Monday, May 20, 2019

Firms Aided Libyan Spies

First Look Inside Security Unit Shows How Citizens Were Tracked. TRIPOLI - On the ground floor of a six-story building here, agents working for Moammar Gadhafi sat in an open room, spying on emails and chat messages with the help of technology Libya acquired from the West. The recently abandoned room...

BAE Systems Sells Internet Surveillance Gear to United Arab Emirates

A Danish subsidiary of British defense contractor BAE Systems is selling an internet surveillance package to the government of the United Arab Emirates, a country known for spying on, imprisoning, and torturing dissidents and activists, according to documents obtained by Lasse Skou Andersen of the Danish newspaper Dagbladet Information. The...

NSA Monitors Financial World

The NSA monitors banks and credit card transactions -- sometimes in apparent violation of national laws and global regulations. The European SWIFT financial transaction network is being tapped on different levels, internal documents from the US spy agency show. In the summer of 2010, a Middle Eastern businessman wanted to...

Secretive cyber warfare firm NSO Group explores sale

NSO Group Ltd, a company that helps governments spy on mobile phones and is so secretive that it regularly changes its name, is exploring a sale that could value it at close to $1 billion, including debt, according to people familiar with the matter. The move comes as governments around...

Governments Turn to Commercial Spyware to Intimidate Dissidents

SAN FRANCISCO — In the last five years, Ahmed Mansoor, a human rights activist in the United Arab Emirates, has been jailed and fired from his job, along with having his passport confiscated, his car stolen, his email hacked, his location tracked and his bank account robbed of $140,000....

The CIA Is Investing in Firms That Mine Your Tweets and Instagram Photos

SOFT ROBOTS THAT can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence that will sift through large data sets — these are just a few of the technologies being pursued by companies with investment from In-Q-Tel, the CIA’s venture capital firm, according to...

Torture in Bahrain Becomes Routine With Help From Nokia Siemens

The interrogation of Abdul Ghani Al Khanjar followed a pattern. First, Bahraini jailers armed with stiff rubber hoses beat the 39-year-old school administrator and human rights activist in a windowless room two stories below ground in the Persian Gulf kingdom’s National Security Apparatus building. Then, they dragged him upstairs for...

Companies That Aid Syria Crackdown Deserve Sanctions’ Slap

Terrible things tend to happen when Syrian security officials catch their quarry. Dissidents are detained, tortured and sometimes killed. It is thus disturbing to learn that U.S. and European technology companies are working to help the regime of President Bashar al-Assad monitor Internet traffic to keep tabs on citizens. A...

America’s Willing Helper: Intelligence Scandal Puts Merkel in Tight Place

Germany's latest spying scandal has created the biggest crisis yet for the country's foreign intelligence agency. The German government appears to have been aware of widespread US spying, possibly including economic espionage, against European targets and yet it did nothing to stop it. July 14, 2013 was an overcast day....

Mission Unstoppable

From drone strikes to prison torture, the CIA has been pulling the strings of U.S. Foreign Policy since 9/11. And if history is a guide, the agency will be calling the shots in the Middle East for years to come.

Unplug Companies That Help Iran and Syria Spy on Citizens

The evidence forms a high stack. U.S., European and other companies are selling technologies that enable the repressive Iranian and Syrian regimes to disrupt and monitor the Internet and track down government critics, as documented in media reports, notably by Bloomberg News. On Monday, President Barack Obama acted. He issued...

Iraqi Insurgents Stymied the NSA and Other Highlights from 263 Internal Agency Reports

Early in the fight against al Qaeda in Afghanistan and insurgents in Iraq, the National Security Agency was blindsided by enemy fighters’ frequent use of rudimentary wireless communications devices known as “high–powered cordless phones,” according to documents among 263 published today by The Intercep.

Documents reveal NSA’s extensive involvement in targeted killing program

It was an innocuous e-mail, one of millions sent every day by spouses with updates on the situation at home. But this one was of particular interest to the National Security Agency and contained clues that put the sender’s husband in the crosshairs of a CIA drone. Days later, Hassan...

NetApp Investigated by U.S. on Syria Surveillance System Sale

U.S. regulators are investigating how a multi-million-dollar storage system from NetApp Inc. came to underpin a sweeping Internet-surveillance system being built last year for the Syrian regime of President Bashar al-Assad. The U.S. Department of Commerce’s Bureau of Industry and Security is conducting the probe, according to department spokesman Eugene...

Shadow Brokers: NSA Exploits of the Week

When your boy Serge is in charge of Cyber Attribution #DNCHack #InfoSec cc @Trevornoahpic.twitter.com/88prA2AjD5 — @msuiche Today an unknown group called Shadow Brokers started an auction after claiming they hacked Equation Group (NSA entity named like that by Kaspersky, and believed to be the author of Stuxnet & Flame) here: https://theshadowbrokers.tumblr.com/. The Tumblr...

The NSA Leak Is Real, Snowden Documents Confirm

On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly...

Every Move You Make

This summer, at 1:51 p.m. on Saturday, June 11, an unearthly roar shattered the afternoon quiet along the Florida coast. On Cape Canaveral, liquid fuel surged through the thick aluminum veins of a Delta IV Heavy rocket nearly as tall as the U.S. Capitol. Two million pounds of thrust in three symmetrical boosters fired the engines, sending the craft hurtling over the Atlantic Ocean into the heavens.

New Docs Show How the NSA Used the Iraq War to Build its Surveillance...

Newly released internal NSA missives from the early days of the Iraq war show how quickly the agency’s priorities shifted from providing wartime intelligence to coalition troops to being a “pervasive” part of the “intelligence-driven” global war on terror. The documents, which have surfaced for the first time, outline how...

Pentagon steps up private-sector cyber exchanges

The Defense Department is stepping up an exchange program to bring private-sector IT experts into the Pentagon and send military personnel into the corporate world, said Defense Department CIO Terry Halvorsen. A program that has brought Cisco to the Pentagon to share its expertise on routers will expand to include...

Yahoo secretly scanned customer emails for U.S. intelligence

Yahoo Inc last year secretly built a custom software program to search all of its customers' incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter. The company complied with a classified U.S. government demand, scanning hundreds of millions of Yahoo Mail accounts...

Insider Threat Program Inches Forward

The Department of Defense “is moving forward with the development of its insider threat and personnel security reform efforts,” wrote Michael G. Vickers, then-Under Secretary of Defense (Intelligence) in an April 2015 report to Congress that was released last month under the Freedom of Information Act. “The Department recognizes...

DOD recruits Silicon Valley for cyber, innovation efforts

Carter unveiled his cyber strategy but displayed his doctoral thesis during his speech at Stanford. In formally unveiling the Defense Department’s new cyber strategy during a visit to the Silicon Valley Thursday, Defense Secretary Ash Carter underscored the changes in the technology and cybersecurity landscapes in recent years and said...

NSA accused of spying on Brazilian oil company Petrobras

Accusations that NSA is conducting intelligence-gathering operations that go beyond its core mission of national security. The US National Security Agency has been accused of spying on Brazil's biggest oil company, Petrobras, following the release of more files from US whistleblower Edward Snowden. The latest disclosures, which aired on Brazil's Fantástico news...

Israel and its lobby lose the Iran Deal all over again, in news of...

You’d think that there would be widespread outrage over the story everyone’s talking about today, the Wall Street Journal scoop that the Obama administration spied on Israeli Prime Minister Netanyahu during the Iran Deal negotiations so as to counter his efforts to sink it. The wiretaps reveal that Israeli...

The CIA and the Press: When the Washington Post Ran the CIA’s Propaganda Network

Last week, the Washington Post published a scurrilous piece by a heretofore obscure technology reporter named Craig Timberg, alleging without the faintest evidence that Russian intelligence was using more than 200 independent news sites to pump out pro-Putin and anti-Clinton propaganda during the election campaign. Under the breathless headline, “Russian propaganda effort...

Spies Fail to Escape Spyware in $5 Billion Bazaar for Cyber Arms

The intelligence operative sits in a leather club chair, laptop open, one floor below the Hilton Kuala Lumpur’s convention rooms, scanning the airwaves for spies. In the salons above him, merchants of electronic interception demonstrate their gear to government agents who have descended on the Malaysian capital in early December...

Obama Administration Set to Expand Sharing of Data That NSA Intercepts

WASHINGTON — The Obama administration is on the verge of permitting the National Security Agency to share more of the private communications it intercepts with other American intelligence agencies without first applying any privacy protections to them, according to officials familiar with the deliberations. The change would relax longstanding restrictions...

U.S. Supreme Court allows the FBI to Hack any Computer in the World

The US Supreme Court has approved amendments to Rule 41, which now gives judges the authority to issue search warrants, not only for computers located in their jurisdiction but also outside their jurisdiction. Under the original Rule 41, let’s say, a New York judge can only authorize the FBI to...

AT&T Helped U.S. Spy on Internet on a Vast Scale

The National Security Agency’s ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company: the telecom giant AT&T. While it has been long known that American telecommunications companies worked closely with the spy agency, newly...

Top U.S. spy agency has not embraced CIA assessment on Russia hacking

The overseers of the U.S. intelligence community have not embraced a CIA assessment that Russian cyber attacks were aimed at helping Republican President-elect Donald Trump win the 2016 election, three American officials said on Monday. While the Office of the Director of National Intelligence (ODNI) does not dispute the CIA's...

Article Filter Options