Introduction: In recent years, the Russian government has been using disinformation campaigns to manipulate public opinion and maintain control. These campaigns have primarily targeted other countries, but recently, they have also been directed at Russian citizens. In this case study, we will examine the tactics used by the Russian government and the role of media… Read More Russian Media Disinformation: Insights and Analysis from News Monitors
The U.S. is once again aggressively banning Chinese-manufactured digital communications equipment. Let us all be thankful. On Dec. 2 the Federal Communications Commission expanded and toughened its ban on the “sale and import” of Chinese technology manufactured by firms the FCC determined present an “unacceptable risk” to U.S. national security. The firms include Huawei Technologies… Read More Chinese Dual Use Technology. From 5G to IOT Devices, System “backdoors” Used As Offensive Weapons.
In late 2020 a growing number of Iranians in the capital (Tehran) were openly complaining of an odd problem with the GPS on their cellphones. At seemingly random times the GPS indicated another location than the one the user knew they were at. After months of complaints to the city government were ignored, one frustrated… Read More From China To Iran: A In-Depth Look At GPS Spoofing Technology
In late 2020 someone carried a major hacking attack on Israeli supply and logistics firms. Worse, it wasn’t a ransomware attack demanding money but simply to obtain information, and this series of attacks was very successful. The attackers first penetrated Amital Data, an Israeli software developer that supplies specialized software to firms that distribute goods.… Read More Analysis: On the Fallout from the Amital Cyber Attack. Tracking Bitcoin Payments Back to Iran
News Monitors/Strategy Page – Yet another North Korean Cyber War attack on South Korea was recently discovered. This one involved a successful effort to hack an Android bus navigation app used in four South Korean cities. The malware, once on the phone, sent back all information found on the phone that included matching one of… Read More Information Warfare: North Korean Sith Incentives
In terms of understanding and engaging customers, the video game industry has gone through a massive transformation in recent years. Before this transformation, video games were physical products that could be purchased over the counter, with little to no understanding of player retention or behavioral analysis for the people who sold them. That all… Read More Data Mining and Video Games: Drawing in a New Generation of Players to Soldiers and Fight
Three misconfigured AWS S3 buckets have been discovered wide open on the public internet containing “dozens of terabytes” of social media posts and similar pages – all scraped from around the world by the US military to identify and profile persons of interest. The archives were found by UpGuard’s veteran security-breach hunterChris Vickery during a routine scan of… Read More News Monitors Inc. explains 2017’s Massive US military social media spying archive left wide open in AWS S3 buckets
Scientists from RMIT University and Wuhan Institute of Technology demonstrated a next-generation optical disk with up to 10TB capacity and a six-century lifespan using gold nanoparticles. The technology could radically improve the energy efficiency of data centers according to the researchers, using 1000 times less power than a hard disk center by requiring far less cooling and… Read More News Monitors Blog: Bits: Data storage; polymer supercapacitors; zero field switching.
The influence score is News Monitors scoring system to identify which mentions are of higher importance. The score is currently available for 3 sources: Twitter, Web, and Instagram. It is always a number between 0 and 100 for all sources in order to be able to compare one with the other. Below you can see… Read More News Monitors Analytics: How is STRENGTH, SENTIMENT, INFLUENCERS, PASSION, AND REACH score calculated?