Both the Snowden revelations and the CIA leak highlight the variety of creative techniques intelligence agencies can use to spy on individuals, at a time when many of us are voluntarily giving up our personal data to private companies and installing so-called “smart” devices with microphones (smart TVs, Amazon Echo) in our homes.So, where does this leave us? Is privacy really dead, as Silicon Valley luminaries such as Mark Zuckerberg have previously declared?
A new report from Rand Corp. may help shed light on the government’s arsenal of malicious software, including the size of its stockpile of so-called “zero days” — hacks that hit undisclosed vulnerabilities in computers, smartphones, and other digital devices.The report also provides evidence that such vulnerabilities are long lasting. The findings are of particular interest because not much is known about the U.S. government’s controversial use of zero days.
The US intelligence agencies are facing fresh embarrassment after WikiLeaks published what it described as the biggest ever leak of confidential documents from the CIA detailing the tools it uses to break into phones, communication apps and other electronic devices.
It’s difficult to buy a new TV that doesn’t come with a suite of (generally mediocre) “smart” software, giving your home theater some of the functions typically found in phones and tablets. But bringing these extra features into your living room means bringing a microphone, too — a fact the CIA is exploiting, according to a new trove of documents released today by Wikileaks.
los servicios secretos germanos han lanzado en su página web una especie de concurso llamado “Sherlock Holmes en el ciberespacio”, con el que pretenden encontrar jóvenes talentos que puedan hacer frente a los riesgos de futuro gracias a su destreza con las nuevas tecnologías.
La línea de muñecas “My Friend Cayla” ha sido prohibida en Alemania, luego que el gobierno del país europeo descubriera que éstas eran utilizadas para grabar y guardar datos de sus usuarios sin su consentimiento.
Tres académicos renunciaron a organizar un seminario sobre temas de seguridad e inteligencia, porque sospechan que una editorial ligada a la actividad pueda ser usada como pantalla por espías del Kremlin. “Cambridge es un maravilloso lugar de teorías conspirativas pero la idea de que haya un complot maquiavélico es ridículo”, dijo Neil Kent, uno de los principales impulsores del evento.
“The connectivity that is at the heart of globalisation can be exploited by states with hostile intent to further their aims deniably,” said Mr Younger. “They do this through means as varied as cyber attacks, propaganda or subversion of democratic process.”
In a 2016 pamphlet produced by VASTech SA Pty Ltd., the company outlines its current capabilities for governments, militaries, and law enforcement agencies around the world, claiming it can conduct “passive detection” of communications transmitted from satellites, fix-and-mobile phones, and fiber optic cable.
The FBI has contracted out with a private firm to handle, distribute and monitor highly sensitive surveillance documents, in an arrangement veteran FBI agents consider a potential privacy and counterintelligence risk.
Booz Allen Hamilton, the defense contracting giant whose employee was charged Wednesday in connection with the theft of hacking codes used by the National Security Agency, provides a fairly ironic service to the government: spotting rogue employees.
En respuesta a una solicitud de información promovida en 2016 por la Red en Defensa de los Derechos Digitales (R3D), la Consejería Jurídica del Ejecutivo ha pedido a la Suprema Corte de Justicia de la Nación que no se divulguen las estadísticas detalladas sobre las intervenciones a comunicaciones privadas hechas por parte del Centro de Investigación y Seguridad Nacional (CISEN) durante 2014.
Según afirmaciones de Younger publicadas por The Times el mundo digital “representa una amenaza porque los que se oponen a nosotros pueden utilizar esta capacidad para tener acceso a nuestras actividades, lo que significa que tenemos que cambiar completamente la forma en que hacemos las cosas”.
Harris Corp.’s Stingray surveillance device has been one of the most closely-guarded secrets in law enforcement for more than 15 years. The company and its police clients across the United States have fought to keep information about the mobile-phone-monitoring boxes from the public against which they are used. The Intercept has obtained several Harris instruction manuals spanning roughly 200 pages and meticulously detailing how to create a cellular surveillance dragnet.
in the heart of the tranquil English countryside, is the National Security Agency’s largest overseas spying base. Originally used to monitor Soviet communications through the Cold War, its focus has since dramatically shifted, and today it is a vital part of the NSA’s sprawling global surveillance network.
As part of an ongoing effort to “exploit medical intelligence,” the National Security Agency teamed up with the military-focused Defense Intelligence Agency to extract “medical SIGINT” from the intercepted communications of nonprofit groups starting in the early 2000s, a top-secret document shows.
SIDtoday is the internal newsletter for the NSA’s most important division, the Signals Intelligence Directorate. After editorial review, The Intercept is releasing nine years’ worth of newsletters in batches, starting with 2003. The agency’s spies explain a surprising amount about what they were doing, how they were doing it, and why.
From the time we began reporting on the archive provided to us in Hong Kong by NSA whistleblower Edward Snowden, we sought to fulfill his two principal requests for how the materials should be handled: that they be released in conjunction with careful reporting that puts the documents in context and makes them digestible to the public, and that the welfare and reputations of innocent people be safeguarded. As time has gone on, The Intercept has sought out new ways to get documents from the archive into the hands of the public, consistent with the public interest as originally conceived.Today, The Intercept is announcing two innovations in how we report on and publish these materials. Both measures are designed to ensure that reporting on the archive continues in as expeditious and informative a manner as possible, in accordance with the agreements we entered into with our source about how these materials would be disclosed, a framework that he, and we, have publicly described on numerous occasions.
NEWLY DISCLOSED DOCUMENTS offer a rare insight into the secretive legal regime underpinning the British government’s controversial mass surveillance programs.The London-based group Privacy International obtained the previously confidential files as part of an ongoing legal case challenging the scope of British spies’ covert collection of huge troves of private data.
Earlier this year, a representative for the notorious surveillance vendor Hacking Team traveled to South America to pitch the company’s marquee spyware product to a potential new customer.The representative gave a presentation at the office of a government agency, showed off the spyware control center, and handed out some marketing materials.It was an unremarkable sales pitch—affirmed by the fact that the potential client decided not to buy, according to a source who attended the meeting—except for the timing, which was almost six months after what some consider Hacking Team’s near-death experience.
Nearly three years after NSA whistleblower Edward Snowden gave journalists his trove of documents on the intelligence community’s broad and powerful surveillance regime, the public is still missing some crucial, basic facts about how the operations work.Surveillance researchers and privacy advocates published a report on Wednesday outlining what we do know, thanks to the period of discovery post-Snowden — and the overwhelming amount of things we don’t.
Silicon Valley’s biggest companies have urged the UK government to reconsider swaths of its proposed surveillance law, saying it will have far-reaching implications for how other countries upgrade their spying regimes. In a rare show of unity,