{"id":25907,"date":"2015-02-10T08:53:34","date_gmt":"2015-02-10T08:53:34","guid":{"rendered":"https:\/\/bivol.bg\/?p=25907"},"modified":"2015-02-11T12:58:18","modified_gmt":"2015-02-11T12:58:18","slug":"how-to-eavesdrop-on-an-entire-system","status":"publish","type":"post","link":"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html","title":{"rendered":"How to Eavesdrop on an Entire System?"},"content":{"rendered":"<p>In early 2006, the Electronic Frontier Foundation (EFF) sued the telecommunications giant AT&amp;T on charges that in 2002 it has helped the United States\u2019 National Security Agency (NSA) in the mass spying on its customers. Three years earlier, NSA agents, disguised as technicians of the company, installed at the headquarters of AT&amp;T a derivative of the optical connection which serves almost all of California. The deviation is connected to the supercomputer Narus 2000, a powerful system for recording and analysis of terabytes of data. The case ended with a Court ruling that the company had violated the law by helping the National Security Agency.<\/p>\n<p>On Monday, Bulgarian Prime Minister Boyko Borisov demonstrated awareness on the topic: &#8220;I never heard of such a possibility, the subject of eavesdropping to be an information system and not an individual.&#8221; This is indicative of the level of operational knowledge of the former Chief Secretary of the Interior, who counted dead bodies, while in the United States NSA was doing mass deployment of eavesdropping of information systems. But 13 years later, we can already say: &#8220;Congratulations, now it is in our country as well.&#8221;<\/p>\n<p>A year ago, Bivol revealed through <a href=\"https:\/\/wikileaks.org\/spyfiles\/docs\/TROVICOR_2012_TomaMisk_en.html\" target=\"_blank\">documents from WikiLeaks<\/a>, that our country has been visited several times by Thomas Mishkovsky, commercial agent of Trovicor, one of the companies that sell equipment for total surveillance with the ability to integrate it in national registries (the Civil Registration and Administrative Services, the Traffic Police, the National Revenue Agency etc.).<\/p>\n<p>Mishkovsky has been in Bulgaria from 25 to 27 February 2013. Then Boyko Borisov was in power as first-term Prime Minister and the Interior Ministry was managed by Tsvetan Tsvetanov. Mishkovsky\u2019s next visit was on 17 and 18 June, during the term of the Socialist-endorsed Cabinet &#8220;Oresharski&#8221; and Tsvetlin Yovchev was already Minister of Interior. The purpose of the Trovicor agent\u2019s business visit is not known, but his very arrival in Bulgaria means that the company has the Bulgarian government as a customer, and in particular, the State Agency for National Security (DANS). DANS is authorized through the department &#8220;Technical Operations&#8221; to eavesdrop independently of the Specialized Operative and Technical Information Directorate (SDOTO), transformed into State Agency Technical Operation (DATO).<\/p>\n<p>Sources of Bivol shared on condition of anonymity that it was precisely during this period (April 2013, during the term of the caretaker government of Marin Raykov), when the services installed monitoring equipment at several large Bulgarian mobile telephony and internet providers, which can be activated &#8220;on call &#8220;. Such equipment has been installed at major service providers like Mobiltel, Vivacom, Eurocom, Neterra and Bulsatkom, and with it, it is possible to &#8220;cover&#8221; 75% of customers in Bulgaria, experts say.<\/p>\n<p>In addition to passive monitoring of all traffic, the system can attack targeted individual computers with the virus FinSpy. Documents, published by WikiLeaks, revealed that the Bulgarian government is an exclusive client of the company Dreamlab, which together with Gamma International, commercializes this aggressive spyware. As it became clear, DANS has used such a server, installed in the former Ministry of State Administration and Administrative Reform (MSAAR), but the <a href=\"https:\/\/bivol.bg\/en\/state-hackers-from-bulgarian-national-security-agency-caught-with-pants-down-by-canadian-lab.html\" target=\"_blank\">IP address<\/a> belonged to the Agency.<\/p>\n<p>Why in MSAAR? To listen to the internal traffic of the State Administration; to monitor State servants for leaks of classified information, for example, or for protest attitudes against the government. And because it&#8217;s easy.<\/p>\n<p>The traffic of the State administration goes through different suppliers, but it comes together at a communication point in downtown Sofia. This is not a big secret. Some agents, disguised as technicians, come in, install a derivative and leave. Maybe they were not even disguised.<\/p>\n<p>Then some other agents watch on the screen what State servant and from what computer was chatting with whom to make them come to the evening protest&#8230; A click with the mouse and one can see his\/her contacts in social networks, visited websites, conducted chats, Skype calls, family tree, vehicle registration, fines, taxes&#8230; all that Trovicor could integrate. There is parallel recording of hundreds, even thousands of profiles, not just for 300, but for 3,000 days, if there is space on hard disks.<\/p>\n<p>If that State servant is wise enough to have an encrypted connection, or to turn on the HTTPS protocol on Facebook, his computer is quietly infected with FinSpy and begins to record screenshots of the screen and any keyboard touch. There is no escape. This way, not only the correspondence of the target person is followed, but of his contacts as well, even if these individuals are outside the State Administration.<\/p>\n<p>This is it, the &#8220;much more complex and deeper thing&#8221;, of which Borisov spoke. Get used to the fact that this powerful and expensive arsenal will not be used for hunting terrorists, gangsters and \u201cbanksters\u201d, but against the internal enemy, against the politically inconvenient people in public administration and elsewhere.<\/p>\n<p><em>*This analysis is based solely on information that is already public. If its conclusions are classified information, it is not the analyst who should be blamed, but those who made unrestrained public statements.<\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In early 2006, the Electronic Frontier Foundation (EFF) sued the telecommunications giant AT&amp;T on charges that in 2002 it has helped the United States\u2019 National Security Agency (NSA) in the&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"give_campaign_id":0,"_crdt_document":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","kia_subtitle":"","_lmt_disableupdate":"","_lmt_disable":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false},"categories":[5543,5991],"tags":[5126,5417],"class_list":["post-25907","post","type-post","status-publish","format-standard","hentry","category-analysis-en","category-b-illegalsnooping-english","tag-dans","tag-dato"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Eavesdrop on an Entire System? - Bivol!<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Eavesdrop on an Entire System?\" \/>\n<meta property=\"og:description\" content=\"In early 2006, the Electronic Frontier Foundation (EFF) sued the telecommunications giant AT&amp;T on charges that in 2002 it has helped the United States\u2019 National Security Agency (NSA) in the&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html\" \/>\n<meta property=\"og:site_name\" content=\"Bivol!\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bivolnews\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/bivolnews\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-10T08:53:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-02-11T12:58:18+00:00\" \/>\n<meta name=\"author\" content=\"\u0415\u043a\u0438\u043f \u043d\u0430 \u0411\u0438\u0432\u043e\u043b\u044a\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/bivolbg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u0415\u043a\u0438\u043f \u043d\u0430 \u0411\u0438\u0432\u043e\u043b\u044a\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html\"},\"author\":{\"name\":\"\u0415\u043a\u0438\u043f \u043d\u0430 \u0411\u0438\u0432\u043e\u043b\u044a\",\"@id\":\"https:\/\/bivol.bg\/en#\/schema\/person\/ad1863f03d50318f746757ba517286a2\"},\"headline\":\"How to Eavesdrop on an Entire System?\",\"datePublished\":\"2015-02-10T08:53:34+00:00\",\"dateModified\":\"2015-02-11T12:58:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html\"},\"wordCount\":840,\"keywords\":[\"DANS\",\"DATO\"],\"articleSection\":[\"Analysis\",\"Snooping\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html\",\"url\":\"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html\",\"name\":\"How to Eavesdrop on an Entire System? - Bivol!\",\"isPartOf\":{\"@id\":\"https:\/\/bivol.bg\/en#website\"},\"datePublished\":\"2015-02-10T08:53:34+00:00\",\"dateModified\":\"2015-02-11T12:58:18+00:00\",\"author\":{\"@id\":\"https:\/\/bivol.bg\/en#\/schema\/person\/ad1863f03d50318f746757ba517286a2\"},\"breadcrumb\":{\"@id\":\"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u041d\u0430\u0447\u0430\u043b\u043e\",\"item\":\"https:\/\/bivol.bg\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Eavesdrop on an Entire System?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bivol.bg\/en#website\",\"url\":\"https:\/\/bivol.bg\/en\",\"name\":\"Bivol!\",\"description\":\" Mind the horns!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bivol.bg\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/bivol.bg\/en#\/schema\/person\/ad1863f03d50318f746757ba517286a2\",\"name\":\"\u0415\u043a\u0438\u043f \u043d\u0430 \u0411\u0438\u0432\u043e\u043b\u044a\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/bivol.bg\/en#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e3a6263fb31a1f9d980ef7f7f1e4b9e641dc9b309a53c3e112cc8bb4e679df9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e3a6263fb31a1f9d980ef7f7f1e4b9e641dc9b309a53c3e112cc8bb4e679df9?s=96&d=mm&r=g\",\"caption\":\"\u0415\u043a\u0438\u043f \u043d\u0430 \u0411\u0438\u0432\u043e\u043b\u044a\"},\"description\":\"The BIVOL itself\",\"sameAs\":[\"https:\/\/bivol.bg\",\"https:\/\/www.facebook.com\/bivolnews\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/bivolbg\"],\"url\":\"https:\/\/bivol.bg\/en\/author\/bivol\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Eavesdrop on an Entire System? - Bivol!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html","og_locale":"en_US","og_type":"article","og_title":"How to Eavesdrop on an Entire System?","og_description":"In early 2006, the Electronic Frontier Foundation (EFF) sued the telecommunications giant AT&amp;T on charges that in 2002 it has helped the United States\u2019 National Security Agency (NSA) in the&hellip;","og_url":"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html","og_site_name":"Bivol!","article_publisher":"https:\/\/www.facebook.com\/bivolnews\/","article_author":"https:\/\/www.facebook.com\/bivolnews\/","article_published_time":"2015-02-10T08:53:34+00:00","article_modified_time":"2015-02-11T12:58:18+00:00","author":"\u0415\u043a\u0438\u043f \u043d\u0430 \u0411\u0438\u0432\u043e\u043b\u044a","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/bivolbg","twitter_misc":{"Written by":"\u0415\u043a\u0438\u043f \u043d\u0430 \u0411\u0438\u0432\u043e\u043b\u044a","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html#article","isPartOf":{"@id":"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html"},"author":{"name":"\u0415\u043a\u0438\u043f \u043d\u0430 \u0411\u0438\u0432\u043e\u043b\u044a","@id":"https:\/\/bivol.bg\/en#\/schema\/person\/ad1863f03d50318f746757ba517286a2"},"headline":"How to Eavesdrop on an Entire System?","datePublished":"2015-02-10T08:53:34+00:00","dateModified":"2015-02-11T12:58:18+00:00","mainEntityOfPage":{"@id":"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html"},"wordCount":840,"keywords":["DANS","DATO"],"articleSection":["Analysis","Snooping"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html","url":"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html","name":"How to Eavesdrop on an Entire System? - Bivol!","isPartOf":{"@id":"https:\/\/bivol.bg\/en#website"},"datePublished":"2015-02-10T08:53:34+00:00","dateModified":"2015-02-11T12:58:18+00:00","author":{"@id":"https:\/\/bivol.bg\/en#\/schema\/person\/ad1863f03d50318f746757ba517286a2"},"breadcrumb":{"@id":"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/bivol.bg\/en\/how-to-eavesdrop-on-an-entire-system.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u041d\u0430\u0447\u0430\u043b\u043e","item":"https:\/\/bivol.bg\/en"},{"@type":"ListItem","position":2,"name":"How to Eavesdrop on an Entire System?"}]},{"@type":"WebSite","@id":"https:\/\/bivol.bg\/en#website","url":"https:\/\/bivol.bg\/en","name":"Bivol!","description":" Mind the horns!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bivol.bg\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/bivol.bg\/en#\/schema\/person\/ad1863f03d50318f746757ba517286a2","name":"\u0415\u043a\u0438\u043f \u043d\u0430 \u0411\u0438\u0432\u043e\u043b\u044a","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bivol.bg\/en#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e3a6263fb31a1f9d980ef7f7f1e4b9e641dc9b309a53c3e112cc8bb4e679df9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e3a6263fb31a1f9d980ef7f7f1e4b9e641dc9b309a53c3e112cc8bb4e679df9?s=96&d=mm&r=g","caption":"\u0415\u043a\u0438\u043f \u043d\u0430 \u0411\u0438\u0432\u043e\u043b\u044a"},"description":"The BIVOL itself","sameAs":["https:\/\/bivol.bg","https:\/\/www.facebook.com\/bivolnews\/","https:\/\/x.com\/https:\/\/twitter.com\/bivolbg"],"url":"https:\/\/bivol.bg\/en\/author\/bivol"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/peFaG8-6JR","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":25692,"url":"https:\/\/bivol.bg\/en\/nsa-uses-powerful-monitoring-system-for-webs-battlefield.html","url_meta":{"origin":25907,"position":0},"title":"NSA Uses Powerful Monitoring System for Web\u2019s \u201cBattlefield\u201d","author":"\u0415\u043a\u0438\u043f \u043d\u0430 \u0411\u0438\u0432\u043e\u043b\u044a","date":"29 January 2015","format":false,"excerpt":"A powerful system for secretly monitoring web and DNS traffic, called MORECOWBELL, allows the US National Security Agency to conduct intensive monitoring of sites of operative interest and to even create a complete picture of what is happening on the Internet. That is revealed in top-secret documents, published by the\u2026","rel":"","context":"In &quot;Analysis&quot;","block_context":{"text":"Analysis","link":"https:\/\/bivol.bg\/en\/category\/analysis-en"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2015\/01\/morecowbell.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2015\/01\/morecowbell.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2015\/01\/morecowbell.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2015\/01\/morecowbell.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":103336,"url":"https:\/\/bivol.bg\/en\/update-hal-billion-social-ministry.html","url_meta":{"origin":25907,"position":1},"title":"UPDATE: OVER 0.5 BLN BGN OF EU FUNDS EMBEZZLED THROUGH SOCIAL MINISTRY","author":"\u041d\u0438\u043a\u043e\u043b\u0430\u0439 \u041c\u0430\u0440\u0447\u0435\u043d\u043a\u043e","date":"30 March 2023","format":false,"excerpt":"Financial abuse valued at a couple hundred million euro have been exposed at the Ministry of Labour and Social Policy. The embezzlement is primarily tied to funds from different European Union programs awarded under the law for public procurement. The procedures, however, were conducted in gross violation of the law.\u2026","rel":"","context":"In &quot;Investigations&quot;","block_context":{"text":"Investigations","link":"https:\/\/bivol.bg\/en\/category\/investigations-en"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2023\/03\/%D0%A1%D0%BD%D0%B8%D0%BC%D0%BE%D0%BA-%D1%8D%D0%BA%D1%80%D0%B0%D0%BD%D0%B0-2023-03-30-%D0%B2-17.40.52.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2023\/03\/%D0%A1%D0%BD%D0%B8%D0%BC%D0%BE%D0%BA-%D1%8D%D0%BA%D1%80%D0%B0%D0%BD%D0%B0-2023-03-30-%D0%B2-17.40.52.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2023\/03\/%D0%A1%D0%BD%D0%B8%D0%BC%D0%BE%D0%BA-%D1%8D%D0%BA%D1%80%D0%B0%D0%BD%D0%B0-2023-03-30-%D0%B2-17.40.52.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2023\/03\/%D0%A1%D0%BD%D0%B8%D0%BC%D0%BE%D0%BA-%D1%8D%D0%BA%D1%80%D0%B0%D0%BD%D0%B0-2023-03-30-%D0%B2-17.40.52.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2023\/03\/%D0%A1%D0%BD%D0%B8%D0%BC%D0%BE%D0%BA-%D1%8D%D0%BA%D1%80%D0%B0%D0%BD%D0%B0-2023-03-30-%D0%B2-17.40.52.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2023\/03\/%D0%A1%D0%BD%D0%B8%D0%BC%D0%BE%D0%BA-%D1%8D%D0%BA%D1%80%D0%B0%D0%BD%D0%B0-2023-03-30-%D0%B2-17.40.52.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":27879,"url":"https:\/\/bivol.bg\/en\/russia-is-testing-cyber-war-software-made-by-bulgarian-company.html","url_meta":{"origin":25907,"position":2},"title":"Russia Is Testing Cyber-War Software Made by Bulgarian Company","author":"\u0415\u043a\u0438\u043f \u043d\u0430 \u0411\u0438\u0432\u043e\u043b\u044a","date":"5 September 2015","format":false,"excerpt":"The Chief of Communications of the Russian State Corporation, \u201cRostec\u201d, Vasily Brovko has been at a meeting in Sofia with the company Packets Technologies, during which the software for DDOS attacks has been demonstrated. The capabilities of the system have been tested against Ukrainian opposition and media sites. \"Rostec\" and\u2026","rel":"","context":"In &quot;Investigations&quot;","block_context":{"text":"Investigations","link":"https:\/\/bivol.bg\/en\/category\/investigations-en"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2015\/09\/dannye.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":116882,"url":"https:\/\/bivol.bg\/en\/tulsi-gabbard-pierre-louvrier.html","url_meta":{"origin":25907,"position":3},"title":"Tulsi Gabbard is questioned in the Senate about Pierre Louvrier&#8217;s Russian connections","author":"\u0415\u043a\u0438\u043f \u043d\u0430 \u0411\u0438\u0432\u043e\u043b\u044a","date":"3 February 2025","format":false,"excerpt":"The Trump-nominated head of the U.S. National Intelligence, Tulsi Gabbard, had a difficult moment during her Senate hearing, where she was asked about an affair involving the well-known Belgian businessman Pierre Louvrier. As revealed by The New York Times, last year she traveled to Rome for an event at the\u2026","rel":"","context":"In &quot;Investigations&quot;","block_context":{"text":"Investigations","link":"https:\/\/bivol.bg\/en\/category\/investigations-en"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2025\/02\/louvrier-gabbard.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2025\/02\/louvrier-gabbard.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2025\/02\/louvrier-gabbard.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2025\/02\/louvrier-gabbard.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2025\/02\/louvrier-gabbard.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":37853,"url":"https:\/\/bivol.bg\/en\/who-is-behind-bulgarias-broken-excise-duty-system.html","url_meta":{"origin":25907,"position":4},"title":"Who Is Behind Bulgaria\u2019s Broken Excise Duty System?","author":"\u0415\u043a\u0438\u043f \u043d\u0430 \u0411\u0438\u0432\u043e\u043b\u044a","date":"20 January 2018","format":false,"excerpt":"The Bulgarian Centralized Excise Duty Information System (BACIS) for exchange of information between the Customs and the National Revenue Agency (NRA) is at the center of a political scandal and one of the reasons for the no-confidence vote against the government for failure to fight corruption. A classified report by\u2026","rel":"","context":"In &quot;Investigations&quot;","block_context":{"text":"Investigations","link":"https:\/\/bivol.bg\/en\/category\/investigations-en"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2018\/01\/mitnici.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2018\/01\/mitnici.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2018\/01\/mitnici.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":39462,"url":"https:\/\/bivol.bg\/en\/serious-cyber-attack-against-bulgarias-foreign-ministry-countrys-services-are-in-the-dark.html","url_meta":{"origin":25907,"position":5},"title":"Serious Cyber Attack against Bulgaria\u2019s Foreign Ministry. Country\u2019s Services Are in the Dark!","author":"\u0415\u043a\u0438\u043f \u043d\u0430 \u0411\u0438\u0432\u043e\u043b\u044a","date":"26 April 2018","format":false,"excerpt":"Dozens of internet addresses of the Bulgarian Ministry of Foreign Affairs (MFA) have been subjected to a serious phishing attack on Wednesday, April 25, 2018. Accounts of MFA bosses and diplomats have been compromised, possibly affecting national security. However, the \"Information Service\" had not informed the National Computer Security Incidents\u2026","rel":"","context":"In &quot;Investigations&quot;","block_context":{"text":"Investigations","link":"https:\/\/bivol.bg\/en\/category\/investigations-en"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2018\/04\/mvnr-fishing-1024x555.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2018\/04\/mvnr-fishing-1024x555.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2018\/04\/mvnr-fishing-1024x555.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/bivol.bg\/wp-content\/uploads\/2018\/04\/mvnr-fishing-1024x555.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/bivol.bg\/en\/wp-json\/wp\/v2\/posts\/25907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bivol.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bivol.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bivol.bg\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bivol.bg\/en\/wp-json\/wp\/v2\/comments?post=25907"}],"version-history":[{"count":0,"href":"https:\/\/bivol.bg\/en\/wp-json\/wp\/v2\/posts\/25907\/revisions"}],"wp:attachment":[{"href":"https:\/\/bivol.bg\/en\/wp-json\/wp\/v2\/media?parent=25907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bivol.bg\/en\/wp-json\/wp\/v2\/categories?post=25907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bivol.bg\/en\/wp-json\/wp\/v2\/tags?post=25907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}