Extracting data from closely-protected SCADA and ICS critical networks
A piece of malware can transform a Siemens industrial controller into a radio that transmits sensitive data from critical infrastructure. [...]
The monitoring of communications and the collection and processing of satellite imagery and interceptions constitute one of the biggest outlays of intelligence services today. Intelligence Online’s « Surveillance and Interception » section is devoted to the latest technological advances being deployed by governments and their adversaries - or accomplices - as well as new methods of technological sabotage.
Subscribers have access to the Surveillance & Interception section while non-subscribers can buy articles online (Read free articles here).