EU could give police direct access to cloud data in wake of terror attacks | Technology | The Guardian

The European Union is seeking to make it easier for police and law enforcement agencies to retrieve electronic evidence from US tech firms, including directly from cloud storage.

Fuente: EU could give police direct access to cloud data in wake of terror attacks | Technology | The Guardian


Google corteja a China tras años de enfrentamiento a través del juego del go – El Mostrador

Google, el buscador más popular de internet y una de las mayores empresas del mundo, está bloqueado en China desde 2010, pero esta semana la compañía estadounidense ha intentado ganarse de nuevo a las autoridades del país con más internautas del mundo con algo tan sorprendente como un torneo de un juego mental.

Fuente: Google corteja a China tras años de enfrentamiento a través del juego del go – El Mostrador


Reuben Paul, el niño de 11 años que hackea ositos de peluche y ya tiene su propia empresa de ciberseguridad – El Mostrador

Este joven estadounidense, un prodigio de la informática, se llama a sí mismo “ciberninja” y a través de su propia empresa quiere “educar a la gente, enseñarles cosas nuevas” sobre la seguridad en el mundo cibernético.

Fuente: Reuben Paul, el niño de 11 años que hackea ositos de peluche y ya tiene su propia empresa de ciberseguridad – El Mostrador


Shadow Brokers threaten to unleash more hacking tools | Technology | The Guardian

The so-called Shadow Brokers, who claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world, said they have a new suite of tools and vulnerabilities in newer software. The possible targets include Microsoft’s Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.

Fuente: Shadow Brokers threaten to unleash more hacking tools | Technology | The Guardian


Cybersecurity for the People: How to Keep Your Chats Truly Private With Signal

it’s possible to make sure that your private conversations are actually private. It starts with installing an app known as Signal, and getting your friends to install it too. Then you’ll want to tweak the settings to lock everything down.

Fuente: Cybersecurity for the People: How to Keep Your Chats Truly Private With Signal


Japan Made Secret Deals With the NSA That Expanded Global Surveillance

The documents, published Monday in collaboration with Japanese news broadcaster NHK, reveal the complicated relationship the NSA has maintained with Japan over a period of more than six decades. Japan has allowed NSA to maintain at least three bases on its territory and contributed more than half a billion dollars to help finance the NSA’s facilities and operations. In return, NSA has kitted out Japanese spies with powerful surveillance tools and shared intelligence with them. However, there is a duplicitous dimension to the partnership. While the NSA has maintained friendly ties with its Japanese counterparts and benefited from their financial generosity, at the same time it has secretly spied on Japanese officials and institutions.

Fuente: Japan Made Secret Deals With the NSA That Expanded Global Surveillance


The Strangers Who Got Snowden’s Secrets in the Mail

The story of Edward Snowden’s disclosure of NSA secrets to the press has been told and retold in books, films, and countless articles. Left unreported has been the quiet role of two journalists who literally had Snowden material mailed to them in a cardboard box.

Fuente: The Strangers Who Got Snowden’s Secrets in the Mail


Wiretaps, data dumps and zero days: is digital privacy no longer possible? – video | World news | The Guardian

From Russian hacking to WikiLeaks, Edward Snowden and CIA cyber weapons, does digital surveillance mean the end of privacy?

Fuente: Wiretaps, data dumps and zero days: is digital privacy no longer possible? – video | World news | The Guardian


Gobiernos en guerra contra WhatsApp por su cifrado de extremo a extremo – El Mostrador

Tras el ataque al Parlamento Británico ocurrido la semana pasada, los políticos británicos han exigido que Whatsapp y otras aplicaciones de mensajería instantánea proporcionen acceso a la policía y fuerzas de seguridad para así poder monitorear conversaciones terroristas. Sin embargo, los expertos en tecnología discuten que abrir las “puertas traseras” de los servicios de mensajería popular, las cuales usan cifrado de extremo a extremo, arrojaría una serie de problemas.

Fuente: Gobiernos en guerra contra WhatsApp por su cifrado de extremo a extremo – El Mostrador


Lawsuit Seeks Transparency as Searches of Cellphones and Laptops Skyrocket at Borders

A number of recent cases in the media have revealed instances of U.S. citizens and others being compelled by CBP agents to unlock their devices for search. In some instances, people have claimed to have been physically coerced into complying, including one American citizen who said that CBP agents grabbed him by the neck in order to take his cellphone out of his possession.

Fuente: Lawsuit Seeks Transparency as Searches of Cellphones and Laptops Skyrocket at Borders


Relator especial de la ONU pide que la privacidad sea una prioridad para los gobiernos del mundo | R3D: Red en Defensa de los Derechos Digitales

“Hay poca o ninguna evidencia para persuadirme de la eficacia o la proporcionalidad de algunas medidas extremadamente intrusivas presentes en las nuevas leyes de privacidad de Francia, Alemania, el Reino Unido y los Estados Unidos”, asegura Cannataci, en un comunicado de la Oficina del Alto Comisionado de Derechos Humanos de la ONU.

Fuente: Relator especial de la ONU pide que la privacidad sea una prioridad para los gobiernos del mundo | R3D: Red en Defensa de los Derechos Digitales


Apple Says It Fixed CIA Vulnerabilities Years Ago

Yesterday, WikiLeaks released its latest batch of pilfered CIA material, five documents describing malicious software for taking over Apple MacBooks and iPhones, and wrote in an accompanying post that “the CIA has been infecting the iPhone supply chain of its targets,” prompting concerned readers to wonder if their iPhone or MacBook had been infected on the factory floor. In a statement, Apple says that is almost certainly not the case.

Fuente: Apple Says It Fixed CIA Vulnerabilities Years Ago


Wikileaks filtra nuevos documentos secretos sobre cómo “hackeaba” la CIA cualquier iPhone o Mac – El Mostrador

Bajo el nombre “Dark Matter” Wikileaks publicó una nueva tanda de documentos secretos, en los que detalla varios proyectos de la CIA para lograr infectar y “hackear” cualquier iPhone o Mac.

Fuente: Wikileaks filtra nuevos documentos secretos sobre cómo “hackeaba” la CIA cualquier iPhone o Mac – El Mostrador


¿Qué tenía el trabajo universitario que provocó una alerta de seguridad porque equivalía a “exportar armas nucleares a un gobierno hostil”? – El Mostrador

¿Por qué una agencia de espías de Estados Unidos no quería que los universitarios discutieran su trabajo en público? El caso es que no lograron acallarlos y, gracias a ello, tenemos la web.

Fuente: ¿Qué tenía el trabajo universitario que provocó una alerta de seguridad porque equivalía a “exportar armas nucleares a un gobierno hostil”? – El Mostrador


Documents support fears of Muslim surveillance by Obama-era program | World news | The Guardian

Internal US law enforcement documents describe a highly controversial community initiative aimed at identifying potential terrorists before they “radicalize” as being intimately related to intelligence gathering.Despite years of official denials, American Muslim civil rights groups have claimed that Barack Obama’s Countering Violent Extremism (CVE) initiative was a euphemistic approach that targeted Muslims for surveillance.

Fuente: Documents support fears of Muslim surveillance by Obama-era program | World news | The Guardian


With the latest WikiLeaks revelations about the CIA – is privacy really dead? | World news | The Guardian

Both the Snowden revelations and the CIA leak highlight the variety of creative techniques intelligence agencies can use to spy on individuals, at a time when many of us are voluntarily giving up our personal data to private companies and installing so-called “smart” devices with microphones (smart TVs, Amazon Echo) in our homes.So, where does this leave us? Is privacy really dead, as Silicon Valley luminaries such as Mark Zuckerberg have previously declared?

Fuente: With the latest WikiLeaks revelations about the CIA – is privacy really dead? | World news | The Guardian


Malware Attacks Used by the U.S. Government Retain Potency for Many Years, New Evidence Indicates

A new report from Rand Corp. may help shed light on the government’s arsenal of malicious software, including the size of its stockpile of so-called “zero days” — hacks that hit undisclosed vulnerabilities in computers, smartphones, and other digital devices.The report also provides evidence that such vulnerabilities are long lasting. The findings are of particular interest because not much is known about the U.S. government’s controversial use of zero days.

Fuente: Malware Attacks Used by the U.S. Government Retain Potency for Many Years, New Evidence Indicates


Nancy Pelosi urges FBI director to debunk Donald Trump’s wiretap claim | US news | The Guardian

“Theoretically, do I think that a director of the FBI who knows for a fact that something is a mythology but is misleading to the American people … should set the record straight? Yes, I do think he should say that, publicly,” Pelosi said

Fuente: Nancy Pelosi urges FBI director to debunk Donald Trump’s wiretap claim | US news | The Guardian


WikiLeaks publishes ‘biggest ever leak of secret CIA documents’ | Media | The Guardian

The US intelligence agencies are facing fresh embarrassment after WikiLeaks published what it described as the biggest ever leak of confidential documents from the CIA detailing the tools it uses to break into phones, communication apps and other electronic devices.

Fuente: WikiLeaks publishes ‘biggest ever leak of secret CIA documents’ | Media | The Guardian


Wikileaks Dump Shows CIA Could Turn Smart TVs into Listening Devices

It’s difficult to buy a new TV that doesn’t come with a suite of (generally mediocre) “smart” software, giving your home theater some of the functions typically found in phones and tablets. But bringing these extra features into your living room means bringing a microphone, too — a fact the CIA is exploiting, according to a new trove of documents released today by Wikileaks.

Fuente: Wikileaks Dump Shows CIA Could Turn Smart TVs into Listening Devices


WikiLeaks filtra programa encubierto de la CIA que usa celulares y televisores como “micrófonos encubiertos” – El Mostrador

La información revelada hoy sobre “hacking” (ataque cibernético) es parte de una serie en siete entregas que define como “la mayor filtración de datos de inteligencia de la historia”.

Fuente: WikiLeaks filtra programa encubierto de la CIA que usa celulares y televisores como “micrófonos encubiertos” – El Mostrador


La ciudad vigilada | The Santiago Times

Los alcaldes de las comunas acomodadas del sector oriente de Santiago han liderado una iniciativa por sumar tecnología de vigilancia a las medidas para reducir la delincuencia. Esta tendencia fue estrenada por las comunas de Lo Barnechea y Las Condes a mediados del año 2015, al instalar tres globos de video vigilancia de naturaleza militar en sus comunas. Luego de las elecciones municipales de 2016, el alcalde Felipe Alessandri anunció que un globo de similares características sería instalado en la comuna de Santiago, cuya implementación sigue pendiente. Este año el debate ha vuelto a la palestra pública luego del anuncio de las municipalidades de Las Condes y Providencia, quienes pretenden utilizar drones a control remoto equipados cámaras de alta resolución para vigilar los parques y calles de sus comunas para reducir la tasa de criminalidad.

Fuente: La ciudad vigilada | The Santiago Times


Defender los derechos humanos en el entorno tecnológico. Nuestra apuesta desde América Latina | Derechos Digitales

Derechos Digitales comienza hoy una nueva etapa de trabajo en defensa de los derechos fundamentales en América Latina. Nuestro camino se dirige a la identificación de un entorno cambiante para los usuarios, los gobiernos y la sociedad civil en general.

Fuente: Defender los derechos humanos en el entorno tecnológico. Nuestra apuesta desde América Latina | Derechos Digitales


Servicio de inteligencia alemán recluta “espías 2.0” capaces de anticiparse a hackers – El Mostrador

los servicios secretos germanos han lanzado en su página web una especie de concurso llamado “Sherlock Holmes en el ciberespacio”, con el que pretenden encontrar jóvenes talentos que puedan hacer frente a los riesgos de futuro gracias a su destreza con las nuevas tecnologías.

Fuente: Servicio de inteligencia alemán recluta “espías 2.0” capaces de anticiparse a hackers – El Mostrador


Fiscalía podrá acceder a correos electrónicos desde servidor de SQM – El Mostrador

“Se autorizó por parte del tribunal en el mes de febrero la revisión de los correos electrónicos del señor Patricio Contesse desde un servidor que se obtuvo desde Estados Unidos. Ahí hay más de tres millones de correos electrónicos que hay que revisar y analizar. En consecuencia, es una investigación compleja, ya que para analizar los correos hay que hacer una copia forense, tener programas especiales para segregar correos que han sido autorizados”, sostuvo la fiscal del caso SQM, Paola Castiglione.

Fuente: Fiscalía podrá acceder a correos electrónicos desde servidor de SQM – El Mostrador


My Friend Cayla: la muñeca prohibida en Alemania que espía a tu familia

La línea de muñecas “My Friend Cayla” ha sido prohibida en Alemania, luego que el gobierno del país europeo descubriera que éstas eran utilizadas para grabar y guardar datos de sus usuarios sin su consentimiento.

Fuente: My Friend Cayla: la muñeca prohibida en Alemania que espía a tu familia


Matthei anuncia que en Providencia habrá drones de vigilancia – Nacional – 24horas

La alcaldesa de Providencia, Evelyn Matthei, confirmó que la comuna implementará como medida para profundizar la seguridad en las calles el uso de drones “inteligentes”. La misión de los artefactos será patrullar puntos complicados de esta zona de la capital.

Fuente: Matthei anuncia que en Providencia habrá drones de vigilancia – Nacional – 24horas


Russia hacked the US election. Now it’s coming for western democracy | Robby Mook | Opinion | The Guardian

We have to take action now to root out Russian and other foreign influences before they become too deeply enmeshed in our political ecosystem. First and foremost, leaders in the US and Europe must stop any attempt by the Trump administration to ease sanctions on Russia. It must be abundantly clear that attacking our elections through cyberspace will prompt a tough and proportional response.

Fuente: Russia hacked the US election. Now it’s coming for western democracy | Robby Mook | Opinion | The Guardian


Secret Docs Reveal: President Trump Has Inherited an FBI With Vast Hidden Powers

For example, the bureau’s agents can decide that a campus organization is not “legitimate” and therefore not entitled to robust protections for free speech; dig for derogatory information on potential informants without any basis for believing they are implicated in unlawful activity; use a person’s immigration status to pressure them to collaborate and then help deport them when they are no longer useful; conduct invasive “assessments” without any reason for suspecting the targets of wrongdoing; demand that companies provide the bureau with personal data about their users in broadly worded national security letters without actual legal authority to do so; fan out across the internet along with a vast army of informants, infiltrating countless online chat rooms; peer through the walls of private homes; and more. The FBI offered various justifications of these tactics to our reporters. But the documents and our reporting on them ultimately reveal a bureaucracy in dire need of greater transparency and accountability.

Fuente: Secret Docs Reveal: President Trump Has Inherited an FBI With Vast Hidden Powers


Cinco universidades serán pilar del primer centro nacional en sistemas de información en salud – El Mostrador

“Somos una especie de broker tecnológico. Nuestro centro apoyará y certificará a quienes hayan desarrollado productos innovadores, que puedan ser validados en escenarios clínicos reales y cumpliendo estándares consensuados”, señala Capurro.

Fuente: Cinco universidades serán pilar del primer centro nacional en sistemas de información en salud – El Mostrador


Edward Snowden’s leave to remain in Russia extended for three years | US news | The Guardian

Earlier on Wednesday, Maria Zakharova, a foreign ministry spokeswoman, wrote on Facebook that Snowden’s right to stay had recently been extended “by a couple of years”. Her post came in response to a suggestion from the former acting CIA director Michael Morell that Vladimir Putin might hand over Snowden to the US, despite there being no extradition treaty between the countries.

Fuente: Edward Snowden’s leave to remain in Russia extended for three years | US news | The Guardian


Las ciudades inteligentes y el problema de la vigilancia | Derechos Digitales

Las tecnologías inteligentes apuntan a mejorar las condiciones de vida en las ciudades. Sin embargo, son también capaces de poner en entredicho nuestra privacidad. ¿Cuál es el límite de lo smart?

Fuente: Las ciudades inteligentes y el problema de la vigilancia | Derechos Digitales


Watch How Casually False Claims are Published: New York Times and Nicholas Lemann Edition

Like most people, I’ve long known that factual falsehoods are routinely published in major media outlets. But as I’ve pointed out before, nothing makes you internalize just how often it really happens, how completely their editorial standards so often fail, like being personally involved in a story that receives substantial media coverage. I cannot count how many times I’ve read or heard claims from major media outlets about the Snowden story that I knew, from first-hand knowledge, were a total fabrication.We have a perfect example of how this happens from the New York Times today, in a book review by Nicholas Lemann, the Pulitzer-Moore professor of journalism at Columbia University as well as a long-time staff writer for The New Yorker.

Fuente: Watch How Casually False Claims are Published: New York Times and Nicholas Lemann Edition


State of surveillance: privacy in Donald Trump’s America – tech podcast | Technology | The Guardian

With Barack Obama’s presidency coming to a close, Ewen MacAskill, the Guardian’s defence and intelligence correspondent, helps us explore what mass surveillance in America might look like under Donald Trump

Fuente: State of surveillance: privacy in Donald Trump’s America – tech podcast | Technology | The Guardian


El fantasma del espionaje durante la guerra fría se instala en la Universidad de Cambridge – El Mostrador

Tres académicos renunciaron a organizar un seminario sobre temas de seguridad e inteligencia, porque sospechan que una editorial ligada a la actividad pueda ser usada como pantalla por espías del Kremlin. “Cambridge es un maravilloso lugar de teorías conspirativas pero la idea de que haya un complot maquiavélico es ridículo”, dijo Neil Kent, uno de los principales impulsores del evento.

Fuente: El fantasma del espionaje durante la guerra fría se instala en la Universidad de Cambridge – El Mostrador


In Major Privacy Victory, Top EU Court Rules Against Mass Surveillance

The European Union’s top court has severely undermined the British government’s mass surveillance powers in a new ruling that could rein in police and spy agency investigations.In a judgment handed down in Luxembourg on Wednesday, the European Court of Justice declared that the “general and indiscriminate retention” of data about people’s communications and locations was inconsistent with privacy rights. The court stated that the “highly invasive” bulk storage of private data “exceeds the limits of what is strictly necessary and cannot be considered to be justified, within a democratic society.”

Fuente: In Major Privacy Victory, Top EU Court Rules Against Mass Surveillance


UK spy chief warns on ‘profound’ propaganda threat

“The connectivity that is at the heart of globalisation can be exploited by states with hostile intent to further their aims deniably,” said Mr Younger. “They do this through means as varied as cyber attacks, propaganda or subversion of democratic process.”

Fuente: UK spy chief warns on ‘profound’ propaganda threat


Edward Snowden backers beam calls for pardon on Washington news museum | US news | The Guardian

Now the most audacious display of support for Snowden is under way. Messages calling for his pardon are being beamed on to the outside wall of the Newseum, the Washington institution devoted to freedom of speech and the press that stands less than two miles from the White House.

Fuente: Edward Snowden backers beam calls for pardon on Washington news museum | US news | The Guardian


The FBI Hacked Over 8,000 Computers In 120 Countries Based on One Warrant | Motherboard

In January, Motherboard reported on the FBI’s “unprecedented” hacking operation, in which the agency, using a single warrant, deployed malware to over one thousand alleged visitors of a dark web child pornography site. Now, it has emerged that the campaign was actually an order of magnitude larger.

Fuente: The FBI Hacked Over 8,000 Computers In 120 Countries Based on One Warrant | Motherboard


U.K. Parliament Approves Unprecedented New Hacking and Surveillance Powers

Perhaps the most controversial aspect of the new law is that it will give the British government the authority to serve internet service providers with a “data retention notice,” forcing them to record and store for up to 12 months logs showing websites visited by all of their customers. Law enforcement agencies will then be able to obtain access to this data without any court order or warrant. In addition, the new powers will hand police and tax investigators the ability to, with the approval of a government minister, hack into targeted phones and computers.

Fuente: U.K. Parliament Approves Unprecedented New Hacking and Surveillance Powers


Fears raised over Google’s DeepMind deal to use NHS medical data

“DeepMind/Google are getting a free pass for swift and broad access into the NHS, on the back of persuasive but unproven promises of efficiency and innovation,” said Ms Powles. “We do not know——and have no power to find out——what Google and DeepMind are really doing with NHS patient data, nor the extent of Royal Free’s meaningful control over what DeepMind is doing.”

Fuente: Fears raised over Google’s DeepMind deal to use NHS medical data


Obama Refuses to Pardon Edward Snowden. Trump’s New CIA Pick Wants Him Dead.

November 18 2016, 3:35 p.m.President Obama indicated on Friday that he won’t pardon NSA whistleblower Edward Snowden, even as President-elect Donald Trump announced his pick to run the CIA: Kansas congressman Mike Pompeo, who has called for “the traitor Edward Snowden” to be executed.

Fuente: Obama Refuses to Pardon Edward Snowden. Trump’s New CIA Pick Wants Him Dead.


‘Extreme surveillance’ becomes UK law with barely a whimper | World news | The Guardian

A bill giving the UK intelligence agencies and police the most sweeping surveillance powers in the western world has passed into law with barely a whimper, meeting only token resistance over the past 12 months from inside parliament and barely any from outside.The Investigatory Powers Act, passed on Thursday, legalises a whole range of tools for snooping and hacking by the security services unmatched by any other country in western Europe or even the US.

Fuente: ‘Extreme surveillance’ becomes UK law with barely a whimper | World news | The Guardian


HELP US FIGHT SWEEPING STATE HACKING POWERS | Privacy International

Following on from our recent victory against unlawful surveillance by the British intelligence services, Privacy International is taking the British Government to court again. Why? Because it is using ‘general warrants’ to hack the electronic devices (computers, phones, tablets, and the increasing number of things that ‘connect’ to the internet) of sweeping groups of unidentified people at home and abroad. General warrants permit the government to target wide categories of people, places or property (e.g. all mobile phones in London) without any individualised suspicion of wrongdoing.

Fuente: HELP US FIGHT SWEEPING STATE HACKING POWERS | Privacy International


New York’s New Digital Crime Lab Is a Forensic Marvel

In an exclusive tour of the new lab, Fortune got a glimpse of Law & Order in the digital age. The lab is Exhibit A in how America’s biggest city is embracing big data analytics and a dash of hacker culture to solve complex crimes. It also raises hard questions about how to balance these sophisticated crime-fighting tools with civil liberties.

Fuente: New York’s New Digital Crime Lab Is a Forensic Marvel


Commander-In-Chief Donald Trump Will Have Terrifying Powers. Thanks, Obama.

He’ll control an unaccountable drone program, and the prison at Guantanamo Bay. His FBI, including a network of 15,000 paid informants, already has a record of spying on mosques and activists, and his NSA’s surveillance empire is ubiquitous and governed by arcane rules, most of which remain secret. He will inherit bombing campaigns in seven Muslim countries, the de facto ability to declare war unilaterally, and a massive nuclear arsenal — much of which is on hair-trigger alert.

Fuente: Commander-In-Chief Donald Trump Will Have Terrifying Powers. Thanks, Obama.


La complicada relación entre Perú y la vigilancia, y cómo solucionarla | Hiperderecho

En Perú, un mecanismo de control débil de la vigilancia hizo caer a un primer ministro. En 2015 la revista peruana, Correo Semanal, alegó que la Dirección de Inteligencia Nacional del Perú (DINI) había espiado ilegalmente a periodistas, empresarios, legisladores, políticos y miembros de las fuerzas armadas y sus familias. La DINI accedió supuestamente a información almacenada en el registro nacional de las propiedades del Perú, y almacenó esta información en expediente de cientos de personas.

Fuente: La complicada relación entre Perú y la vigilancia, y cómo solucionarla | Hiperderecho


Privacy experts fear Donald Trump accessing global surveillance network | World news | The Guardian

Privacy activists, human rights campaigners and former US security officials have expressed fears over the prospect of Donald Trump gaining access to the vast global US and UK surveillance network.

Fuente: Privacy experts fear Donald Trump accessing global surveillance network | World news | The Guardian


Three New Scandals Show How Pervasive and Dangerous Mass Surveillance Is in the West, Vindicating Snowden

While most eyes are focused on the presidential race between Hillary Clinton and Donald Trump, three major events prove how widespread, and dangerous, mass surveillance has become in the West. Standing alone, each event highlights exactly the severe threats that motivated Edward Snowden to blow his whistle; taken together, they constitute full-scale vindication of everything he’s done.

Fuente: Three New Scandals Show How Pervasive and Dangerous Mass Surveillance Is in the West, Vindicating Snowden