. They say he is the hacker known as 'Topiary'...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Indicted iPad Hacker Predicts Internet Revolution

July 25, 2011 Added by:Headlines

“I look at it like the precursor to revolution. I really think this is throwing tea in the bay. I’m tired of seeing a financial industry suck at the trough of 401K’s, looting my nation and leaving us a third-world country..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hackers Deface PBS Site in WikiLeaks Protest

May 31, 2011 Added by:Headlines

"Last night there was an intrusion to PBS' servers. The erroneous information on the PBS NewsHour site has been corrected. We're notifying stations and affected parties to advise them of the situation..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Assange Claims Automated Intelligence Gathering on Facebook

May 04, 2011 Added by:Headlines

"Facebook, Google, Yahoo – all these major US organizations have built-in interfaces for US intelligence. It’s not a matter of serving a subpoena. They have an interface that they have developed for US intelligence to use..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

WikiLeaks Releases Guantanamo Prisoner Files

April 25, 2011 Added by:Headlines

The revelations in those documents range from intelligence on the whereabouts of Al Qaeda leaders to the individual stories of often-innocent detainees to the ugly and ineffective improvisations on intelligence gathering within Guantanamo’s operations...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »