With the latest WikiLeaks revelations about the CIA – is privacy really dead? | World news | The Guardian

Both the Snowden revelations and the CIA leak highlight the variety of creative techniques intelligence agencies can use to spy on individuals, at a time when many of us are voluntarily giving up our personal data to private companies and installing so-called “smart” devices with microphones (smart TVs, Amazon Echo) in our homes.So, where does this leave us? Is privacy really dead, as Silicon Valley luminaries such as Mark Zuckerberg have previously declared?

Fuente: With the latest WikiLeaks revelations about the CIA – is privacy really dead? | World news | The Guardian

WikiLeaks publishes ‘biggest ever leak of secret CIA documents’ | Media | The Guardian

The US intelligence agencies are facing fresh embarrassment after WikiLeaks published what it described as the biggest ever leak of confidential documents from the CIA detailing the tools it uses to break into phones, communication apps and other electronic devices.

Fuente: WikiLeaks publishes ‘biggest ever leak of secret CIA documents’ | Media | The Guardian

Wikileaks Dump Shows CIA Could Turn Smart TVs into Listening Devices

It’s difficult to buy a new TV that doesn’t come with a suite of (generally mediocre) “smart” software, giving your home theater some of the functions typically found in phones and tablets. But bringing these extra features into your living room means bringing a microphone, too — a fact the CIA is exploiting, according to a new trove of documents released today by Wikileaks.

Fuente: Wikileaks Dump Shows CIA Could Turn Smart TVs into Listening Devices

WikiLeaks filtra programa encubierto de la CIA que usa celulares y televisores como “micrófonos encubiertos” – El Mostrador

La información revelada hoy sobre “hacking” (ataque cibernético) es parte de una serie en siete entregas que define como “la mayor filtración de datos de inteligencia de la historia”.

Fuente: WikiLeaks filtra programa encubierto de la CIA que usa celulares y televisores como “micrófonos encubiertos” – El Mostrador

My Friend Cayla: la muñeca prohibida en Alemania que espía a tu familia

La línea de muñecas “My Friend Cayla” ha sido prohibida en Alemania, luego que el gobierno del país europeo descubriera que éstas eran utilizadas para grabar y guardar datos de sus usuarios sin su consentimiento.

Fuente: My Friend Cayla: la muñeca prohibida en Alemania que espía a tu familia

South African Spy Company Used by Gadaffi Touts its NSA-Like Capabilities

In a 2016 pamphlet produced by VASTech SA Pty Ltd., the company outlines its current capabilities for governments, militaries, and law enforcement agencies around the world, claiming it can conduct “passive detection” of communications transmitted from satellites, fix-and-mobile phones, and fiber optic cable.

Fuente: South African Spy Company Used by Gadaffi Touts its NSA-Like Capabilities

Security fears over FBI contracting out highly sensitive surveillance documents | US news | The Guardian

The FBI has contracted out with a private firm to handle, distribute and monitor highly sensitive surveillance documents, in an arrangement veteran FBI agents consider a potential privacy and counterintelligence risk.

Fuente: Security fears over FBI contracting out highly sensitive surveillance documents | US news | The Guardian

Presidencia no quiere que sepas a cuántas personas espió el CISEN en 2014 | R3D: Red en Defensa de los Derechos Digitales

En respuesta a una solicitud de información promovida en 2016 por la Red en Defensa de los Derechos Digitales (R3D), la Consejería Jurídica del Ejecutivo ha pedido a la Suprema Corte de Justicia de la Nación que no se divulguen las estadísticas detalladas sobre las intervenciones a comunicaciones privadas hechas por parte del Centro de Investigación y Seguridad Nacional (CISEN) durante 2014.

Fuente: Presidencia no quiere que sepas a cuántas personas espió el CISEN en 2014 | R3D: Red en Defensa de los Derechos Digitales

Long-Secret Stingray Manuals Detail How Police Can Spy on Phones

Harris Corp.’s Stingray surveillance device has been one of the most closely-guarded secrets in law enforcement for more than 15 years. The company and its police clients across the United States have fought to keep information about the mobile-phone-monitoring boxes from the public against which they are used. The Intercept has obtained several Harris instruction manuals spanning roughly 200 pages and meticulously detailing how to create a cellular surveillance dragnet.

Fuente: Long-Secret Stingray Manuals Detail How Police Can Spy on Phones

Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas

Un grupo de hackers vinculado a la Agencia de Seguridad Nacional de los Estados Unidos, mejor conocida como la NSA (National Security Agency), ha sido hackeado recientemente y sus herramientas de espionaje, recolección de información, malware y más, han sido puestas en venta por 1 millón de bitcoins (más de 550 millones de dólares al momento de la publicación).

Fuente: Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas

¿Son estas las armas de espionaje de la NSA? | Derechos Digitales

Un grupo de hackers dice haber obtenido información confidencial de Equation Group, un conocido y sofisticado grupo de ciber atacantes ligado a la NSA. Parte de la información publicada permite por primera vez echar un vistazo a las herramientas utilizadas por la agencia de seguridad estadounidense.

Fuente: ¿Son estas las armas de espionaje de la NSA? | Derechos Digitales

Privacy Scandal Haunts Pokemon Go’s CEO

The suddenly vast scale of Pokemon Go adoption is matched by the game’s aggressive use of personal information. Unlike, say, Twitter, Facebook, or Netflix, the app requires uninterrupted use of your location and camera — a “trove of sensitive user data,” as one privacy watchdog put it in a concerned letter to federal regulators.All the more alarming, then, that Pokemon Go is run by a man whose team literally drove one of the greatest privacy debacles of the internet era, in which Google vehicles, in the course of photographing neighborhoods for the Street View feature of the company’s online maps, secretly copied digital traffic from home networks, scooping up passwords, email messages, medical records, financial information, and audio and video files.

Fuente: Privacy Scandal Haunts Pokemon Go’s CEO

Se cumple el aniversario de la filtración masiva de datos del Hacking Team | R3D: Red en Defensa de los Derechos Digitales

Hace un año, más de mil 500 correos electrónicos y 400 GB de información de la empresa italiana Hacking Team, dedicada a la venta de software para vigilancia, fueron hechos públicos.

Fuente: Se cumple el aniversario de la filtración masiva de datos del Hacking Team | R3D: Red en Defensa de los Derechos Digitales

Germany to further curb activities of spy agency in wake of NSA scandal | World news | The Guardian

Germany has approved new measures to rein in the activities of its foreign intelligence agency after a scandal over improper collusion with the US National Security Agency.

Fuente: Germany to further curb activities of spy agency in wake of NSA scandal | World news | The Guardian

Documents Reveal Secretive U.K. Surveillance Policies

NEWLY DISCLOSED DOCUMENTS offer a rare insight into the secretive legal regime underpinning the British government’s controversial mass surveillance programs.The London-based group Privacy International obtained the previously confidential files as part of an ongoing legal case challenging the scope of British spies’ covert collection of huge troves of private data.

Fuente: Documents Reveal Secretive U.K. Surveillance Policies

Five Big Unanswered Questions About NSA’s Worldwide Spying

Nearly three years after NSA whistleblower Edward Snowden gave journalists his trove of documents on the intelligence community’s broad and powerful surveillance regime, the public is still missing some crucial, basic facts about how the operations work.Surveillance researchers and privacy advocates published a report on Wednesday outlining what we do know, thanks to the period of discovery post-Snowden — and the overwhelming amount of things we don’t.

Fuente: Five Big Unanswered Questions About NSA’s Worldwide Spying

Exclusive: Snowden intelligence docs reveal UK spooks' malware checklist / Boing Boing

Boing Boing is proud to publish two original documents disclosed by Edward Snowden, in connection with “Sherlock Holmes and the Adventure of the Extraordinary Rendition,” a short story …

Fuente: Exclusive: Snowden intelligence docs reveal UK spooks’ malware checklist / Boing Boing

Big tech groups warn UK against spy bill – FT.com

Silicon Valley’s biggest companies have urged the UK government to reconsider swaths of its proposed surveillance law, saying it will have far-reaching implications for how other countries upgrade their spying regimes. In a rare show of unity,

Fuente: Big tech groups warn UK against spy bill – FT.com

Spying on Congress and Israel: NSA Cheerleaders Discover Value of Privacy Only When Their Own Is Violated

Mass, warrantless surveillance is inherently abusive and unjustified, and one shouldn’t need a report that this was done to the Benjamin Netanyahus and Pete Hoekstras of the world to realize that.

Fuente: Spying on Congress and Israel: NSA Cheerleaders Discover Value of Privacy Only When Their Own Is Violated

Editorial Aún Creemos en los Sueños ESPIONAJE – Inicio

Editorial Aún Creemos en los Sueños ESPIONAJE – Inicio.



Todos fichados por internet, Google, Facebook, Microsoft, celulares…
Entrevista inédita de Ignacio Ramonet a Julian Assange

Espionaje a escala mundial
por Dan Schiller

Google nos espía e informa al gobierno de EE.UU.
Entrevista exclusiva a Julian Assange.
por Ignacio Ramonet

El espionaje a los internautas revoluciona la publicidad
por Marie Bénilde

Las grandes mentiras de Google y Microsoft
por Dan Schiller

Todos bajo control
por Ignacio Ramonet

La obsesión por la seguridad hace mutar la democracia
por Giorgio Agamben

Leave Facebook if you don't want to be snooped on, warns EU | Technology | The Guardian

Leave Facebook if you don’t want to be snooped on, warns EU | Technology | The Guardian.

European Commission admits Safe Harbour framework cannot ensure privacy of EU citizens’ data when sent to the US by American internet firms

European flags at the EC
The Safe Harbour Framework that is meant to protect the data of EU citizens when sent to the US by American technology firms including Facebook are not adequate the European Commission has admitted. Photograph: Georges Gobet/AFP/Getty Images

The European Commission has warned EU citizens that they should close their Facebook accounts if they want to keep information private from US security services, finding that current Safe Harbour legislation does not protect citizen’s data.

The comments were made by EC attorney Bernhard Schima in a case brought by privacy campaigner Maximilian Schrems, looking at whether the data of EU citizens should be considered safe if sent to the US in a post-Snowden revelation landscape.

“You might consider closing your Facebook account, if you have one,” Schima told attorney general Yves Bot in a hearing of the case at the European court of justice in Luxembourg.

When asked directly, the commission could not confirm to the court that the Safe Harbour rules provide adequate protection of EU citizens’ data as it currently stands.

The US no longer qualifies

The case, dubbed “the Facebook data privacy case”, concerns the current Safe Harbour framework, which covers the transmission of EU citizens’ data across the Atlantic to the US. Without the framework, it is against EU law to transmit private data outside of the EU. The case collects complaints lodged against Apple, Facebook, Microsoft, Microsoft-owned Skype and Yahoo.

Schrems maintains that companies operating inside the EU should not be allowed to transfer data to the US under Safe Harbour protections – which state that US data protection rules are adequate if information is passed by companies on a “self-certify” basis – because the US no longer qualifies for such a status.

The case argues that the US government’s Prism data collection programme, revealed by Edward Snowden in the NSA files, which sees EU citizens’ data held by US companies passed on to US intelligence agencies, breaches the EU’s Data Protection Directive “adequacy” standard for privacy protection, meaning that the Safe Harbour framework no longer applies.

ARGENPRESS.info – Prensa argentina para todo el mundo: Espionaje de Estados Unidos: El cuento de nunca acabar

ARGENPRESS.info – Prensa argentina para todo el mundo: Espionaje de Estados Unidos: El cuento de nunca acabar.

lunes, 2 de marzo de 2015

Carmen Esquivel (PL)

Cuando aún está fresco en la memoria el escándalo por el espionaje masivo contra ciudadanos, instituciones y hasta dignatarios europeos, el tema vuelve a la palestra al revelarse ahora que otros objetivos estuvieron en la mira de los servicios de inteligencia estadounidenses.

El nuevo blanco de los ataques es la compañía holandesa Gemalto, primera de su tipo en el mundo en la fabricación de tarjetas SIM (Subscriber Identity Module), en español Módulo de Identificación de Abonados, usada en teléfonos celulares y módems.

Para dar una idea de la magnitud de lo que esto significa baste señalar que la firma produce cerca de dos mil millones de estos dispositivos al año para 450 empresas de telecomunicaciones, entre ellas T-Mobile, Vodafone, Orange, Verizon y Sprint.

Gemalto trabaja, además, con unas tres mil instituciones financieras porque elabora chips para tarjetas de crédito.

De acuerdo con documentos filtrados recientemente por Edward Snowden, ex analista de la Agencia Nacional de Seguridad (NSA, por sus siglas en inglés), las inteligencias estadounidense y británica lograron apropiarse de las claves de la compañía, lo cual les abrió las puertas a los celulares de medio mundo.

La NSA y el Cuartel General de Comunicaciones del gobierno de Gran Bretaña (GCHQ) obtuvieron las llaves al acceder a los servidores centrales de Gemalto, valiéndose de información privada de algunos ingenieros, fabricantes de tarjetas y proveedores.

De esta manera pudieron espiar las llamadas, mensajes y correos electrónicos de una persona o empresa sin necesidad de pasar por una operadora o de obtener una orden judicial y, lo más alarmante, sin dejar ningún tipo de rastro.

“Es imposible saber cuántos códigos robaron la NSA y el GCHQ, pero si nos basamos en hipótesis modestas, el número es impresionante”, afirmó el sitio digital The Intercept, que filtró la información.

British refusal to cooperate with spy inquiry causes row in Germany | World news | The Guardian

British refusal to cooperate with spy inquiry causes row in Germany | World news | The Guardian.

Angela Merkel Angela Merkel, the German chancellor. Photograph: Anadolu Agency/Getty Images

Downing Street and the German chancellery are embroiled in a worsening dispute over intelligence-sharing and the covert counter-terrorism campaign because of conflicts arising from the surveillance scandals surrounding the US National Security Agency and Britain’s GCHQ.

According to German newspaper reports citing government and intelligence officials in Berlin, the Bundestag’s inquiry into the NSA controversy is being jeopardised by Britain’s refusal to cooperate and its threats to break off all intelligence-sharing with Berlin should the committee reveal any UK secrets.

The weekly magazine Focus reported last month that a national security aide to David Cameron had written to Peter Altmaier, Angela Merkel’s chief of staff, refusing all requests for help in the inquiry and warning that Britain would cease supplying terrorism-related intelligence to the Germans unless Berlin yielded.

It emerged during the NSA revelations that the Americans had hacked into Merkel’s mobile phone, generating outrage in Germany and feeding growing anti-American sentiment.

Internationally, the BND, Germany’s foreign intelligence service, is viewed as less than vigorous. In the secret war on terror, the Germans are said to be dependent on signals intelligence from the British and the Americans.

Gemalto Doesn't Know What It Doesn't Know – The Intercept

Gemalto Doesn’t Know What It Doesn’t Know – The Intercept.

Featured photo - Gemalto Doesn’t Know What It Doesn’t Know

Gemalto CEO Olivier Piou shows a cellphone SIM card before a press conference on February 25, 2015 in Paris.

Gemalto, the French-Dutch digital security giant, confirmed that it believes American and British spies were behind a “particularly sophisticated intrusion” of its internal computer networks, as reported by The Intercept last week.

This morning, the company tried to downplay the significance of NSA and GCHQ efforts against its mobile phone encryption keys — and, in the process, made erroneous statements about cellphone technology and sweeping claims about its own security that experts describe as highly questionable.

Gemalto, which is the largest manufacturer of SIM cards in the world, launched an internal investigation after The Intercept six days ago revealed that the NSA and its British counterpart GCHQ hacked the company and cyberstalked its employees. In the secret documents, provided by NSA whistleblower Edward Snowden, the intelligence agencies described a successful effort to obtain secret encryption keys used to protect hundreds of millions of mobile devices across the globe.

The company was eager to address the claims that its systems and encryption keys had been massively compromised. At one point in stock trading after publication of the report, Gemalto suffered a half billion dollar hit to its market capitalization. The stock only partially recovered in the following days.

After the brief investigation, Gemalto now says that the NSA and GCHQ operations in 2010-2011 would not allow the intelligence agencies to spy on 3G and 4G networks, and that theft would have been rare after 2010, when it deployed a “secure transfer system.” The company also said the spy agency hacks only affected “the outer parts of our networks — our office networks — which are in contact with the outside world.”

Security experts and cryptography specialists immediately challenged Gemalto’s claim to have done a “thorough” investigation into the state-sponsored attack in just six days, saying the company was greatly underestimating the abilities of the NSA and GCHQ to penetrate its systems without leaving detectable traces.

“Gemalto learned about this five-year-old hack by GCHQ when the The Intercept called them up for a comment last week. That doesn’t sound like they’re on top of things, and it certainly suggests they don’t have the in-house capability to detect and thwart sophisticated state-sponsored attacks,” says Christopher Soghoian, the chief technologist at the American Civil Liberties Union. He adds that Gemalto remains “a high-profile target for intelligence agencies.”

Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute, said, “This is an investigation that seems mainly designed to produce positive statements. It is not an investigation at all.”

La reforma de la NSA se queda a medio camino un año después | Internacional | EL PAÍS

La reforma de la NSA se queda a medio camino un año después | Internacional | EL PAÍS.

Algunos de los cambios anunciados por Obama no se han materializado

  • Enviar a LinkedIn3
  • Enviar a Google +0
  • Comentarios1

Centro de datos de la NSA, en Utah. / RICK BOWMER (AP)

El teléfono de J. Kirk Wiebe suena desde hace unos meses con menos frecuencia. Wiebe fue uno de los primeros filtradores de la Agencia Nacional de Seguridad. Tras jubilarse en 2001, denunció, junto a dos veteranos exanalistas, que la NSA tenía cada vez más acceso a datos personales. Lograron poca atención y fueron perseguidos en la justicia. Pero en junio de 2013, adquirieron notoriedad gracias a las revelaciones deEdward Snowden sobre los largos tentáculos de la NSA: empezaron a dar muchas más charlas en Estados Unidos y Europa sobre su experiencia e influencia.

“Snowden nos había visto diciendo que intentamos ir por los canales internos del Gobierno y no conseguimos nada”, subraya Wiebe en alusión a que, tras fracasar ellos, Snowden optase por filtrar secretos a la prensa en vez de formular una queja interna en la NSA.

Pero ahora, al año y medio de las filtraciones de Snowden y al año de anunciarse la reforma de los programas de vigilancia, se habla mucho menos del joven exanalista refugiado en Rusia y del espionaje masivo. “La excitación ha bajado un poco, pero a la gente sigue sin gustarle [la NSA]”, agrega en una entrevista telefónica Wiebe, de 70 años, 30 de ellos en la agencia. La percepción pública sobre la NSA apenas ha variado: en octubre de 2013, un 54% tenía una opinión favorable; en enero de este año, un 51% (sobre todo jóvenes), según una encuesta del centro Pew.

Al año y medio de las filtraciones de Snowden y al año de anunciarse la reforma de los programas de vigilancia, se habla mucho menos del joven exanalista refugiado en Rusia y del espionaje masivo

Sin embargo, buena parte del debate en EE UU sobre los límites de la recopilación masiva de datos ha quedado eclipsado. El contexto ha cambiado, lo que puede propiciar retrocesos: crecen las voces que, ante el auge del yihadismo, se oponen a restringir los programas de vigilancia, y reclaman que las autoridades tengan plenos poderes para desbloquear la encriptación de teléfonos móviles.

La reforma de la NSA se ha quedado, por ahora, a medio camino. En enero de 2014, el presidente de EE UU, Barack Obama, anunció un conjunto de cambios para limitar la interceptación de datos sin mermar la protección de la seguridad nacional. Su objetivo era atenuar las preocupaciones de ciudadanos estadounidenses y gobiernos extranjeros aliados sobre posibles injerencias a la privacidad.

Encriptación punto-a-punto: de la oscuridad al mainstream | Manzana Mecánica

Encriptación punto-a-punto: de la oscuridad al mainstream | Manzana Mecánica.

Lunes 5 Ene 2015

Carlos Castillo

En pocos días he llegado a un punto de saturación respecto a leer predicciones para el 2015. Muchas de las predicciones son, fundamentalmente, cosas que ya están sucediendo y que al autor de la predicción le gustaría que continuaran sucediendo. Eso no tiene nada de malo, pero no estaría mal llamar a las cosas por su nombre.

En ese espíritu, creo que hay algo muy importante que sucedió a fines del 2014 y que estaría muy bien que continuara sucediendo el 2015. Me refiero a la transición que están experimentando las tecnologías de nube con conocimiento cero, en particular la encriptación punto-a-punto.

Conocimiento cero = bueno

Almacenar cosas en la “nube” es valioso por varios motivos. Primero, poder acceder a tus propios archivos desde cualquier dispositivo (móvil, tabletlaptop, etc.) es muy conveniente. Segundo, un efecto secundario positivo es que tienes un respaldo de estos archivos. Tercero, es más fácil compartir un archivo con otra persona si tu archivo ya está en la “nube”.

Para muchas personas, resulta obvio que si, por ejemplo, subes algunas fotos a un sistema de almacenamiento, entonces tus fotos quedan a disposición de la gente que opera esa nube. La gente que trabaja para esa empresa puede ver tus fotos, y si los hackean a ellos, o si adivinan tu clave sin necesidad de tener acceso a tu dispositivo, entonces tus fotos pueden acabar en cientos de sitios en Internet.

Para un cliente corporativo, el problema de almacenar secretos de negocio en la nube es mucho más serio, sobre todo si se trata de un negocio del sector tecnológico (posible competidor del proveedor de nube) o que compite con alguna empresa estadounidense, como le sucedió a Petrobras.

Un proveedor de almacenamiento remoto no necesita tener acceso al contenido de tus archivos para poder almacenarlos.

Resulta obvio para casi todo el mundo que esta desventaja es una consecuencia inevitable de subir un archivo a Internet, pero no tiene por qué ser así. Desde hace décadas que existe tecnología para encriptar un archivo antes de subirlo, y decriptarlo después de bajarlo. En otras palabras, para que, sin necesidad de que tú tengas que hace nada ni siquiera preocuparte de lo que está sucediendo, un sistema de almacenamiento pueda funcionar con conocimiento cero.

En algunos casos, el proveedor de almacenamiento ofrece esta característica como una de sus cualidades principales, como es el caso de SpiderOak. En otros casos (e.g. Dropbox), es el mismo usuario el que debe configurar su computador para que utilice cero-conocimiento, como explicamos en un artículo anterior.

El final de las contraseñas | Tecnología | EL PAÍS

El final de las contraseñas | Tecnología | EL PAÍS.


Los ataques convierten en obsoletos los sistemas de seguridad en la Red. La doble autenticación y la biometría se abren camino



Emilio Martínez muestra el programa de contraseña por voz. / santi burgos

Con saqueos masivos de datos como el de Sony, el mayor ciberataque padecido por una empresa, o el que sufrió Apple hace unos meses, cuando decenas de fotos privadas de actrices de Hollywood fueron robadas y difundidas por todos los rincones de la red, hablar de Internet y seguridad se ha convertido casi en un oxímoron, una contradicción en los términos. La mayoría de los expertos considera que el actual sistema de contraseñas que rige la red ha caducado por lo incómodo que resulta para los usuarios y, como queda cada vez más claro, por su falta de fiabilidad. El futuro se encuentra en los sistemas de doble autenticación y en la biometría, campo en el que varias empresas españolas están en la vanguardia. Mientras tanto todos los expertos en seguridad dan el mismo consejo: generar contraseñas más complejas para, en la medida de lo posible, entorpecer el trabajo de los ladrones de datos.

Como ha escrito el experto en informática de The New York Times, Farhad Manjoo, “no mandes un mail, no subas una foto a la nube, no mandes un mensaje de texto, al menos si tienes cualquier esperanza de que siga siendo privado”. El problema está en que cada vez tenemos más datos y más importantes en Internet, ya sean bancarios, profesionales o personales, y cada vez están más expuestos. La página web www.databreaches.net calcula que se han producido 30.000 robos de datos en todo tipo de empresas en los últimos diez años, con una inquietante aceleración en 2013 y 2014. Javier García Villalba, profesor del Departamento de Ingeniería de Software e Inteligencia Artificial de la Universidad Complutense de Madrid, asegura: “Una contraseña por sí sola ya no ofrece suficiente seguridad. Los ataques informáticos comprometen por igual cualquier contraseña, sea buena, mala o regular”.

The Guardian wins an Emmy for coverage of NSA revelations | World news | theguardian.com

The Guardian wins an Emmy for coverage of NSA revelations | World news | theguardian.com.

Interactive NSA Decoded explained implications of the Edward Snowden leaks on mass surveillance by intelligence agencies



Guardian NSA Emmy
The team behind the award-winning interactive. Photograph: Guardian


The Guardian US has won an Emmy for its groundbreaking coverage of Edward Snowden’s disclosures about mass surveillance by US intelligence agencies.


The Guardian’s multimedia interactive feature NSA Decoded was announced as the winner in the new approaches: current news category at the news and documentary Emmy awards in New York on Tuesday night.


The comprehensive interactive walks the audience through the facts and implications of the NSA’s mass surveillance program, revealed by the Guardian last year in coverage based on leaks by Snowden.

Cómo es el 'Google' secreto de la NSA y cuáles son sus peligros

Cómo es el ‘Google’ secreto de la NSA y cuáles son sus peligros.

La última filtración de los “papeles de Snowden” revela la creación del buscador ICREACH para rastrear entre los metadatos espiados

La herramienta pudo servir para detenciones e interrogatorios de sospechosos

El anterior director de la NSA, Keith Alexander, ahora consultor privado, fue su promotor

Cárcel de Guantánamo. Foto: EFE

Aunque hace más de un año empezaron a salir a la luz las prácticas de espionaje masivo de la NSA con la publicación del rastreo de las llamadas de los usuarios de Verizon, el caso está lejos de cerrarse.

El último de los programas conocidos, revelado por “The Intercept” la semana pasada, es “ICREACH”, un buscador que la NSA habría desarrollado en secreto para rastrear entre miles de millones de metadatos obtenidos en sus actividades de espionaje indiscriminado.

Se trata, entre los sistemas de espionaje hasta ahora desvelados, de uno de los más graves por la cesión de millones de datos registrados a otras agencias como la CIA, el FBI o la DEA (que carecen del control y autorización excepcional con que supuestamente contaría la NSA), porquehabría servido para detenciones e interrogatorios a quienes se consideraban sospechosos “a la luz” del tratamiento de dichos metadatos.

Estas prácticas vulnerarían, tal como apuntaron enseguida las primeras reacciones, la Cuarta Enmienda de la Constitución norteamericana que establece que solo se podrá ser objeto de investigación o detención por causas “razonables”:

“El derecho de los habitantes de que sus personas, domicilios, papeles y efectos se hallen a salvo de pesquisas y aprehensiones arbitrarias, será inviolable, y no se expedirán al efecto mandamientos que no se apoyen en un motivo verosímil…”

México y Bahréin comparten equipo de espionaje informático

México y Bahréin comparten equipo de espionaje informático.

Espionaje político en la UE. Foto: AP
Espionaje político en la UE.
Foto: AP

BRUSELAS (apro).- El mismo equipo de espionaje informático que adquirió el gobierno del presidente Felipe Calderón, y que ha continuado en servicio bajo el gobierno de Enrique Peña Nieto, lo ha utilizado el régimen autoritario de Bahréin para intervenir las computadoras de activistas de derechos humanos, abogados y periodistas opositores.

Se trata del programa espía FinFisher, o FinSpy, que produce la compañía británica Gamma International y que vende sólo a instituciones gubernamentales para, supuestamente, perseguir criminales y terroristas.

Tal empresa enfrenta una queja ante la Organización para la Cooperación y el Desarrollo Económico (OCDE) –a la cual pertenece México—que interpuso en febrero de 2013 un grupo de organizaciones de derechos humanos basadas en Gran Bretaña. Encabezadas por Privacy International, acusan a Gamma International por violar las directrices corporativas de ese organismo en materia de derechos humanos al exportar su programa espía a Bahréin para vigilar a la oposición.

ICREACH: How the NSA Built Its Own Secret Google -The Intercept

ICREACH: How the NSA Built Its Own Secret Google -The Intercept.


By 200

The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept.

The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. Planning documents for ICREACH, as the search engine is called, cite the Federal Bureau of Investigation and the Drug Enforcement Administration as key participants.

ICREACH contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden.

Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy.

Gato espía rondaba casas vecinas para conseguir WiFi gratis – BioBioChile

Gato espía rondaba casas vecinas para conseguir WiFi gratis – BioBioChile.

Coco y el collar scanner | Gene Bransfield

Coco y el collar scanner | Gene Bransfield

Publicado por Eduardo Woo
Un hombre experto en informática equipó a su gato para espiar y hackear redes inalámbricas WiFi dentro de su barrio, en Washington, DC.

Se trata de Gene Bransfield, quien puso a ‘Coco’ -como se llama el felino siamés- un collar que contenía una placa base Spark Core, un chip GPS, una tarjeta WiFi y una batería recargable, denominada “WarKitteh”.

Los elementos con que funciona el collar | Gene Bransfield

Los elementos con que funciona el collar | Gene Bransfield

El aparato sirve como scanner, el que gracias a las andanzas de ‘Coco’ permitía descubrir y geolocalizar lugares con redes WiFi sin protección, o con seguridad débil, basadas en WEP, una encriptación con más de 10 años que es fácilmente manipulable por terceros.

La revista de tecnología Wired explica que Bransfield realizó el experimento con la intención de llamar la atención ante lo vulnerables que son algunas personas con sus señales de internet.

“Mi intención no era mostrarle a la gente dónde pueden conseguir WiFi. Sólo le puse tecnología al gato y le dejé dar vueltas porque la idea me divertía”, afirmó, agregando que el resultado fue sorprendente ya que encontró muchos puntos abiertos.

I, spy: Edward Snowden in exile | World | The Guardian

I, spy: Edward Snowden in exile | World | The Guardian.

Fiction and films, the nearest most of us knowingly get to the world of espionage, give us a series of reliable stereotypes. British spies are hard-bitten, libidinous he-men. Russian agents are thickset, low-browed and facially scarred. And defectors end up as tragic old soaks in Moscow, scanning old copies of the Times for news of the Test match.

Such a fate was anticipated for Edward Snowden by Michael Hayden, a former NSA and CIA chief, who predicted last September that the former NSA analyst would be stranded in Moscow for the rest of his days – “isolated, bored, lonely, depressed… and alcoholic”.

But the Edward Snowden who materialises in our hotel room shortly after noon on the appointed day seems none of those things. A year into his exile in Moscow, he feels less, not more, isolated. If he is depressed, he doesn’t show it. And, at the end of seven hours of conversation, he refuses a beer. “I actually don’t drink.” He smiles when repeating Hayden’s jibe. “I was like, wow, their intelligence is worse than I thought.”

Oliver Stone, who is working on a film about the man now standing in room 615 of the Golden Apple hotel on Moscow’s Malaya Dmitrovka, might struggle to make his subject live up to the canon of great movie spies. The American director has visited Snowden in Moscow, and wants to portray him as an out-and-out hero, but he is an unconventional one: quiet, disciplined, unshowy, almost academic in his speech. If Snowden has vices – and God knows they must have been looking for them – none has emerged in the 13 months since he slipped away from his life as a contracted NSA analyst in Hawaii, intent on sharing the biggest cache of top-secret material the world has ever seen.

Since arriving in Moscow, Snowden has been keeping late and solitary hours – effectively living on US time, tapping away on one of his three computers (three to be safe; he uses encrypted chat, too). If anything, he appears more connected and outgoing than he could be in his former life as an agent. Of his life now, he says, “There’s actually not that much difference. You know, I think there are guys who are just hoping to see me sad. And they’re going to continue to be disappointed.”

When the Guardian first spoke to Snowden a year ago in Hong Kong, he had been dishevelled, his hair uncombed, wearing jeans and a T-shirt. The 31-year-old who materialised last week was smartly, if anonymously, dressed in black trousers and grey jacket, his hair tidily cut. He is jockey-light – even skinnier than a year ago. And he looks pale: “Probably three steps from death,” he jokes. “I mean, I don’t eat a whole lot. I keep a weird schedule. I used to be very active, but just in the recent period I’ve had too much work to focus on.”

 Edward Snowden – video interview

There was no advance warning of where we would meet: his only US television interview, with NBC’s Brian Williams in May, was conducted in an anonymous hotel room of Snowden’s choosing. This time, he prefers to come to us. On his arrival, there is a warm handshake for Guardian reporter Ewen MacAskill, whom he last saw in Hong Kong – a Sunday night after a week of intense work in a frowsty hotel room, a few hours before the video revealing his identity to the world went public. Neither man knew if they would ever meet again.

Snowden orders chicken curry from room service and, as he forks it down, is immediately into the finer points of the story that yanked him from a life of undercover anonymity to global fame. The Snowden-as-alcoholic jibe is not the only moment when he reflects wryly on his former colleagues’ patchy ability to get on top of events over the past year. There was, for instance, the incident last July when a plane carrying President Evo Morales back to Bolivia from Moscow was forced down in Vienna and searched for a stowaway Snowden. “I was like, first off, wow, their intelligence sucks, from listening to everything. But, two, are they really going to the point of just completely humiliating the president of a Latin American nation, the representative of so many people? It was just shockingly poorly thought out, and yet they did it anyway, and they keep at these sort of mistakes.” It was as if they were trying not to find him. “I almost felt like I had some sort of friend in government.”

How Secret Partners Expand NSA’s Surveillance Dragnet – The Intercept

How Secret Partners Expand NSA’s Surveillance Dragnet – The Intercept.

Featured photo - How Secret Partners Expand NSA’s Surveillance DragnetTop-secret documents reveal how the NSA has established secret partnerships to spy on huge flows of private data.

Huge volumes of private emails, phone calls, and internet chats are being intercepted by the National Security Agency with the secret cooperation of more foreign governments than previously known, according to newly disclosed documents from whistleblower Edward Snowden.

The classified files, revealed today by the Danish newspaper Dagbladet Information in a reporting collaboration with The Intercept, shed light on how the NSA’s surveillance of global communications has expanded under a clandestine program, known as RAMPART-A, that depends on the participation of a growing network of intelligence agencies.

It has already been widely reported that the NSA works closely with eavesdropping agencies in the United Kingdom, Canada, New Zealand, and Australia as part of the so-called Five Eyes surveillance alliance. But the latest Snowden documents show that a number of other countries, described by the NSA as “third-party partners,” are playing an increasingly important role – by secretly allowing the NSA to install surveillance equipment on their fiber-optic cables.

The NSA documents state that under RAMPART-A, foreign partners “provide access to cables and host U.S. equipment.” This allows the agency to covertly tap into “congestion points around the world” where it says it can intercept the content of phone calls, faxes, e-mails, internet chats, data from virtual private networks, and calls made using Voice over IP software like Skype.

The program, which the secret files show cost U.S. taxpayers about $170 million between 2011 and 2013, sweeps up a vast amount of communications at lightning speed. According to the intelligence community’s classified “Black Budget” for 2013, RAMPART-A enables the NSA to tap into three terabits of data every second as the data flows across the compromised cables – the equivalent of being able to download about 5,400 uncompressed high-definition movies every minute.

Privacy under attack: the NSA files revealed new threats to democracy | Technology | The Guardian

Privacy under attack: the NSA files revealed new threats to democracy | Technology | The Guardian.

Thanks to Edward Snowden, we know the apparatus of repression has been covertly attached to the democratic state. However, our struggle to retain privacy is far from hopeless

US National Security Agency
The US National Security Agency threat operations centre in Fort Meade, Maryland, in 2006. Photograph: Paul Richards/AFP/Getty Images

In the third chapter of his History of the Decline and Fall of the Roman Empire, Edward Gibbon gave two reasons why the slavery into which the Romans had tumbled under Augustus and his successors left them more wretched than any previous human slavery. In the first place, Gibbon said, the Romans had carried with them into slavery the culture of a free people: their language and their conception of themselves as human beings presupposed freedom. And thus, says Gibbon, for a long time the Romans preserved the sentiments – or at least the ideas – of a freeborn people. In the second place, the empire of the Romans filled all the world, and when that empire fell into the hands of a single person, the world was a safe and dreary prison for his enemies. As Gibbon wrote, to resist was fatal, and it was impossible to fly.

The power of that Roman empire rested in its leaders’ control of communications. The Mediterranean was their lake. Across their European empire, from Scotland to Syria, they pushed roads that 15 centuries later were still primary arteries of European transportation. Down those roads the emperor marched his armies. Up those roads he gathered his intelligence. The emperors invented the posts to move couriers and messages at the fastest possible speed.

Using that infrastructure, with respect to everything that involved the administration of power, the emperor made himself the best-informed person in the history of the world.

That power eradicated human freedom. “Remember,” said Cicero to Marcellus in exile, “wherever you are, you are equally within the power of the conqueror.”

The empire of the United States after the second world war also depended upon control of communications. This was more evident when, a mere 20 years later, the United States was locked in a confrontation of nuclear annihilation with the Soviet Union. In a war of submarines hidden in the dark below the continents, capable of eradicating human civilisation in less than an hour, the rule of engagement was “launch on warning”. Thus the United States valued control of communications as highly as the Emperor Augustus. Its listeners too aspired to know everything.

We all know that the United States has for decades spent as much on its military might as all other powers in the world combined. Americans are now realising what it means that we applied to the stealing of signals and the breaking of codes a similar proportion of our resources in relation to the rest of the world.

The US system of listening comprises a military command controlling a large civilian workforce. That structure presupposes the foreign intelligence nature of listening activities. Military control was a symbol and guarantee of the nature of the activity being pursued. Wide-scale domestic surveillance under military command would have violated the fundamental principle of civilian control.

Instead what it had was a foreign intelligence service responsible to the president as military commander-in-chief. The chain of military command absolutely ensured respect for the fundamental principle “no listening here”. The boundary between home and away distinguished the permissible from the unconstitutional.

The distinction between home and away was at least technically credible, given the reality of 20th-century communications media, which were hierarchically organised and very often state-controlled.

When the US government chose to listen to other governments abroad – to their militaries, to their diplomatic communications, to their policymakers where possible – they were listening in a world of defined targets. The basic principle was: hack, tap, steal. We listened, we hacked in, we traded, we stole.

In the beginning we listened to militaries and their governments. Later we monitored the flow of international trade as far as it engaged American national security interests.

Microsoft modifica política que le permitía leer correos de usuarios – BioBioChile

Microsoft modifica política que le permitía leer correos de usuarios – BioBioChile.

Daniel Medina (BBCL)

Daniel Medina (BBCL)

Publicado por Daniel Medina
Una importante modificación en sus políticas realizó la compañía Microsoft luego de reconocer que accedió a la cuenta de Hotmail de un blogger francés con el fin de recabar información sobre las filtraciones que llevó a cabo un empleado del gigante del software.

La cláusula que hasta hace poco aparecía en las condiciones de servicio de sus productos le otorgaba la facultad de revisar los correos electrónicos si contaba con sospechas de que los usuarios se encontraran intercambiando información sensible de la compañía.

Sin embargo, a partir de ahora Microsoft confirmó que el trabajo de revisión de las casillas lo derivará a las policías correspondientes, según recoge el medio británico The Register. Con esto da pie atrás al anuncio que realizó la semana pasada, respecto a que la indagatoria la delegaría a un grupo independiente de la empresa en el caso de contar con antecedentes suficientes para establecer una acusación contra un usuario por malas prácticas.