Surveillance

ICIT Analysis: America Exposed – Who’s Watching You Through your Computer’s Camera?

Virtually every computer, smartphone, and internet-enabled mobile device has a camera and microphone that can be used by malicious threat actors to surveil and spy on the user. Using malware such as NanoCore RAT and Nuclear RAT 2.0, Cyber Criminals, Script Kiddies, and Nation State APTs can compromise devices and remotely monitor the activities of .. read more

ICIT Analysis – S.J. Res. 34 – Introduction of Privatized Censorship

With S.J.Res.34, every citizen will have massive amounts of their data exposed when their ISP or a nebulous third-party intentionally or inadvertently fails to adequately secure the information. By drastically expanding that collection, storage, and exchange of data with a few short lines of legislation, Congress has jeopardized the security and privacy of every citizen, every .. read more

ICIT Publication: Dragnet Surveillance Nation: How Data Brokers Sold Out America

With recent accusations of fake news and the weaponization of information as a mechanism of steering public perceptions dominating headlines around the world, have you ever considered the reality that private dragnet surveillance via social media properties, ISPs, search engines, health sector organizations etc., heavily contribute to the problems of adversarial intervention and streamlined distribution .. read more

ICIT Meets with Representatives Comstock, Lofgren, Massie, Poe; to speak at British Embassy and U.S. Senate

The Institute for Critical Infrastructure Technology met last Friday with senior technology and intelligence leads from U.S. House of Representatives members Barbara Comstock (MD), Ted Poe (TX), Zoe Lofgren (CA) and Thomas Massie’s (KY) offices to provide advisory on issues ranging from surveillance technology, threat intelligence, and privacy / civil liberties. Last week’s passage of .. read more