The European Union is seeking to make it easier for police and law enforcement agencies to retrieve electronic evidence from US tech firms, including directly from cloud storage.
Google, el buscador más popular de internet y una de las mayores empresas del mundo, está bloqueado en China desde 2010, pero esta semana la compañía estadounidense ha intentado ganarse de nuevo a las autoridades del país con más internautas del mundo con algo tan sorprendente como un torneo de un juego mental.
Este joven estadounidense, un prodigio de la informática, se llama a sí mismo “ciberninja” y a través de su propia empresa quiere “educar a la gente, enseñarles cosas nuevas” sobre la seguridad en el mundo cibernético.
The so-called Shadow Brokers, who claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world, said they have a new suite of tools and vulnerabilities in newer software. The possible targets include Microsoft’s Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.
it’s possible to make sure that your private conversations are actually private. It starts with installing an app known as Signal, and getting your friends to install it too. Then you’ll want to tweak the settings to lock everything down.
The documents, published Monday in collaboration with Japanese news broadcaster NHK, reveal the complicated relationship the NSA has maintained with Japan over a period of more than six decades. Japan has allowed NSA to maintain at least three bases on its territory and contributed more than half a billion dollars to help finance the NSA’s facilities and operations. In return, NSA has kitted out Japanese spies with powerful surveillance tools and shared intelligence with them. However, there is a duplicitous dimension to the partnership. While the NSA has maintained friendly ties with its Japanese counterparts and benefited from their financial generosity, at the same time it has secretly spied on Japanese officials and institutions.
Fearless, adversarial journalism that holds the powerful accountable.
From Russian hacking to WikiLeaks, Edward Snowden and CIA cyber weapons, does digital surveillance mean the end of privacy?
Tras el ataque al Parlamento Británico ocurrido la semana pasada, los políticos británicos han exigido que Whatsapp y otras aplicaciones de mensajería instantánea proporcionen acceso a la policía y fuerzas de seguridad para así poder monitorear conversaciones terroristas. Sin embargo, los expertos en tecnología discuten que abrir las “puertas traseras” de los servicios de mensajería popular, las cuales usan cifrado de extremo a extremo, arrojaría una serie de problemas.
A number of recent cases in the media have revealed instances of U.S. citizens and others being compelled by CBP agents to unlock their devices for search. In some instances, people have claimed to have been physically coerced into complying, including one American citizen who said that CBP agents grabbed him by the neck in order to take his cellphone out of his possession.
“Hay poca o ninguna evidencia para persuadirme de la eficacia o la proporcionalidad de algunas medidas extremadamente intrusivas presentes en las nuevas leyes de privacidad de Francia, Alemania, el Reino Unido y los Estados Unidos”, asegura Cannataci, en un comunicado de la Oficina del Alto Comisionado de Derechos Humanos de la ONU.
Yesterday, WikiLeaks released its latest batch of pilfered CIA material, five documents describing malicious software for taking over Apple MacBooks and iPhones, and wrote in an accompanying post that “the CIA has been infecting the iPhone supply chain of its targets,” prompting concerned readers to wonder if their iPhone or MacBook had been infected on the factory floor. In a statement, Apple says that is almost certainly not the case.
Internal US law enforcement documents describe a highly controversial community initiative aimed at identifying potential terrorists before they “radicalize” as being intimately related to intelligence gathering.Despite years of official denials, American Muslim civil rights groups have claimed that Barack Obama’s Countering Violent Extremism (CVE) initiative was a euphemistic approach that targeted Muslims for surveillance.
Both the Snowden revelations and the CIA leak highlight the variety of creative techniques intelligence agencies can use to spy on individuals, at a time when many of us are voluntarily giving up our personal data to private companies and installing so-called “smart” devices with microphones (smart TVs, Amazon Echo) in our homes.So, where does this leave us? Is privacy really dead, as Silicon Valley luminaries such as Mark Zuckerberg have previously declared?
A new report from Rand Corp. may help shed light on the government’s arsenal of malicious software, including the size of its stockpile of so-called “zero days” — hacks that hit undisclosed vulnerabilities in computers, smartphones, and other digital devices.The report also provides evidence that such vulnerabilities are long lasting. The findings are of particular interest because not much is known about the U.S. government’s controversial use of zero days.
It’s difficult to buy a new TV that doesn’t come with a suite of (generally mediocre) “smart” software, giving your home theater some of the functions typically found in phones and tablets. But bringing these extra features into your living room means bringing a microphone, too — a fact the CIA is exploiting, according to a new trove of documents released today by Wikileaks.
Los alcaldes de las comunas acomodadas del sector oriente de Santiago han liderado una iniciativa por sumar tecnología de vigilancia a las medidas para reducir la delincuencia. Esta tendencia fue estrenada por las comunas de Lo Barnechea y Las Condes a mediados del año 2015, al instalar tres globos de video vigilancia de naturaleza militar en sus comunas. Luego de las elecciones municipales de 2016, el alcalde Felipe Alessandri anunció que un globo de similares características sería instalado en la comuna de Santiago, cuya implementación sigue pendiente. Este año el debate ha vuelto a la palestra pública luego del anuncio de las municipalidades de Las Condes y Providencia, quienes pretenden utilizar drones a control remoto equipados cámaras de alta resolución para vigilar los parques y calles de sus comunas para reducir la tasa de criminalidad.
“Se autorizó por parte del tribunal en el mes de febrero la revisión de los correos electrónicos del señor Patricio Contesse desde un servidor que se obtuvo desde Estados Unidos. Ahí hay más de tres millones de correos electrónicos que hay que revisar y analizar. En consecuencia, es una investigación compleja, ya que para analizar los correos hay que hacer una copia forense, tener programas especiales para segregar correos que han sido autorizados”, sostuvo la fiscal del caso SQM, Paola Castiglione.
We have to take action now to root out Russian and other foreign influences before they become too deeply enmeshed in our political ecosystem. First and foremost, leaders in the US and Europe must stop any attempt by the Trump administration to ease sanctions on Russia. It must be abundantly clear that attacking our elections through cyberspace will prompt a tough and proportional response.
For example, the bureau’s agents can decide that a campus organization is not “legitimate” and therefore not entitled to robust protections for free speech; dig for derogatory information on potential informants without any basis for believing they are implicated in unlawful activity; use a person’s immigration status to pressure them to collaborate and then help deport them when they are no longer useful; conduct invasive “assessments” without any reason for suspecting the targets of wrongdoing; demand that companies provide the bureau with personal data about their users in broadly worded national security letters without actual legal authority to do so; fan out across the internet along with a vast army of informants, infiltrating countless online chat rooms; peer through the walls of private homes; and more. The FBI offered various justifications of these tactics to our reporters. But the documents and our reporting on them ultimately reveal a bureaucracy in dire need of greater transparency and accountability.
Earlier on Wednesday, Maria Zakharova, a foreign ministry spokeswoman, wrote on Facebook that Snowden’s right to stay had recently been extended “by a couple of years”. Her post came in response to a suggestion from the former acting CIA director Michael Morell that Vladimir Putin might hand over Snowden to the US, despite there being no extradition treaty between the countries.
Like most people, I’ve long known that factual falsehoods are routinely published in major media outlets. But as I’ve pointed out before, nothing makes you internalize just how often it really happens, how completely their editorial standards so often fail, like being personally involved in a story that receives substantial media coverage. I cannot count how many times I’ve read or heard claims from major media outlets about the Snowden story that I knew, from first-hand knowledge, were a total fabrication.We have a perfect example of how this happens from the New York Times today, in a book review by Nicholas Lemann, the Pulitzer-Moore professor of journalism at Columbia University as well as a long-time staff writer for The New Yorker.
Tres académicos renunciaron a organizar un seminario sobre temas de seguridad e inteligencia, porque sospechan que una editorial ligada a la actividad pueda ser usada como pantalla por espías del Kremlin. “Cambridge es un maravilloso lugar de teorías conspirativas pero la idea de que haya un complot maquiavélico es ridículo”, dijo Neil Kent, uno de los principales impulsores del evento.
The European Union’s top court has severely undermined the British government’s mass surveillance powers in a new ruling that could rein in police and spy agency investigations.In a judgment handed down in Luxembourg on Wednesday, the European Court of Justice declared that the “general and indiscriminate retention” of data about people’s communications and locations was inconsistent with privacy rights. The court stated that the “highly invasive” bulk storage of private data “exceeds the limits of what is strictly necessary and cannot be considered to be justified, within a democratic society.”
Perhaps the most controversial aspect of the new law is that it will give the British government the authority to serve internet service providers with a “data retention notice,” forcing them to record and store for up to 12 months logs showing websites visited by all of their customers. Law enforcement agencies will then be able to obtain access to this data without any court order or warrant. In addition, the new powers will hand police and tax investigators the ability to, with the approval of a government minister, hack into targeted phones and computers.
“DeepMind/Google are getting a free pass for swift and broad access into the NHS, on the back of persuasive but unproven promises of efficiency and innovation,” said Ms Powles. “We do not know——and have no power to find out——what Google and DeepMind are really doing with NHS patient data, nor the extent of Royal Free’s meaningful control over what DeepMind is doing.”
A bill giving the UK intelligence agencies and police the most sweeping surveillance powers in the western world has passed into law with barely a whimper, meeting only token resistance over the past 12 months from inside parliament and barely any from outside.The Investigatory Powers Act, passed on Thursday, legalises a whole range of tools for snooping and hacking by the security services unmatched by any other country in western Europe or even the US.
Following on from our recent victory against unlawful surveillance by the British intelligence services, Privacy International is taking the British Government to court again. Why? Because it is using ‘general warrants’ to hack the electronic devices (computers, phones, tablets, and the increasing number of things that ‘connect’ to the internet) of sweeping groups of unidentified people at home and abroad. General warrants permit the government to target wide categories of people, places or property (e.g. all mobile phones in London) without any individualised suspicion of wrongdoing.
In an exclusive tour of the new lab, Fortune got a glimpse of Law & Order in the digital age. The lab is Exhibit A in how America’s biggest city is embracing big data analytics and a dash of hacker culture to solve complex crimes. It also raises hard questions about how to balance these sophisticated crime-fighting tools with civil liberties.
He’ll control an unaccountable drone program, and the prison at Guantanamo Bay. His FBI, including a network of 15,000 paid informants, already has a record of spying on mosques and activists, and his NSA’s surveillance empire is ubiquitous and governed by arcane rules, most of which remain secret. He will inherit bombing campaigns in seven Muslim countries, the de facto ability to declare war unilaterally, and a massive nuclear arsenal — much of which is on hair-trigger alert.
En Perú, un mecanismo de control débil de la vigilancia hizo caer a un primer ministro. En 2015 la revista peruana, Correo Semanal, alegó que la Dirección de Inteligencia Nacional del Perú (DINI) había espiado ilegalmente a periodistas, empresarios, legisladores, políticos y miembros de las fuerzas armadas y sus familias. La DINI accedió supuestamente a información almacenada en el registro nacional de las propiedades del Perú, y almacenó esta información en expediente de cientos de personas.
While most eyes are focused on the presidential race between Hillary Clinton and Donald Trump, three major events prove how widespread, and dangerous, mass surveillance has become in the West. Standing alone, each event highlights exactly the severe threats that motivated Edward Snowden to blow his whistle; taken together, they constitute full-scale vindication of everything he’s done.