“Elite GCHQ teams targeted employees of mobile communications companies and billing companies to gain access to their company networks. The spies used fake copies of LinkedIn profiles as one of their tools. The Belgacom employees probably thought nothing was amiss when they pulled up their profiles on LinkedIn, the professional networking site. The pages looked the way they always did, and they didn’t take any longer than usual to load.The victims didn’t notice that what they were looking at wasn’t the original site but a fake profile with one invisible added feature: a small piece of malware that turned their computers into tools for Britain’s GCHQ intelligence service.”
Related posts:
New York Fed Massively Disagrees With DOE's Student Loan Default Data
Microsoft and Google to sue over U.S. surveillance requests
Ron Paul Gets Cut Off During Interview On Syria With Wolf Blitzer
Snowden spy squabble deepens as U.S. is accused of hacking China
House protects surveillance program before passing military spending bill
Ex-Fed chief Bernanke denied loan to refinance his home
Dad Finds 4th-Grader's Crayon-Written Paper: ‘I'll Give Up Constitutional Rights To Be Safer'
A Christian Alternative to Health Insurance (ObamaCare Exempt)
Trump blames Democrats for family separation policy at the border
Did cops need to kill a 95-year-old veteran with a Taser, riot shield and shotgun?
FBI continues to investigate Hastings for 'controversial reporting'
Greek Stocks Fall After Failed Gas Company Sale
Obama couldn’t eat at Hill meeting without food ‘taster’
Muslim leaders urge ‘decisive action’ against Syria
FBI allowed informants to commit 5,600 crimes in one year