While the document provides a rare window into the NSA’s understanding of the mechanics of Russian hacking, it does not show the underlying “raw” intelligence on which the analysis is based. A U.S. intelligence officer who declined to be identified cautioned against drawing too big a conclusion from the document because a single analysis is not necessarily definitive.
Thanks to camera phones and social media, the deadly consequences of U.S. military operations are indeed being recorded, shared, and watched around the world on an unprecedented scale. But while civilian deaths are regularly reported in local media outlets in the Middle East, they are seldom reported in detail by international media.
The termination of the Swedish investigation is, in one sense, good news for Assange. But it is unlikely to change his inability to leave the embassy any time soon. If anything, given the apparent determination of the Trump administration to put him in a U.S. prison cell for the “crime” of publishing documents, his freedom appears further away than it has since 2010, when the Swedish case began.
The so-called Shadow Brokers, who claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world, said they have a new suite of tools and vulnerabilities in newer software. The possible targets include Microsoft’s Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.
Chelsea Manning, the army private who released a vast trove of US state secrets and was punished by the US military for months in penal conditions denounced by the UN as torture, has been released from a military prison in Kansas after serving seven years of a 35-year sentence.
In mid-April, an arsenal of powerful software tools apparently designed by the NSA to infect and control Windows computers was leaked by an entity known only as the “Shadow Brokers.” Not even a whole month later, the hypothetical threat that criminals would use the tools against the general public has become real, and tens of thousands of computers worldwide are now crippled by an unknown party demanding ransom.
El gigante de la informática criticó el papel de los gobiernos y organizaciones que coleccionan vulnerabilidades informáticas que después pueden ser robadas o vendidas a delincuentes informáticos. La empresa pide que lo sucedido sea una lección para erradicar esta práctica en el mundo.
The move comes after its international director, Muhammad Rabbani, a UK citizen, was arrested at Heathrow airport in November for refusing to hand over passwords. Rabbani, 35, has been detained at least 20 times over the past decade when entering the UK, under schedule 7 of terrorism legislation that provides broad search powers, but this was the first time he had been arrested.
Fearless, adversarial journalism that holds the powerful accountable.
Young people attack computer networks to impress friends and challenge political system, crime research shows
From Russian hacking to WikiLeaks, Edward Snowden and CIA cyber weapons, does digital surveillance mean the end of privacy?
Yesterday, WikiLeaks released its latest batch of pilfered CIA material, five documents describing malicious software for taking over Apple MacBooks and iPhones, and wrote in an accompanying post that “the CIA has been infecting the iPhone supply chain of its targets,” prompting concerned readers to wonder if their iPhone or MacBook had been infected on the factory floor. In a statement, Apple says that is almost certainly not the case.
Both the Snowden revelations and the CIA leak highlight the variety of creative techniques intelligence agencies can use to spy on individuals, at a time when many of us are voluntarily giving up our personal data to private companies and installing so-called “smart” devices with microphones (smart TVs, Amazon Echo) in our homes.So, where does this leave us? Is privacy really dead, as Silicon Valley luminaries such as Mark Zuckerberg have previously declared?
It’s difficult to buy a new TV that doesn’t come with a suite of (generally mediocre) “smart” software, giving your home theater some of the functions typically found in phones and tablets. But bringing these extra features into your living room means bringing a microphone, too — a fact the CIA is exploiting, according to a new trove of documents released today by Wikileaks.
Los alcaldes de las comunas acomodadas del sector oriente de Santiago han liderado una iniciativa por sumar tecnología de vigilancia a las medidas para reducir la delincuencia. Esta tendencia fue estrenada por las comunas de Lo Barnechea y Las Condes a mediados del año 2015, al instalar tres globos de video vigilancia de naturaleza militar en sus comunas. Luego de las elecciones municipales de 2016, el alcalde Felipe Alessandri anunció que un globo de similares características sería instalado en la comuna de Santiago, cuya implementación sigue pendiente. Este año el debate ha vuelto a la palestra pública luego del anuncio de las municipalidades de Las Condes y Providencia, quienes pretenden utilizar drones a control remoto equipados cámaras de alta resolución para vigilar los parques y calles de sus comunas para reducir la tasa de criminalidad.
For example, the bureau’s agents can decide that a campus organization is not “legitimate” and therefore not entitled to robust protections for free speech; dig for derogatory information on potential informants without any basis for believing they are implicated in unlawful activity; use a person’s immigration status to pressure them to collaborate and then help deport them when they are no longer useful; conduct invasive “assessments” without any reason for suspecting the targets of wrongdoing; demand that companies provide the bureau with personal data about their users in broadly worded national security letters without actual legal authority to do so; fan out across the internet along with a vast army of informants, infiltrating countless online chat rooms; peer through the walls of private homes; and more. The FBI offered various justifications of these tactics to our reporters. But the documents and our reporting on them ultimately reveal a bureaucracy in dire need of greater transparency and accountability.
WikiLeaks tweeted last week that Assange would agree to US extradition if Obama granted Manning clemency. Asked during a web broadcast on Thursday if he would now leave the embassy, Assange said: “I stand by everything I said, including the offer to go to the United States if Chelsea Manning’s sentence was commuted.”
At the time of her revelations, she was the most important whistleblower since Daniel Ellsberg. Upon hearing the news today, Ellsberg said this: “Once in a while, someone does what they ought to do. Some go to prison for it, for seven years; some accept exile for life. But sometimes even a president does it. And today, it was Obama.”
Earlier on Wednesday, Maria Zakharova, a foreign ministry spokeswoman, wrote on Facebook that Snowden’s right to stay had recently been extended “by a couple of years”. Her post came in response to a suggestion from the former acting CIA director Michael Morell that Vladimir Putin might hand over Snowden to the US, despite there being no extradition treaty between the countries.
The White House insisted on Tuesday that Assange’s offer to submit to extradition if Obama “grants Manning clemency” did not influence the president’s action.
La queja del diputado tiene que ver con la supuesta lentitud de los procesos de habeas data, por lo que propone la creación de un habeas data administrativo que avance directamente sobre las publicaciones consideradas inapropiadas – con una definición muy vaga de lo que es inapropiado – y los emisores de las mismas. Para esto, propone la creación de una figura novedosa: el defensor público en Redes Sociales y medios electrónicos, incluidos allí los servicios como Facebook, Twitter, entre otros así como Whatsapp, Telegram y cualquier otro medio electrónico a crearse en el futuro.Lo más preocupante de la iniciativa tiene que ver con las atribuciones del mentado defensor, ya que se le dará la posibilidad de bloquear tanto contenidos como usuarios de forma inmediata e inaudita parte, es decir, sin derecho a réplica alguno
It’s plausible, and in my opinion likely, that hackers under orders from the Russian government were responsible for the DNC and Podesta hacks in order to influence the U.S. election in favor of Donald Trump. But the Grizzly Steppe report fails to adequately back up this claim. My research, for example, shows that much of the evidence presented is evidence of nothing at all.
The European Union’s top court has severely undermined the British government’s mass surveillance powers in a new ruling that could rein in police and spy agency investigations.In a judgment handed down in Luxembourg on Wednesday, the European Court of Justice declared that the “general and indiscriminate retention” of data about people’s communications and locations was inconsistent with privacy rights. The court stated that the “highly invasive” bulk storage of private data “exceeds the limits of what is strictly necessary and cannot be considered to be justified, within a democratic society.”
Policymakers have given a great deal of attention to the cyber security of governments, critical infrastructure, military targets and commercial enterprises. But civil society groups are also under threat, including human rights defenders, environmental activists, political watchdogs, and other groups promoting the rule of law and democracy.What can be done about these digital threats to civil society around the world?
Al atribuir al registro la búsqueda de “desplegar un mayor control sobre los ciudadanos para garantizar la seguridad nacional”, la ADC sostuvo que “este mecanismo” podría ser usado “como dispositivo disciplinario”: “Esta preocupación se basa, por ejemplo, en la escasa claridad de la resolución en informar bajo qué razones las autoridades del Poder Judicial o del Ministerio Público Fiscal pueden solicitar acceso al Registro, y en la ausencia de especificaciones acerca del control en estos accesos”.
Como pocas veces, el Gobierno logró un amplio consenso respecto de un proyecto de ley, en este caso, el que pretende regular los servicios de Uber y Cabify. El rechazo ha sido unánime.Si bien cada actor tiene sus razones, hay coincidencia de que la propuesta del Ejecutivo no resolverá el tema de fondo –y que realmente debe ser la finalidad de toda normativa–, cual es mejorar la calidad de servicio que se brinda a los usuarios, disponer de una oferta vehicular amplia y contar con tarifas justas y transparentes.
Perhaps the most controversial aspect of the new law is that it will give the British government the authority to serve internet service providers with a “data retention notice,” forcing them to record and store for up to 12 months logs showing websites visited by all of their customers. Law enforcement agencies will then be able to obtain access to this data without any court order or warrant. In addition, the new powers will hand police and tax investigators the ability to, with the approval of a government minister, hack into targeted phones and computers.
A bill giving the UK intelligence agencies and police the most sweeping surveillance powers in the western world has passed into law with barely a whimper, meeting only token resistance over the past 12 months from inside parliament and barely any from outside.The Investigatory Powers Act, passed on Thursday, legalises a whole range of tools for snooping and hacking by the security services unmatched by any other country in western Europe or even the US.
Facebook has “reached out” to “respected fact-checking organizations” for third-party verification, Zuckerberg said, though he did not provide specifics. He said the company also planned to make reporting false stories easier and to create “better technical systems to detect what people will flag as false before they do it themselves”.
Following on from our recent victory against unlawful surveillance by the British intelligence services, Privacy International is taking the British Government to court again. Why? Because it is using ‘general warrants’ to hack the electronic devices (computers, phones, tablets, and the increasing number of things that ‘connect’ to the internet) of sweeping groups of unidentified people at home and abroad. General warrants permit the government to target wide categories of people, places or property (e.g. all mobile phones in London) without any individualised suspicion of wrongdoing.
Y pese a que la prensa mayoritaria lo negaba en forma maniaca, los correos filtrados por Wikileaks eran viralizados por las redes sociales, dando cuenta de una serie de situaciones como las siguientes: cerca de la mitad de las personas que lograron tener acceso a Hillary Clinton mientras era Secretaria de Estado, habían hecho, en los días previos, importantes donaciones a la Fundación Clinton (pay to play); su jefe de campaña era al mismo tiempo lobbista de los gobiernos de Arabia Saudita y Qatar (acusados de ser financistas de ISIS), para los cuales consiguió millonarias ventas de armas (durante el periodo en que Clinton fue Secretaria de Estado las exportaciones de armas duplicaron a las realizadas en tiempos de Bush).
One of the very few remaining avenues for learning what the U.S. government is doing — beyond the propaganda that it wants Americans to ingest and thus deliberately disseminates through media outlets — is leaking and whistleblowing. Among the leading U.S. heroes in the war on terror have been the men and women inside various agencies of the U.S. government who discovered serious wrongdoing being carried out in secret, and then risked their own personal welfare to ensure that the public learned of what never should have been hidden in the first place.
He’ll control an unaccountable drone program, and the prison at Guantanamo Bay. His FBI, including a network of 15,000 paid informants, already has a record of spying on mosques and activists, and his NSA’s surveillance empire is ubiquitous and governed by arcane rules, most of which remain secret. He will inherit bombing campaigns in seven Muslim countries, the de facto ability to declare war unilaterally, and a massive nuclear arsenal — much of which is on hair-trigger alert.
Las abajo firmantes, organizaciones dedicadas a la defensa de los derechos humanos y civiles en entornos tecnológicos, expresamos nuestra profunda preocupación por el proyecto de ley argentino para la incorporación de tecnologías informáticas en la emisión del voto.Seguidamente, detallaremos tres puntos clave del proyecto aprobado en la Cámara de Diputados Argentina que tendrían un impacto negativo en los derechos fundamentales de los ciudadanos.
La masificación de servicios de transporte asociados a plataformas digitales como Uber y Cabify en Chile ha estado acompañada de una fuerte polémica pública. Partidarios y detractores han debatido durante varios meses sobre la necesidad de fomentar, permitir, regular o incluso prohibir estos servicios.