LaeticiaChen MöchteSie like to add to Ihremberuflichen network on LinkedIn.
if ( typeof AdController !== ‘undefined’ !window.Zeit.isMobileView()) { if ( !document.getElementById( ‘iqadtile8’ ) ) { var elem = document.createElement( ‘div’ ); elem.id = ‘iqadtile8’; elem.className = “ad ad-desktop ad-desktop–8 ad-desktop–8-on-article”; elem.setAttribute(‘data-banner-type’, ‘desktop’); elem.setAttribute(‘data-banner-label’, ‘Anzeige’); document.getElementById(‘ad-desktop-8’).parentNode.appendChild(elem); AdController.render(‘iqadtile8’); if ( window.console typeof window.console.info === ‘function’ ) { window.console.info(‘AdController ‘ AdController.VERSION ‘ tile 8 desktop’) } } } if ( typeof AdController !== ‘undefined’ window.Zeit.isMobileView()) { if ( !document.getElementById( ‘iqadtile3’ ) ) { var elem = document.createElement( ‘div’ ); elem.id = ‘iqadtile3’; elem.className = “ad ad-mobile ad-mobile–3 ad-mobile–3-on-article”; elem.setAttribute(‘data-banner-type’, ‘mobile’); document.getElementById(‘ad-mobile-3’).parentNode.appendChild(elem); AdController.render(‘iqadtile3’); if ( window.console typeof window.console.info === ‘function’ ) { window.console.info(‘AdController ‘ AdController.VERSION ‘ tile 3 mobile’) } } }
E-Mailsmitsolchen requests landenhäufig directly in spam folders of recipients. Rightly, Ließesich argue. Especially if you are not a member of LinkedIn. AberdasKarrierenetzwerk, Mitte2016 purchased from Microsoft, ain’t only a spam sling. According to its own information, hates Mittlerweileeinehalbe billion users.
Everything on net is “weaponized”
Some are Chinese spies, warns federal FürVerfassungsschutz (BfV). Sienennen SichLaeticiaChen. OderLily Wu UndJason Wang. There are fake profiles, cementonce authority found out. SYS, German politicians or ir employees, high-ranking officials, Bundeswehr soldiers and top as sources to recruit Undabzuschöpfen. The aim is to “infiltration VonParlamenten, ministries and authorities,” says BfV-PräsidentHans-Georg Maaßen. This was somewhat less detailed in Verfassungschutzbericht 2016, which was published in July: “Chinese intelligence services use social networks like LinkedIn and Facebook for missions operations on a large scale,” it says.
Dieerneute warning from last weekend is a part of findings of past couple of years on modern Secret Service methods: Every useful application imnetwork is weaponized, as it is so aptly said in English – made into a weapon: news, communication, Networking.
if ( typeof AdController !== ‘undefined’ !window.Zeit.isMobileView()) { if ( !document.getElementById( ‘iqadtile4’ ) ) { var elem = document.createElement( ‘div’ ); elem.id = ‘iqadtile4’; elem.className = “ad ad-desktop ad-desktop–4 ad-desktop–4-on-article”; elem.setAttribute(‘data-banner-type’, ‘desktop’); elem.setAttribute(‘data-banner-label’, ‘Anzeige’); document.getElementById(‘ad-desktop-4’).parentNode.appendChild(elem); AdController.render(‘iqadtile4’); if ( window.console typeof window.console.info === ‘function’ ) { window.console.info(‘AdController ‘ AdController.VERSION ‘ tile 4 desktop’) } } } if ( typeof AdController !== ‘undefined’ window.Zeit.isMobileView()) { if ( !document.getElementById( ‘iqadtile4’ ) ) { var elem = document.createElement( ‘div’ ); elem.id = ‘iqadtile4’; elem.className = “ad ad-mobile ad-mobile–4 ad-mobile–4-on-article”; elem.setAttribute(‘data-banner-type’, ‘mobile’); document.getElementById(‘ad-mobile-4’).parentNode.appendChild(elem); AdController.render(‘iqadtile4’); if ( window.console typeof window.console.info === ‘function’ ) { window.console.info(‘AdController ‘ AdController.VERSION ‘ tile 4 mobile’) } } }
- Messages are forged or falsified, and n in social Netzwerkenverbreitet that serve as an amplifier. Until now, it affects AllemTexte, but in future it may also include videos and audio files. DieTechnik to this already exists in fundamentals, and re will be immerjemanden that abuses it.
- (Spear) Phishingüber emails is still one of EffektivstenMethoden for Secret Service hackers, access to foreign Kontenund computers, but ultimately documents and information Zuverschaffen. Well-made phishing are hard to see, undwie disastrous can be consequences, case Podiuma ImUS campaign has shown.
- Career platforms are excellent channels to address potential sources, bypassing your employers or services. DetaillierteNutzerprofile help in finding suitable candidates. Wiegut This works, activists demonstrated after DerVeröffentlichung of Snowden documents: y searched for LinkedInnach profiles, in which code names of various NSA programs that had now become known appeared – and were found. They found thousands of secret dienstmit and workers. Some of Denenerwähnten even previously unknown NSA programs in IhrenLebensläufen.
However, re has been disinformation, propaganda, undermigration and recruitment of informants long before Internet. The network simplifies Spionageversuchenur. Potential target persons must be sensitized, trained and furr educated in order to recognize neuenWaffen of digital. This begins with a personal threatmodel, a threat model, i.e. consideration of Obund for whom one is a potential victim. Training in DerVerifikation of news is also part of this, as is handling of sensitive information, recognition of social engineering a certain understanding of computer security.
© time online Patrick Beuth Editor in Portfolio Digital, time online to authors page
Insbesonderefür economy and public administration have such courses long ago. From commercial providers, from BfV itself, and from Federal Office campaigning in Information Technology (BSI) for example. German companies have known for many years that y have to arm mselves against industrial espionage. But also politicians and parties have learned at latest in months preceding Bundestag election 2016 that and how y can become target of foreign intelligence services.
Maaßendürfte know that not every secretary and everyone can be Referentausreichendgeschult. That’s probably not seinZiel. With LinkedIn and Demchinesischen Secret Service, President of Constitution makes anor front that fits SeinenForderungen: we are surrounded on internet, sosieht situation, so it needs DieSpionageabwehrmehr technology and more powers. “Einenvollen tool Box” he demanded, for example, in hearing of federal day before Guteinem month, “with which we are able to solve today’s problems”.
Dasszuletzt mainly law enforcement authorities were allowed to upgrade technically, for example with DemStaatstrojaner, WurmtMaaßen. But creates Eres, Dernächsten federal to sell an old problem alsneue by heranziehting ir modern version on Internet as evidence, may also get Earth’s desired tool box.