Abgehört und abgenickt, NSA und BND – Dokumentation

Der Datenhunger von NSA & Co ist riesig. Der Umfang der Abhöraktivitäten ist gigantisch. Auch wollen die USA damit keineswegs aufhören. Die Reportage zeigt dem Umfang der Spionage und dass deutsche Politiker davon hätten wissen können.

Ghost in the Cloud, Kevin Mitnick @ Strictly Mobile 2015

Once one of the FBI’s Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide.

Kevin and The Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. As CEO and chief “white hat” hacker at one of the most advanced boutique security firms in the world, Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin also helps consumers—from students to retirees— learn how to protect their information and themselves from harm, using understandable terms and a friendly approach.

Kevin’s insights on current events are highly sought, leading to hundreds of media appearances. He is the world’s top cybersecurity speaker, and has been a commentator, security analyst, or interview subject on CNN, CNBC, Al Jazeera, FOX News, CBC, BBC, Radio Moscow, Tech TV, National Public Radio, Good Morning America, and 60 Minutes—to name just a few. He has been called before Congress (both the House and the Senate) to testify on security matters affecting the United States.

Kevin Mitnick demonstrates how easy it is for a hacker read your email messages

Kevin Mitnick demonstrates how easy it is for a hacker to tap into your network and read your email messages, even if it’s a fiber optic network.
Kevin Mitnick, famous former black hat hacker, demonstrates just how easy it is for a hacker to tap into your network and read your email. And he’s doing it with a fiber optic network connection, not a simple and very non-secure CAT5x or CAT6x network wire. And he doesn’t have to connect to the Internet, your network, or any outside resources to do this. He clamps onto a fiber optic “wire”, opens Wireshark, and sniffs away your most guarded secrets.

Mitnick demonstrates in under five minutes how he could get near your network, set up a clandestine connection, sniff your network, grab your passwords, email, anything sent “over the wire” unencrypted, and disappear within minutes. And you’d never catch him doing it.