Thursday, November 15, 2018

Israel Didn’t Know Tech Gear Was Sent to Iran Via Denmark

The clandestine arrangement worked smoothly for years. The Israeli company shipped its Internet-monitoring equipment to a distributor in Denmark. Once there, workers stripped away the packaging and removed the labels. Then they sent it to a man named “Hossein” in Iran, an amiable technology distributor known to them only by...

AT&T Helped U.S. Spy on Internet on a Vast Scale

The National Security Agency’s ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company: the telecom giant AT&T. While it has been long known that American telecommunications companies worked closely with the spy agency, newly...

Iranian Police Seizing Dissidents Get Aid Of Western Companies

The Iranian officers who knocked out Saeid Pourheydar’s four front teeth also enlightened the opposition journalist. Held in Evin Prison for weeks following his arrest early last year for protesting, he says, he learned that he was not only fighting the regime, but also companies that armed Tehran with...

NSA Spies on Venezuela’s Oil Company, Snowden Leak Reveals

U.S. intelligence agents posing as diplomats in Caracas helped an NSA analyst try to crack open PDVSA's computer network. The U.S. National Security Agency accessed the internal communications of Venezuela's state-owned oil company, Petroleos de Venezuela and acquired sensitive data it planned to exploit in order to spy on the...

Shadow Brokers: NSA Exploits of the Week

When your boy Serge is in charge of Cyber Attribution #DNCHack #InfoSec cc @Trevornoahpic.twitter.com/88prA2AjD5 — @msuiche Today an unknown group called Shadow Brokers started an auction after claiming they hacked Equation Group (NSA entity named like that by Kaspersky, and believed to be the author of Stuxnet & Flame) here: https://theshadowbrokers.tumblr.com/. The Tumblr...

Building backdoors into encryption isn’t only bad for China, Mr President

The White House wants tech companies to hand over encryption keys or build backdoors. So why is it criticizing China for wanting the same thing? Want to know why forcing tech companies to build backdoors into encryption is a terrible idea? Look no further than President Obama’s stark criticism of...

Cyber Attacks on Activists Traced to FinFisher Spyware of Gamma

It’s one of the world’s best-known and elusive cyber weapons: FinFisher, a spyware sold by U.K.- based Gamma Group, which can secretly take remote control of a computer, copying files, intercepting Skype calls and logging every keystroke. For the past year, human rights advocates and virus hunters have scrutinized FinFisher,...

This Company Has Built a Profile on Every American Adult

Every move you make. Every click you take. Every game you play. Every place you stay. They’ll be watching you. Forget telephoto lenses and fake mustaches: The most important tools for America’s 35,000 private investigators are database subscription services. For more than a decade, professional snoops have been able to...

U.S. Spy Net on Israel Snares Congress

NSA's targeting of Israeli leaders swept up the content of private conversations with U.S. lawmakers. President Barack Obama announced two years ago he would curtail eavesdropping on friendly heads of state after the world learned the reach of long-secret U.S. surveillance programs. But behind the scenes, the White House decided to...

Syria Crackdown Gets Italy Firm’s Aid With U.S.-Europe Spy Gear

As Syria's crackdown on protests has claimed more than 3,000 lives since March, Italian technicians in telecom offices from Damascus to Aleppo have been busy equipping President Bashar al-Assad’s regime with the power to intercept, scan and catalog virtually every e-mail that flows through the country. Employees of Area SpA,...

Israeli Entrepreneurs Play Both Sides of the Cyber Wars

Last year, the founders of an Israeli startup that sells phone hacking technology to governments realized they had not one business, but two. NSO Group, which was created by Omri Lavie and Shalev Hulio, sells offensive cyber capabilities that allow governments to remotely infect smartphones with spyware without leaving a...

The CIA’s Mop-Up Man: L.A. Times Reporter Cleared Stories With Agency Before Publication

A prominent national security reporter for the Los Angeles Times routinely submitted drafts and detailed summaries of his stories to CIA press handlers prior to publication, according to documents obtained by The Intercept. Email exchanges between CIA public affairs officers and Ken Dilanian, now an Associated Press intelligence reporter who previously...

NSA Hacked? Shadow Brokers Crew Claims Compromise Of Surveillance Op

Has the NSA just been hacked? Security experts speaking with FORBES think it’s possible, after a group published malware and attack code allegedly belonging to the Equation Group, a crew linked to the US intelligence agency. But while many believe the leak looks legitimate, the hackers could have pulled...

U.S. Fund to Buy NSO and Its Smartphone-snooping Software

Israeli firm's Pegasus software enables governments to track smartphone users and remotely operate its camera. Israeli firm NSO, which makes intelligence collection tools that enable governments to snoop on smartphones — or even take them over — will be bought out by an American-based private equity firm, with offices in...

The CIA Is Investing in Firms That Mine Your Tweets and Instagram Photos

SOFT ROBOTS THAT can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence that will sift through large data sets — these are just a few of the technologies being pursued by companies with investment from In-Q-Tel, the CIA’s venture capital firm, according to...

Obama Administration Set to Expand Sharing of Data That NSA Intercepts

WASHINGTON — The Obama administration is on the verge of permitting the National Security Agency to share more of the private communications it intercepts with other American intelligence agencies without first applying any privacy protections to them, according to officials familiar with the deliberations. The change would relax longstanding restrictions...

Spies Fail to Escape Spyware in $5 Billion Bazaar for Cyber Arms

The intelligence operative sits in a leather club chair, laptop open, one floor below the Hilton Kuala Lumpur’s convention rooms, scanning the airwaves for spies. In the salons above him, merchants of electronic interception demonstrate their gear to government agents who have descended on the Malaysian capital in early December...

Post-Revolt Tunisia Can Alter E-Mail With Big Brother Software

In Tunisia, Big Brother goes by an alias: Ammar 404. A play on the “Error 404” message for blocked websites, Tunisian bloggers dreamed him up as a fictional front man for the sprawling surveillance state of former ruler Zine El Abidine Ben Ali. Aided directly and indirectly by American and European...

NSA Monitors Financial World

The NSA monitors banks and credit card transactions -- sometimes in apparent violation of national laws and global regulations. The European SWIFT financial transaction network is being tapped on different levels, internal documents from the US spy agency show. In the summer of 2010, a Middle Eastern businessman wanted to...

Companies That Aid Syria Crackdown Deserve Sanctions’ Slap

Terrible things tend to happen when Syrian security officials catch their quarry. Dissidents are detained, tortured and sometimes killed. It is thus disturbing to learn that U.S. and European technology companies are working to help the regime of President Bashar al-Assad monitor Internet traffic to keep tabs on citizens. A...

Can This Israeli Startup Hack Your Phone?

Many computer-security companies trumpet their skills and accomplishments. Some take another tack altogether, like NSO Group. This Israeli startup no longer operates a website. But it has peddled its wares to the Mexican government, gotten on the radar of Central Intelligence Agency officials and recently was bought by an American private equity firm. A...

Pentagon steps up private-sector cyber exchanges

The Defense Department is stepping up an exchange program to bring private-sector IT experts into the Pentagon and send military personnel into the corporate world, said Defense Department CIO Terry Halvorsen. A program that has brought Cisco to the Pentagon to share its expertise on routers will expand to include...

The FBI Wants to Exempt Massive Biometric Database From the Privacy Act

A broad coalition of 45 signatories, including civil liberties, racial justice, human rights, and privacy organizations, published a letter Tuesday strongly condemning a proposal by the FBI to exempt its massive biometric database from certain provisions of the Privacy Act. Known as the Next Generation Identification system, or NGI, the...

Israel and its lobby lose the Iran Deal all over again, in news of...

You’d think that there would be widespread outrage over the story everyone’s talking about today, the Wall Street Journal scoop that the Obama administration spied on Israeli Prime Minister Netanyahu during the Iran Deal negotiations so as to counter his efforts to sink it. The wiretaps reveal that Israeli...

NSA whistleblower says DNC hack was not done by Russia, but by U.S. intelligence

NSA has all of Clinton's "deleted" emails. On Aaron Klein’s Sunday radio program, “Aaron Klein Investigative Radio” (broadcast on New York’s AM 970 The Answer and Philadelphia’s NewsTalk 990 AM), US government whistleblower William Binney threw his hat into the DNC hack ring by stating that the Democratic National Committee’s server was...

Why the EFF is pulling its support for the USA Freedom Act

Congress must embrace recent landmark opinion on phone metadata collection limits. The United States Court of Appeals for the Second Circuit has determined in American Civil Liberties Union (ACLU) v. Clapper that the National Security Agency’s telephone records program went far beyond what Congress authorized when it passed Section 215 of the Patriot Act...

This malware sold to governments could help them spy on iPhones, researchers say

Many people assume their iPhones are secure, but new research sent Apple scrambling to fix vulnerabilities that left users at risk. Spyware relying on three previously unknown, or “zero-day,” flaws in Apple’s iOS mobile operating system for years made it possible for governments to take over victims' phones by tricking them into...

Insider Threat Program Inches Forward

The Department of Defense “is moving forward with the development of its insider threat and personnel security reform efforts,” wrote Michael G. Vickers, then-Under Secretary of Defense (Intelligence) in an April 2015 report to Congress that was released last month under the Freedom of Information Act. “The Department recognizes...

New Docs Show How the NSA Used the Iraq War to Build its Surveillance...

Newly released internal NSA missives from the early days of the Iraq war show how quickly the agency’s priorities shifted from providing wartime intelligence to coalition troops to being a “pervasive” part of the “intelligence-driven” global war on terror. The documents, which have surfaced for the first time, outline how...

NSA spied on EU politicians and companies with help from German intelligence

Spies failed to check properly what was being passed across to the US. Germany's intelligence service, the Bundesnachrichtendienst (BND), has been helping the NSA spy on European politicians and companies for years, according to the German news magazine Der Spiegel. The NSA has been sending lists of "selectors"—identifying telephone numbers, e-mail and IP...

Article Filter Options