This video demonstrates how to install and configure McAfee Threat Intelligence Exchange and the data-exchange layer. Additional information: McAfee Threat Intelligence Exchange: http://www.mcafee…
17 retweets 11 favorites
Ever since The Intercept published this story about the US government’s Terrorist Screening Database, the press has been writing about a “second leaker”: The Intercept article focuses on the growth in U.S. government databases of known or suspected terrorist names during the Obama administration. The article cites documents prepared by the National Counterterrorism Center dated August 2013, which is after Snowden left the United States to avoid criminal charges.
The latest Snowden story is a catalog of exploit tools from JTRIG (Joint Threat Research Intelligence Group), a unit of the British GCHQ, for both surveillance and propaganda. It’s a list of code names and short descriptions, such as these: GLASSBACK: Technique of getting a targets IP address by pretending to be a spammer and ringing them. Target does not need to answer
According to NSA documents published in Glenn Greenwald’s new book No Place to Hide , we now know that the NSA spies on embassies and missions all over the world, including those of Brazil, Bulgaria, Colombia, the European Union, France, Georgia, Greece, India, Italy, Japan, Mexico, Slovakia, South Africa, South Korea, Taiwan, Venezuela and Vietnam. This will certainly strain international relations, as happened when it was revealed that the U.S. is eavesdropping on German Chancellor Angela Merkel’s cell phone — but is anyone really surprised