Ciberguerra: cuando el arma más poderosa es un ejército de hackers

La ciberguerra ha dejado de ser una excentricidad reservada a actos aislados, a pequeñas cosas. Las nuevas tecnologías forman parte de los civiles y sus ejércitos. Y atacarlas se ha puesto a la par de la guerra convencional.

Fuente: Ciberguerra: cuando el arma más poderosa es un ejército de hackers


With the latest WikiLeaks revelations about the CIA – is privacy really dead? | World news | The Guardian

Both the Snowden revelations and the CIA leak highlight the variety of creative techniques intelligence agencies can use to spy on individuals, at a time when many of us are voluntarily giving up our personal data to private companies and installing so-called “smart” devices with microphones (smart TVs, Amazon Echo) in our homes.So, where does this leave us? Is privacy really dead, as Silicon Valley luminaries such as Mark Zuckerberg have previously declared?

Fuente: With the latest WikiLeaks revelations about the CIA – is privacy really dead? | World news | The Guardian


Malware Attacks Used by the U.S. Government Retain Potency for Many Years, New Evidence Indicates

A new report from Rand Corp. may help shed light on the government’s arsenal of malicious software, including the size of its stockpile of so-called “zero days” — hacks that hit undisclosed vulnerabilities in computers, smartphones, and other digital devices.The report also provides evidence that such vulnerabilities are long lasting. The findings are of particular interest because not much is known about the U.S. government’s controversial use of zero days.

Fuente: Malware Attacks Used by the U.S. Government Retain Potency for Many Years, New Evidence Indicates


WikiLeaks publishes ‘biggest ever leak of secret CIA documents’ | Media | The Guardian

The US intelligence agencies are facing fresh embarrassment after WikiLeaks published what it described as the biggest ever leak of confidential documents from the CIA detailing the tools it uses to break into phones, communication apps and other electronic devices.

Fuente: WikiLeaks publishes ‘biggest ever leak of secret CIA documents’ | Media | The Guardian


Wikileaks Dump Shows CIA Could Turn Smart TVs into Listening Devices

It’s difficult to buy a new TV that doesn’t come with a suite of (generally mediocre) “smart” software, giving your home theater some of the functions typically found in phones and tablets. But bringing these extra features into your living room means bringing a microphone, too — a fact the CIA is exploiting, according to a new trove of documents released today by Wikileaks.

Fuente: Wikileaks Dump Shows CIA Could Turn Smart TVs into Listening Devices


WikiLeaks filtra programa encubierto de la CIA que usa celulares y televisores como “micrófonos encubiertos” – El Mostrador

La información revelada hoy sobre “hacking” (ataque cibernético) es parte de una serie en siete entregas que define como “la mayor filtración de datos de inteligencia de la historia”.

Fuente: WikiLeaks filtra programa encubierto de la CIA que usa celulares y televisores como “micrófonos encubiertos” – El Mostrador


Servicio de inteligencia alemán recluta “espías 2.0” capaces de anticiparse a hackers – El Mostrador

los servicios secretos germanos han lanzado en su página web una especie de concurso llamado “Sherlock Holmes en el ciberespacio”, con el que pretenden encontrar jóvenes talentos que puedan hacer frente a los riesgos de futuro gracias a su destreza con las nuevas tecnologías.

Fuente: Servicio de inteligencia alemán recluta “espías 2.0” capaces de anticiparse a hackers – El Mostrador


My Friend Cayla: la muñeca prohibida en Alemania que espía a tu familia

La línea de muñecas “My Friend Cayla” ha sido prohibida en Alemania, luego que el gobierno del país europeo descubriera que éstas eran utilizadas para grabar y guardar datos de sus usuarios sin su consentimiento.

Fuente: My Friend Cayla: la muñeca prohibida en Alemania que espía a tu familia


El fantasma del espionaje durante la guerra fría se instala en la Universidad de Cambridge – El Mostrador

Tres académicos renunciaron a organizar un seminario sobre temas de seguridad e inteligencia, porque sospechan que una editorial ligada a la actividad pueda ser usada como pantalla por espías del Kremlin. “Cambridge es un maravilloso lugar de teorías conspirativas pero la idea de que haya un complot maquiavélico es ridículo”, dijo Neil Kent, uno de los principales impulsores del evento.

Fuente: El fantasma del espionaje durante la guerra fría se instala en la Universidad de Cambridge – El Mostrador


UK spy chief warns on ‘profound’ propaganda threat

“The connectivity that is at the heart of globalisation can be exploited by states with hostile intent to further their aims deniably,” said Mr Younger. “They do this through means as varied as cyber attacks, propaganda or subversion of democratic process.”

Fuente: UK spy chief warns on ‘profound’ propaganda threat


South African Spy Company Used by Gadaffi Touts its NSA-Like Capabilities

In a 2016 pamphlet produced by VASTech SA Pty Ltd., the company outlines its current capabilities for governments, militaries, and law enforcement agencies around the world, claiming it can conduct “passive detection” of communications transmitted from satellites, fix-and-mobile phones, and fiber optic cable.

Fuente: South African Spy Company Used by Gadaffi Touts its NSA-Like Capabilities


If the US hacks Russia for revenge, that could lead to cyberwar | Trevor Timm | Opinion | The Guardian

What’s the CIA’s brilliant plan for stopping Russian cyber-attacks on the US and their alleged interference with the US election? Apparently, some in the agency want to escalate tensions between the two superpowers even more and possibly do the same thing right back to them.

Fuente: If the US hacks Russia for revenge, that could lead to cyberwar | Trevor Timm | Opinion | The Guardian


Security fears over FBI contracting out highly sensitive surveillance documents | US news | The Guardian

The FBI has contracted out with a private firm to handle, distribute and monitor highly sensitive surveillance documents, in an arrangement veteran FBI agents consider a potential privacy and counterintelligence risk.

Fuente: Security fears over FBI contracting out highly sensitive surveillance documents | US news | The Guardian


NSA Theft Suspect Worked For Contractor That Sells the Government Tech for Spotting Rogue Employees

Booz Allen Hamilton, the defense contracting giant whose employee was charged Wednesday in connection with the theft of hacking codes used by the National Security Agency, provides a fairly ironic service to the government: spotting rogue employees.

Fuente: NSA Theft Suspect Worked For Contractor That Sells the Government Tech for Spotting Rogue Employees


NSA contractor arrested for alleged theft of top secret classified information | US news | The Guardian

Shares183Save for laterThe FBI has arrested a National Security Agency contractor on suspicion of the theft of top secret classified data and documents in an alleged security breach at the same intelligence agency whose spy secrets were exposed by Edward Snowden.

Fuente: NSA contractor arrested for alleged theft of top secret classified information | US news | The Guardian


Presidencia no quiere que sepas a cuántas personas espió el CISEN en 2014 | R3D: Red en Defensa de los Derechos Digitales

En respuesta a una solicitud de información promovida en 2016 por la Red en Defensa de los Derechos Digitales (R3D), la Consejería Jurídica del Ejecutivo ha pedido a la Suprema Corte de Justicia de la Nación que no se divulguen las estadísticas detalladas sobre las intervenciones a comunicaciones privadas hechas por parte del Centro de Investigación y Seguridad Nacional (CISEN) durante 2014.

Fuente: Presidencia no quiere que sepas a cuántas personas espió el CISEN en 2014 | R3D: Red en Defensa de los Derechos Digitales


El MI6 contratará casi mil espías para combatir el terrorismo – El Mostrador

Según afirmaciones de Younger publicadas por The Times el mundo digital “representa una amenaza porque los que se oponen a nosotros pueden utilizar esta capacidad para tener acceso a nuestras actividades, lo que significa que tenemos que cambiar completamente la forma en que hacemos las cosas”.

Fuente: El MI6 contratará casi mil espías para combatir el terrorismo – El Mostrador


Long-Secret Stingray Manuals Detail How Police Can Spy on Phones

Harris Corp.’s Stingray surveillance device has been one of the most closely-guarded secrets in law enforcement for more than 15 years. The company and its police clients across the United States have fought to keep information about the mobile-phone-monitoring boxes from the public against which they are used. The Intercept has obtained several Harris instruction manuals spanning roughly 200 pages and meticulously detailing how to create a cellular surveillance dragnet.

Fuente: Long-Secret Stingray Manuals Detail How Police Can Spy on Phones


The NSA’s British Base at the Heart of U.S. Targeted Killing

in the heart of the tranquil English countryside, is the National Security Agency’s largest overseas spying base. Originally used to monitor Soviet communications through the Cold War, its focus has since dramatically shifted, and today it is a vital part of the NSA’s sprawling global surveillance network.

Fuente: The NSA’s British Base at the Heart of U.S. Targeted Killing


How the U.S. Spies on Medical Nonprofits and Health Defenses Worldwide

As part of an ongoing effort to “exploit medical intelligence,” the National Security Agency teamed up with the military-focused Defense Intelligence Agency to extract “medical SIGINT” from the intercepted communications of nonprofit groups starting in the early 2000s, a top-secret document shows.

Fuente: How the U.S. Spies on Medical Nonprofits and Health Defenses Worldwide


Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas

Un grupo de hackers vinculado a la Agencia de Seguridad Nacional de los Estados Unidos, mejor conocida como la NSA (National Security Agency), ha sido hackeado recientemente y sus herramientas de espionaje, recolección de información, malware y más, han sido puestas en venta por 1 millón de bitcoins (más de 550 millones de dólares al momento de la publicación).

Fuente: Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas


¿Son estas las armas de espionaje de la NSA? | Derechos Digitales

Un grupo de hackers dice haber obtenido información confidencial de Equation Group, un conocido y sofisticado grupo de ciber atacantes ligado a la NSA. Parte de la información publicada permite por primera vez echar un vistazo a las herramientas utilizadas por la agencia de seguridad estadounidense.

Fuente: ¿Son estas las armas de espionaje de la NSA? | Derechos Digitales


Israeli firm accused of creating iPhone spyware | World news | The Guardian

An Israeli technology company has been accused of creating and supplying an aggressive interception program capable of taking over Apple’s iPhones and turning them into remote spying devices, after it was allegedly used to target a Middle Eastern human rights activist and others.

Fuente: Israeli firm accused of creating iPhone spyware | World news | The Guardian


Germany to further curb activities of spy agency in wake of NSA scandal | World news | The Guardian

Germany has approved new measures to rein in the activities of its foreign intelligence agency after a scandal over improper collusion with the US National Security Agency.

Fuente: Germany to further curb activities of spy agency in wake of NSA scandal | World news | The Guardian


The Intercept Is Broadening Access to the Snowden Archive. Here’s Why

SIDtoday is the internal newsletter for the NSA’s most important division, the Signals Intelligence Directorate. After editorial review, The Intercept is releasing nine years’ worth of newsletters in batches, starting with 2003. The agency’s spies explain a surprising amount about what they were doing, how they were doing it, and why.

Fuente: The Intercept Is Broadening Access to the Snowden Archive. Here’s Why


The Intercept Is Broadening Access to the Snowden Archive. Here’s Why

From the time we began reporting on the archive provided to us in Hong Kong by NSA whistleblower Edward Snowden, we sought to fulfill his two principal requests for how the materials should be handled: that they be released in conjunction with careful reporting that puts the documents in context and makes them digestible to the public, and that the welfare and reputations of innocent people be safeguarded. As time has gone on, The Intercept has sought out new ways to get documents from the archive into the hands of the public, consistent with the public interest as originally conceived.Today, The Intercept is announcing two innovations in how we report on and publish these materials. Both measures are designed to ensure that reporting on the archive continues in as expeditious and informative a manner as possible, in accordance with the agreements we entered into with our source about how these materials would be disclosed, a framework that he, and we, have publicly described on numerous occasions.

Fuente: The Intercept Is Broadening Access to the Snowden Archive. Here’s Why


Documents Reveal Secretive U.K. Surveillance Policies

NEWLY DISCLOSED DOCUMENTS offer a rare insight into the secretive legal regime underpinning the British government’s controversial mass surveillance programs.The London-based group Privacy International obtained the previously confidential files as part of an ongoing legal case challenging the scope of British spies’ covert collection of huge troves of private data.

Fuente: Documents Reveal Secretive U.K. Surveillance Policies


Peña Nieto utilizó espionaje telefónico y bots de Twitter durante la elección presidencial

La revista Bloomberg Businessweek ha publicado una investigación que relaciona al hacker colombiano Andrés Sepúlveda con la campaña presidencial de Enrique Peña Nieto en 2012. De acuerdo con Sepúlveda –que enfrenta una condena de 10 años de prisión por alterar la elección presidencial de Colombia en 2014–, él fue contratado para intervenir las comunicaciones de los oponentes de Peña Nieto, crear una red de bots de Twitter para contaminar la conversación en la red social, instalar software de espionaje en teléfonos y computadoras, entre otras actividades.

Fuente: Peña Nieto utilizó espionaje telefónico y bots de Twitter durante la elección presidencial


Hacking Team Is Back In Business, But Struggling To Survive | Motherboard

Earlier this year, a representative for the notorious surveillance vendor Hacking Team traveled to South America to pitch the company’s marquee spyware product to a potential new customer.The representative gave a presentation at the office of a government agency, showed off the spyware control center, and handed out some marketing materials.It was an unremarkable sales pitch—affirmed by the fact that the potential client decided not to buy, according to a source who attended the meeting—except for the timing, which was almost six months after what some consider Hacking Team’s near-death experience.

Fuente: Hacking Team Is Back In Business, But Struggling To Survive | Motherboard


Five Big Unanswered Questions About NSA’s Worldwide Spying

Nearly three years after NSA whistleblower Edward Snowden gave journalists his trove of documents on the intelligence community’s broad and powerful surveillance regime, the public is still missing some crucial, basic facts about how the operations work.Surveillance researchers and privacy advocates published a report on Wednesday outlining what we do know, thanks to the period of discovery post-Snowden — and the overwhelming amount of things we don’t.

Fuente: Five Big Unanswered Questions About NSA’s Worldwide Spying


Exclusive: Snowden intelligence docs reveal UK spooks' malware checklist / Boing Boing

Boing Boing is proud to publish two original documents disclosed by Edward Snowden, in connection with “Sherlock Holmes and the Adventure of the Extraordinary Rendition,” a short story …

Fuente: Exclusive: Snowden intelligence docs reveal UK spooks’ malware checklist / Boing Boing


Big tech groups warn UK against spy bill – FT.com

Silicon Valley’s biggest companies have urged the UK government to reconsider swaths of its proposed surveillance law, saying it will have far-reaching implications for how other countries upgrade their spying regimes. In a rare show of unity,

Fuente: Big tech groups warn UK against spy bill – FT.com


Spying on Congress and Israel: NSA Cheerleaders Discover Value of Privacy Only When Their Own Is Violated

Mass, warrantless surveillance is inherently abusive and unjustified, and one shouldn’t need a report that this was done to the Benjamin Netanyahus and Pete Hoekstras of the world to realize that.

Fuente: Spying on Congress and Israel: NSA Cheerleaders Discover Value of Privacy Only When Their Own Is Violated


US 'spied on Binyamin Netanyahu during Iran nuclear deal talks' | World news | The Guardian

NSA surveillance of Israeli officials and US congressmen revealed that prime minister and advisers leaked negotiation details, the Wall Street Journal reported

Fuente: US ‘spied on Binyamin Netanyahu during Iran nuclear deal talks’ | World news | The Guardian