Desde 2005, el decreto 142 es el que regula la forma en que las empresas proveedoras de telecomunicaciones manipulan nuestros datos como usuarios. Sin embargo, los plazos legalmente establecidos para la retención de dichos datos y el tipo de comunicación almacenada por las compañías, fueron dos de las preocupaciones del Ministerio Público y las policías, que llevaron a que el gabinete de Mahmud Aleuy comenzara a trabajar en una actualización de esta normativa que, según expertos, es mucho más amplia, contraviniendo el derecho a la vida privada y a la inviolabilidad de las comunicaciones.
One part of the explanation is the structural situation of the news media. As newspapers die off, their place in the American consciousness is taken by social networks of both the formal and informal variety. Thanks to Facebook and Twitter, these days we read only that which confirms our biases. Once upon a time, perhaps, the Washington Post could single-handedly bring down a president, but those days have passed.But there’s also a second reason, one that is even more fundamental. The truth is that the unanimous anti-Trumpness of the respectable press is just one facet of a larger homogeneity. As it happens, the surviving press in this country is unanimous about all sorts of things.
The two companies – one that handles private communications, the other the world’s largest retailer with a track record of good customer service – were criticised for not having strong public policies around the notification of government data requests. They were also criticised for not meeting the EFF’s benchmark for not selling out users and a lack of on-the-record policies to request judicial review of the gag orders that accompany NSLs, which are akin to subpoenas for user activity and have, the EFF says, contributed to the “widespread abuse of this investigatory tool” that can be deployed without judicial review.
The spy software – known as Pegasus and made by the Israeli firm NSO Group – is only sold to governments, supposedly for use against terrorists and criminals. But an investigation by researchers at the University of Toronto revealed that it was deployed against Mexican anti-corruption crusaders, journalists investigating the president, and activists pushing for a soda tax.
While the document provides a rare window into the NSA’s understanding of the mechanics of Russian hacking, it does not show the underlying “raw” intelligence on which the analysis is based. A U.S. intelligence officer who declined to be identified cautioned against drawing too big a conclusion from the document because a single analysis is not necessarily definitive.
Russian president calls allegations of interference in US presidential election ‘useless and harmful chatter’ at St Petersburg economic forum
Thanks to camera phones and social media, the deadly consequences of U.S. military operations are indeed being recorded, shared, and watched around the world on an unprecedented scale. But while civilian deaths are regularly reported in local media outlets in the Middle East, they are seldom reported in detail by international media.
Google, el buscador más popular de internet y una de las mayores empresas del mundo, está bloqueado en China desde 2010, pero esta semana la compañía estadounidense ha intentado ganarse de nuevo a las autoridades del país con más internautas del mundo con algo tan sorprendente como un torneo de un juego mental.
Egypt has blocked access to at least 21 news sites critical of the government, notably the Qatari channel Al-Jazeera, Huffington Post’s Arabic-language site HuffPost Arabi and the independent website Mada Masr.
The termination of the Swedish investigation is, in one sense, good news for Assange. But it is unlikely to change his inability to leave the embassy any time soon. If anything, given the apparent determination of the Trump administration to put him in a U.S. prison cell for the “crime” of publishing documents, his freedom appears further away than it has since 2010, when the Swedish case began.
The so-called Shadow Brokers, who claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world, said they have a new suite of tools and vulnerabilities in newer software. The possible targets include Microsoft’s Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.
Chelsea Manning, the army private who released a vast trove of US state secrets and was punished by the US military for months in penal conditions denounced by the UN as torture, has been released from a military prison in Kansas after serving seven years of a 35-year sentence.
The supercomputer described in the trove, “WindsorGreen,” was a system designed to excel at the sort of complex mathematics that underlies encryption, the technology that keeps data private, and almost certainly intended for use by the Defense Department’s signals intelligence wing, the National Security Agency. WindsorGreen was the successor to another password-cracking machine used by the NSA, “WindsorBlue,” which was also documented in the material leaked from NYU and which had been previously described in the Norwegian press thanks to a document provided by National Security Agency whistleblower Edward Snowden. Both systems were intended for use by the Pentagon and a select few other Western governments, including Canada and Norway.
In mid-April, an arsenal of powerful software tools apparently designed by the NSA to infect and control Windows computers was leaked by an entity known only as the “Shadow Brokers.” Not even a whole month later, the hypothetical threat that criminals would use the tools against the general public has become real, and tens of thousands of computers worldwide are now crippled by an unknown party demanding ransom.
El gigante de la informática criticó el papel de los gobiernos y organizaciones que coleccionan vulnerabilidades informáticas que después pueden ser robadas o vendidas a delincuentes informáticos. La empresa pide que lo sucedido sea una lección para erradicar esta práctica en el mundo.
The move comes after its international director, Muhammad Rabbani, a UK citizen, was arrested at Heathrow airport in November for refusing to hand over passwords. Rabbani, 35, has been detained at least 20 times over the past decade when entering the UK, under schedule 7 of terrorism legislation that provides broad search powers, but this was the first time he had been arrested.
The documents, published Monday in collaboration with Japanese news broadcaster NHK, reveal the complicated relationship the NSA has maintained with Japan over a period of more than six decades. Japan has allowed NSA to maintain at least three bases on its territory and contributed more than half a billion dollars to help finance the NSA’s facilities and operations. In return, NSA has kitted out Japanese spies with powerful surveillance tools and shared intelligence with them. However, there is a duplicitous dimension to the partnership. While the NSA has maintained friendly ties with its Japanese counterparts and benefited from their financial generosity, at the same time it has secretly spied on Japanese officials and institutions.
Fearless, adversarial journalism that holds the powerful accountable.
Young people attack computer networks to impress friends and challenge political system, crime research shows
En el siglo XXI, procesos como encontrar pareja, trabajo, reconocer rostros, tomar fotos, construir -y manejar- autos y enviar emails, entre otros servicios entregados por aplicaciones móviles, se basan también en el uso de algoritmos. Y Chile no está ajeno al avance científico y matemático en torno a ellos.
Hoy se realizó el lanzamiento del índice de responsabilidad corporativa Ranking Digital Rights 2017, el cual evalúa 22 de las compañías de telecomunicaciones, internet y telefonía móvil, más poderosas del mundo. Pero al mismo tiempo, el senado estadounidense votó a favor de la eliminación de las normas de privacidad de banda ancha que exigían a las empresas prestadoras de servicios de internet (ISP), consentimiento explícito de sus usuarios, para vender o compartir sus datos de navegación web con anunciantes y terceros.
From Russian hacking to WikiLeaks, Edward Snowden and CIA cyber weapons, does digital surveillance mean the end of privacy?
Tras el ataque al Parlamento Británico ocurrido la semana pasada, los políticos británicos han exigido que Whatsapp y otras aplicaciones de mensajería instantánea proporcionen acceso a la policía y fuerzas de seguridad para así poder monitorear conversaciones terroristas. Sin embargo, los expertos en tecnología discuten que abrir las “puertas traseras” de los servicios de mensajería popular, las cuales usan cifrado de extremo a extremo, arrojaría una serie de problemas.
La reproducción y distribución ilegal de copias de obras protegidas por el derecho de autor generan -sólo en Chile- pérdidas superiores a los US$4 mil millones. Cómo frenar la circulación de material apócrifo y desincentivar el consumo de productos culturales falsos, es el desafío que se han impuesto la PDI y Editorial Santillana.
A number of recent cases in the media have revealed instances of U.S. citizens and others being compelled by CBP agents to unlock their devices for search. In some instances, people have claimed to have been physically coerced into complying, including one American citizen who said that CBP agents grabbed him by the neck in order to take his cellphone out of his possession.
“Hay poca o ninguna evidencia para persuadirme de la eficacia o la proporcionalidad de algunas medidas extremadamente intrusivas presentes en las nuevas leyes de privacidad de Francia, Alemania, el Reino Unido y los Estados Unidos”, asegura Cannataci, en un comunicado de la Oficina del Alto Comisionado de Derechos Humanos de la ONU.
Yesterday, WikiLeaks released its latest batch of pilfered CIA material, five documents describing malicious software for taking over Apple MacBooks and iPhones, and wrote in an accompanying post that “the CIA has been infecting the iPhone supply chain of its targets,” prompting concerned readers to wonder if their iPhone or MacBook had been infected on the factory floor. In a statement, Apple says that is almost certainly not the case.
Internal US law enforcement documents describe a highly controversial community initiative aimed at identifying potential terrorists before they “radicalize” as being intimately related to intelligence gathering.Despite years of official denials, American Muslim civil rights groups have claimed that Barack Obama’s Countering Violent Extremism (CVE) initiative was a euphemistic approach that targeted Muslims for surveillance.
Both the Snowden revelations and the CIA leak highlight the variety of creative techniques intelligence agencies can use to spy on individuals, at a time when many of us are voluntarily giving up our personal data to private companies and installing so-called “smart” devices with microphones (smart TVs, Amazon Echo) in our homes.So, where does this leave us? Is privacy really dead, as Silicon Valley luminaries such as Mark Zuckerberg have previously declared?
A new report from Rand Corp. may help shed light on the government’s arsenal of malicious software, including the size of its stockpile of so-called “zero days” — hacks that hit undisclosed vulnerabilities in computers, smartphones, and other digital devices.The report also provides evidence that such vulnerabilities are long lasting. The findings are of particular interest because not much is known about the U.S. government’s controversial use of zero days.
It’s difficult to buy a new TV that doesn’t come with a suite of (generally mediocre) “smart” software, giving your home theater some of the functions typically found in phones and tablets. But bringing these extra features into your living room means bringing a microphone, too — a fact the CIA is exploiting, according to a new trove of documents released today by Wikileaks.
Los alcaldes de las comunas acomodadas del sector oriente de Santiago han liderado una iniciativa por sumar tecnología de vigilancia a las medidas para reducir la delincuencia. Esta tendencia fue estrenada por las comunas de Lo Barnechea y Las Condes a mediados del año 2015, al instalar tres globos de video vigilancia de naturaleza militar en sus comunas. Luego de las elecciones municipales de 2016, el alcalde Felipe Alessandri anunció que un globo de similares características sería instalado en la comuna de Santiago, cuya implementación sigue pendiente. Este año el debate ha vuelto a la palestra pública luego del anuncio de las municipalidades de Las Condes y Providencia, quienes pretenden utilizar drones a control remoto equipados cámaras de alta resolución para vigilar los parques y calles de sus comunas para reducir la tasa de criminalidad.