FBI SEIZED CONGRESSIONAL CELLPHONE RECORDS RELATED TO CAPITOL ATTACK
Ken Klippenstein, Eric Lichtblau, THE INTERCEPTFebruary 22 2021, 1:31 p.m.The inclusion of congressional phone data in the FBI investigation raises thorny ...
Ken Klippenstein, Eric Lichtblau, THE INTERCEPTFebruary 22 2021, 1:31 p.m.The inclusion of congressional phone data in the FBI investigation raises thorny ...
What the Capitol Riot Data Download Shows about Social Media VulnerabilitiesA massive amount of information downloaded from Parler includes potentially ...
An Alibaba Group logo at its office in Beijing, on Jan. 5, 2021.By THOMAS PETER/REUTERSCanada’s spy agency warned Canadian universities ...
By MARTHA LEAH NANGALAMA. 27 January 2021Below is a report I submitted for an Intel Firm in Africa. This report was ...
By Ellen Nakashima, THE WASHINGTON POSTJan. 20, 2021 at 9:22 p.m. ASTThe director of the National Security Agency, who was ordered ...
By CISA Alert (AA20-336A)Advanced Persistent Threat Actors Targeting U.S. Think TanksOriginal release date: December 01, 2020SummaryThis Advisory uses the MITRE Adversarial ...
By COMPUTING UK12 October 2020Japan and India join 'Five Eyes' alliance to demand backdoor access to encrypted appsThe alliance wants ...
AA20-198A: Malicious Cyber Actor Use of Network Tunneling and Spoofing to Obfuscate Geolocation By CISA Original release date: July 16, ...
By Simon Black, SOVEREIGN MAN, June 29, 2020 In early 1775, Benjamin Franklin and his European colleague, Charles Dumas, developed a secret ...
Figure 1: Scope, scale, and context of Pegasus as identified in this report. Below is some information on the biggest ...
Martha Leah Nangalama
mlnangalama@gmail.com
+15068716371
© 2021 Peril of Africa .
© 2021 Peril of Africa .