Sunday, August 20, 2017

The Internet of Things Is a Cyberwar Nightmare

But we can still prevent our household appliances from becoming an army of malicious computer zombies out to destroy the web. The world got a glimpse of the future last month when a large-scale cyberattack prevented access to hundreds of key websites, including Twitter, the online New York Times, and...

CIA Preparing for Possible Cyber Strike Against Russia

The Obama administration is contemplating an unprecedented cyber covert action against Russia in retaliation for alleged Russian interference in the American presidential election, U.S. intelligence officials told NBC News. Current and former officials with direct knowledge of the situation say the CIA has been asked to deliver options to the...

Yahoo secretly scanned customer emails for U.S. intelligence

Yahoo Inc last year secretly built a custom software program to search all of its customers' incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter. The company complied with a classified U.S. government demand, scanning hundreds of millions of Yahoo Mail accounts...

As Russia reasserts itself, U.S. intelligence agencies focus anew on the Kremlin

U.S. intelligence agencies are expanding spying operations against Russia on a greater scale than at any time since the end of the Cold War, U.S. officials said. The mobilization involves clandestine CIA operatives, National Security Agency cyberespionage capabilities, satellite systems and other intelligence assets, officials said, describing a shift in...

Every Move You Make

This summer, at 1:51 p.m. on Saturday, June 11, an unearthly roar shattered the afternoon quiet along the Florida coast. On Cape Canaveral, liquid fuel surged through the thick aluminum veins of a Delta IV Heavy rocket nearly as tall as the U.S. Capitol. Two million pounds of thrust in three symmetrical boosters fired the engines, sending the craft hurtling over the Atlantic Ocean into the heavens.

New Docs Show How the NSA Used the Iraq War to Build its Surveillance...

Newly released internal NSA missives from the early days of the Iraq war show how quickly the agency’s priorities shifted from providing wartime intelligence to coalition troops to being a “pervasive” part of the “intelligence-driven” global war on terror. The documents, which have surfaced for the first time, outline how...

Inside Menwith Hill: The NSA’s British Base at the Heart of U.S. Targeted Killing

The narrow roads are quiet and winding, surrounded by rolling green fields and few visible signs of life beyond the occasional herd of sheep. But on the horizon, massive white golf ball-like domes protrude from the earth, protected behind a perimeter fence that is topped with piercing razor wire. Here, in the heart of the tranquil English countryside, is the National Security Agency’s largest overseas spying base.

BAE Systems Sells Internet Surveillance Gear to United Arab Emirates

A Danish subsidiary of British defense contractor BAE Systems is selling an internet surveillance package to the government of the United Arab Emirates, a country known for spying on, imprisoning, and torturing dissidents and activists, according to documents obtained by Lasse Skou Andersen of the Danish newspaper Dagbladet Information. The...

This malware sold to governments could help them spy on iPhones, researchers say

Many people assume their iPhones are secure, but new research sent Apple scrambling to fix vulnerabilities that left users at risk. Spyware relying on three previously unknown, or “zero-day,” flaws in Apple’s iOS mobile operating system for years made it possible for governments to take over victims' phones by tricking them into...

The Million Dollar Dissident: NSO Group’s iPhone Zero-Days used against a UAE Human Rights...

Today Apple released security updates for Desktop Safari and Mac OS X. These updates patch the Trident vulnerabilities that identified in this report for desktop users. The Trident vulnerabilities used by NSO could have been weaponized against users of non iOS devices, including OSX. We encourage all Apple users to install...

Cisco Exploit Leaked in NSA Hack Modifies to Target Latest Version of Firewalls

Recently released NSA exploit from "The Shadow Brokers" leak that affects older versions of Cisco System firewalls can work against newer models as well. Dubbed ExtraBacon, the exploit was restricted to versions 8.4.(4) and earlier versions of Cisco's Adaptive Security Appliance (ASA) – a line of firewalls designed to protect...

The NSA Leak Is Real, Snowden Documents Confirm

On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly...

Mysterious Group Hacks The NSA

The latest hack revealed over the weekend has nothing to do with the Democratic Party or George Soros, and instead a mysterious hacker group by the name “The Shadow Brokers” claims to have hacked the Equation Group - a government cyberattack hacking group associated with the NSA, and released...

Powerful NSA hacking tools have been revealed online

Some of the most powerful espionage tools created by the National Security Agency’s elite group of hackers have been revealed in recent days, a development that could pose severe consequences for the spy agency’s operations and the security of government and corporate computers. A cache of hacking tools with code...

NSA Hacked? Shadow Brokers Crew Claims Compromise Of Surveillance Op

Has the NSA just been hacked? Security experts speaking with FORBES think it’s possible, after a group published malware and attack code allegedly belonging to the Equation Group, a crew linked to the US intelligence agency. But while many believe the leak looks legitimate, the hackers could have pulled...

Shadow Brokers: NSA Exploits of the Week

When your boy Serge is in charge of Cyber Attribution #DNCHack #InfoSec cc @Trevornoahpic.twitter.com/88prA2AjD5 — @msuiche Today an unknown group called Shadow Brokers started an auction after claiming they hacked Equation Group (NSA entity named like that by Kaspersky, and believed to be the author of Stuxnet & Flame) here: https://theshadowbrokers.tumblr.com/. The Tumblr...

The Raid: In Bungled Spying Operation, NSA Targeted Pro-Democracy Campaigner

Tony Fullman is a middle-aged former tax man and a pro-democracy activist. But four years ago, a botched operation launched by New Zealand spies meant he suddenly found himself deemed a potential terrorist — his passport was revoked, his home was raided, and he was placed on a top-secret National Security Agency surveillance list.

Iraqi Insurgents Stymied the NSA and Other Highlights from 263 Internal Agency Reports

Early in the fight against al Qaeda in Afghanistan and insurgents in Iraq, the National Security Agency was blindsided by enemy fighters’ frequent use of rudimentary wireless communications devices known as “high–powered cordless phones,” according to documents among 263 published today by The Intercep.

Privacy Scandal Haunts Pokemon Go’s CEO

Within two weeks of its release last month, Pokemon Go, the augmented reality gaming sensation, surpassed, by one estimate, Twitter, Facebook, and Netflix in its day-to-day popularity on Android phones. Over on Apple devices, the game was downloaded more times in its first week than any app that came before it. The suddenly vast scale...

This Company Has Built a Profile on Every American Adult

Every move you make. Every click you take. Every game you play. Every place you stay. They’ll be watching you. Forget telephoto lenses and fake mustaches: The most important tools for America’s 35,000 private investigators are database subscription services. For more than a decade, professional snoops have been able to...

Can This Israeli Startup Hack Your Phone?

Many computer-security companies trumpet their skills and accomplishments. Some take another tack altogether, like NSO Group. This Israeli startup no longer operates a website. But it has peddled its wares to the Mexican government, gotten on the radar of Central Intelligence Agency officials and recently was bought by an American private equity firm. A...

NSA whistleblower says DNC hack was not done by Russia, but by U.S. intelligence

NSA has all of Clinton's "deleted" emails. On Aaron Klein’s Sunday radio program, “Aaron Klein Investigative Radio” (broadcast on New York’s AM 970 The Answer and Philadelphia’s NewsTalk 990 AM), US government whistleblower William Binney threw his hat into the DNC hack ring by stating that the Democratic National Committee’s server was...

Memo Sheds New Light on CIA’s Network of Journalists

Most people with an interest in the history of CIA will have heard of “Operation Mockingbird” (an unofficial name), sometimes known as Frank Wisner’s “Mighty Wurlitzer,” which used a network of journalists for propaganda purposes. While the elements of Mockingbird that most people are familiar with were run through CIA’s Office...

The FBI Wants to Exempt Massive Biometric Database From the Privacy Act

A broad coalition of 45 signatories, including civil liberties, racial justice, human rights, and privacy organizations, published a letter Tuesday strongly condemning a proposal by the FBI to exempt its massive biometric database from certain provisions of the Privacy Act. Known as the Next Generation Identification system, or NGI, the...

Governments Turn to Commercial Spyware to Intimidate Dissidents

SAN FRANCISCO — In the last five years, Ahmed Mansoor, a human rights activist in the United Arab Emirates, has been jailed and fired from his job, along with having his passport confiscated, his car stolen, his email hacked, his location tracked and his bank account robbed of $140,000....

New Study Shows Mass Surveillance Breeds Meekness, Fear and Self-Censorship

A newly published study from Oxford’s Jon Penney provides empirical evidence for a key argument long made by privacy advocates: that the mere existence of a surveillance state breeds fear and conformity and stifles free expression. Reporting on the study, the Washington Post this morning described this phenomenon: “If we think that...

U.S. Supreme Court allows the FBI to Hack any Computer in the World

The US Supreme Court has approved amendments to Rule 41, which now gives judges the authority to issue search warrants, not only for computers located in their jurisdiction but also outside their jurisdiction. Under the original Rule 41, let’s say, a New York judge can only authorize the FBI to...

Documents Reveal Secretive U.K. Surveillance Policies

Newly disclosed documents offer a rare insight into the secretive legal regime underpinning the British government’s controversial mass surveillance programs. London-based group Privacy International obtained the previously confidential files as part of an ongoing legal case challenging the scope of British spies’ covert collection of huge troves of private data. Millie...

The CIA Is Investing in Firms That Mine Your Tweets and Instagram Photos

SOFT ROBOTS THAT can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence that will sift through large data sets — these are just a few of the technologies being pursued by companies with investment from In-Q-Tel, the CIA’s venture capital firm, according to...

Burr-Feinstein encryption bill is officially here in all its scary glory

Senators Richard Burr and Dianne Feinstein released the official version of their anti-encryption bill today after a draft appeared online last week. The bill, titled the Compliance with Court Orders Act of 2016, would require tech firms to decrypt customers’ data at a court’s request. The Burr-Feinstein proposal has already faced heavy criticism...

Article Filter Options