Wednesday, January 16, 2019

NSA asked Germany to spy on tech giant Siemens: report

Berlin (AFP) - The US intelligence agency NSA asked its German partner service BND to spy on the European country's engineering and technology giant Siemens, a German newspaper reported Sunday. In the latest report on a widening spying scandal, the newspaper said the US National Security Agency (NSA) suspected that...

Pentagon steps up private-sector cyber exchanges

The Defense Department is stepping up an exchange program to bring private-sector IT experts into the Pentagon and send military personnel into the corporate world, said Defense Department CIO Terry Halvorsen. A program that has brought Cisco to the Pentagon to share its expertise on routers will expand to include...

New Study Shows Mass Surveillance Breeds Meekness, Fear and Self-Censorship

A newly published study from Oxford’s Jon Penney provides empirical evidence for a key argument long made by privacy advocates: that the mere existence of a surveillance state breeds fear and conformity and stifles free expression. Reporting on the study, the Washington Post this morning described this phenomenon: “If we think that...

Insider Threat Program Inches Forward

The Department of Defense “is moving forward with the development of its insider threat and personnel security reform efforts,” wrote Michael G. Vickers, then-Under Secretary of Defense (Intelligence) in an April 2015 report to Congress that was released last month under the Freedom of Information Act. “The Department recognizes...

The NSA Leak Is Real, Snowden Documents Confirm

On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly...

Yahoo secretly scanned customer emails for U.S. intelligence

Yahoo Inc last year secretly built a custom software program to search all of its customers' incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter. The company complied with a classified U.S. government demand, scanning hundreds of millions of Yahoo Mail accounts...

Secretive cyber warfare firm NSO Group explores sale

NSO Group Ltd, a company that helps governments spy on mobile phones and is so secretive that it regularly changes its name, is exploring a sale that could value it at close to $1 billion, including debt, according to people familiar with the matter. The move comes as governments around...

Iranian Police Seizing Dissidents Get Aid Of Western Companies

The Iranian officers who knocked out Saeid Pourheydar’s four front teeth also enlightened the opposition journalist. Held in Evin Prison for weeks following his arrest early last year for protesting, he says, he learned that he was not only fighting the regime, but also companies that armed Tehran with...

Burr-Feinstein encryption bill is officially here in all its scary glory

Senators Richard Burr and Dianne Feinstein released the official version of their anti-encryption bill today after a draft appeared online last week. The bill, titled the Compliance with Court Orders Act of 2016, would require tech firms to decrypt customers’ data at a court’s request. The Burr-Feinstein proposal has already faced heavy criticism...

The CIA and the Press: When the Washington Post Ran the CIA’s Propaganda Network

Last week, the Washington Post published a scurrilous piece by a heretofore obscure technology reporter named Craig Timberg, alleging without the faintest evidence that Russian intelligence was using more than 200 independent news sites to pump out pro-Putin and anti-Clinton propaganda during the election campaign. Under the breathless headline, “Russian propaganda effort...

What NSA Director Mike Rogers Doesn’t Get About Encryption

At a New America Foundation conference on cybersecurity Monday, NSA Director Mike Rogers gave an interview that—despite his best efforts to deal exclusively in uninformative platitudes—did produce a few lively moments. The most interesting of these came when techies in the audience—security guru Bruce Schneier and Yahoo’s chief information...

How the CIA made Google

Inside the secret network behind mass surveillance, endless war, and Skynet. The origins of this ingenious strategy trace back to a secret Pentagon-sponsored group, that for the last two decades has functioned as a bridge between the US government and elites across the business, industry, finance, corporate, and media sectors....

Under Amazon’s CIA Cloud: The Washington Post

News media should illuminate conflicts of interest, not embody them. But the owner of the Washington Post is now doing big business with the Central Intelligence Agency, while readers of the newspaper’s CIA coverage are left in the dark. The Post’s new owner, Jeff Bezos, is the founder and CEO of Amazon --...

Mission Unstoppable

From drone strikes to prison torture, the CIA has been pulling the strings of U.S. Foreign Policy since 9/11. And if history is a guide, the agency will be calling the shots in the Middle East for years to come.

Firms Aided Libyan Spies

First Look Inside Security Unit Shows How Citizens Were Tracked. TRIPOLI - On the ground floor of a six-story building here, agents working for Moammar Gadhafi sat in an open room, spying on emails and chat messages with the help of technology Libya acquired from the West. The recently abandoned room...

Cisco Exploit Leaked in NSA Hack Modifies to Target Latest Version of Firewalls

Recently released NSA exploit from "The Shadow Brokers" leak that affects older versions of Cisco System firewalls can work against newer models as well. Dubbed ExtraBacon, the exploit was restricted to versions 8.4.(4) and earlier versions of Cisco's Adaptive Security Appliance (ASA) – a line of firewalls designed to protect...

Estonia Tackles Improving NATO’s Cyber Defenses

PENTAGON - These days, it seems like nowhere in the cyber realm is safe. Hacks have infiltrated all walks of cyber life, from the email system used by the Joint Chiefs of Staff’s office at the Pentagon, to the cheating spouses on the Canada-based Ashley Madison website. But the NATO Cooperative...

Companies That Aid Syria Crackdown Deserve Sanctions’ Slap

Terrible things tend to happen when Syrian security officials catch their quarry. Dissidents are detained, tortured and sometimes killed. It is thus disturbing to learn that U.S. and European technology companies are working to help the regime of President Bashar al-Assad monitor Internet traffic to keep tabs on citizens. A...

Many of the NSA’s Loudest Defenders Have Financial Ties to NSA Contractors

The debate over the NSA’s bulk collection of phone records has reached a critical point after a federal appeals court last week ruled the practice illegal, dramatically raising the stakes for pending Congressional legislation that would fully or partially reinstate the program. An army of pundits promptly took to television screens, with...

NSA Spies on Venezuela’s Oil Company, Snowden Leak Reveals

U.S. intelligence agents posing as diplomats in Caracas helped an NSA analyst try to crack open PDVSA's computer network. The U.S. National Security Agency accessed the internal communications of Venezuela's state-owned oil company, Petroleos de Venezuela and acquired sensitive data it planned to exploit in order to spy on the...

NSA accused of spying on Brazilian oil company Petrobras

Accusations that NSA is conducting intelligence-gathering operations that go beyond its core mission of national security. The US National Security Agency has been accused of spying on Brazil's biggest oil company, Petrobras, following the release of more files from US whistleblower Edward Snowden. The latest disclosures, which aired on Brazil's Fantástico news...

Top U.S. spy agency has not embraced CIA assessment on Russia hacking

The overseers of the U.S. intelligence community have not embraced a CIA assessment that Russian cyber attacks were aimed at helping Republican President-elect Donald Trump win the 2016 election, three American officials said on Monday. While the Office of the Director of National Intelligence (ODNI) does not dispute the CIA's...

Hacking Team hacked: firm sold spying tools to repressive regimes, documents claim

Cybersecurity firm has 400GB of what purport to be its own documents published via its Twitter feed after hack. The cybersecurity firm Hacking Team appears to have itself been the victim of a hack, with documents that purport to show it sold software to repressive regimes being posted to the...

Congress Slips CISA Into a Budget Bill That’s Sure to Pass

Privacy advocates were aghast in October when the Senate passed the Cybersecurity Information Sharing Act by a vote of 74 to 21, leaving intact portions of the law they say make it more amenable to surveillance than actual security. Now, as CISA gets closer to the President’s desk, those...

House Approves USA Freedom Act, Extending And Revising The Patriot Act

The U.S. House of Representatives voted Wednesday to approve a measure that would, among other things, end the mass collection of Americans' phone data. The USA Freedom Act extends many parts of the 2001 USA Patriot Act, which expires June 1. The measure's fate in the Senate is less likely. The surveillance issue...

New Docs Show How the NSA Used the Iraq War to Build its Surveillance...

Newly released internal NSA missives from the early days of the Iraq war show how quickly the agency’s priorities shifted from providing wartime intelligence to coalition troops to being a “pervasive” part of the “intelligence-driven” global war on terror. The documents, which have surfaced for the first time, outline how...

Obama Administration Set to Expand Sharing of Data That NSA Intercepts

WASHINGTON — The Obama administration is on the verge of permitting the National Security Agency to share more of the private communications it intercepts with other American intelligence agencies without first applying any privacy protections to them, according to officials familiar with the deliberations. The change would relax longstanding restrictions...

Every Move You Make

This summer, at 1:51 p.m. on Saturday, June 11, an unearthly roar shattered the afternoon quiet along the Florida coast. On Cape Canaveral, liquid fuel surged through the thick aluminum veins of a Delta IV Heavy rocket nearly as tall as the U.S. Capitol. Two million pounds of thrust in three symmetrical boosters fired the engines, sending the craft hurtling over the Atlantic Ocean into the heavens.

IBM Concedes $600M CIA Cloud Deal To Amazon

IBM has withdrawn its challenge to Amazon's $600 million cloud-computing deal with the Central Intelligence Agency. “In light of the government’s recent submissions emphasizing its need to move forward on the contract, IBM has withdrawn its motion,” IBM said in a statement to CruxialCIO. “IBM maintains its position that the...

U.S. Supreme Court allows the FBI to Hack any Computer in the World

The US Supreme Court has approved amendments to Rule 41, which now gives judges the authority to issue search warrants, not only for computers located in their jurisdiction but also outside their jurisdiction. Under the original Rule 41, let’s say, a New York judge can only authorize the FBI to...

Article Filter Options