With the latest WikiLeaks revelations about the CIA – is privacy really dead? | World news | The Guardian

Both the Snowden revelations and the CIA leak highlight the variety of creative techniques intelligence agencies can use to spy on individuals, at a time when many of us are voluntarily giving up our personal data to private companies and installing so-called “smart” devices with microphones (smart TVs, Amazon Echo) in our homes.So, where does this leave us? Is privacy really dead, as Silicon Valley luminaries such as Mark Zuckerberg have previously declared?

Fuente: With the latest WikiLeaks revelations about the CIA – is privacy really dead? | World news | The Guardian


Russia hacked the US election. Now it’s coming for western democracy | Robby Mook | Opinion | The Guardian

We have to take action now to root out Russian and other foreign influences before they become too deeply enmeshed in our political ecosystem. First and foremost, leaders in the US and Europe must stop any attempt by the Trump administration to ease sanctions on Russia. It must be abundantly clear that attacking our elections through cyberspace will prompt a tough and proportional response.

Fuente: Russia hacked the US election. Now it’s coming for western democracy | Robby Mook | Opinion | The Guardian


China’s new cybersecurity law sparks fresh censorship and espionage fears | World news | The Guardian

Legislation raises concerns foreign companies may need to hand over intellectual property and help security agencies in return for market access

Fuente: China’s new cybersecurity law sparks fresh censorship and espionage fears | World news | The Guardian


When the FBI Has a Phone It Can’t Crack, It Calls These Israeli Hackers

just as Apple has come to be seen as a warrior for digital protection and privacy against overreaching government surveillance, Cellebrite is emerging as its law-and-order counterpart, endeavoring to build tools to break through the barriers Apple and other phone makers erect to protect data.

Fuente: When the FBI Has a Phone It Can’t Crack, It Calls These Israeli Hackers


South African Spy Company Used by Gadaffi Touts its NSA-Like Capabilities

In a 2016 pamphlet produced by VASTech SA Pty Ltd., the company outlines its current capabilities for governments, militaries, and law enforcement agencies around the world, claiming it can conduct “passive detection” of communications transmitted from satellites, fix-and-mobile phones, and fiber optic cable.

Fuente: South African Spy Company Used by Gadaffi Touts its NSA-Like Capabilities


Spies for Hire

While cybersecurity companies traditionally aim to ensure that the code in software and hardware is free of flaws — mistakes that malicious hackers can take advantage of — DarkMatter, according to sources familiar with the company’s activities, was trying to find and exploit these flaws in order to install malware. DarkMatter could take over a nearby surveillance camera or cellphone and basically do whatever it wanted with it — conduct surveillance, interfere with or change any electronic messages it emitted, or block the signals entirely.

Fuente: Spies for Hire


Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email

Contrary to a denial by Yahoo and a report by the New York Times, the company’s scanning program, revealed earlier this week by Reuters, provided the government with a custom-built back door into the company’s mail service — and it was so sloppily installed that it posed a privacy hazard for hundreds of millions of users, according to a former Yahoo employee with knowledge of the company’s security practices.

Fuente: Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email


Yahoo email surveillance: who approved the secret scanning program? | Technology | The Guardian

By what legal authority do the National Security Agency and the FBI ask Yahoo to search its users’ emails? Neither the government nor the tech company would say, after Reuters first reported on Tuesday that Yahoo “secretly built a custom software program” it used on behalf of the NSA and CIA to scan customer emails.

Fuente: Yahoo email surveillance: who approved the secret scanning program? | Technology | The Guardian


Yahoo may have let the government spy on emails. Now will we embrace encryption? | Trevor Timm | Opinion | The Guardian

Finally, Yahoo’s possible betrayal of its users is another example of why whistleblowers and leaks to the press are so important. The US government considers this type of surveillance “legal” even though it shocks the conscience of many ordinary Americans and dozens of civil liberties groups have been attempting to have courts rule it illegal for years.

Fuente: Yahoo may have let the government spy on emails. Now will we embrace encryption? | Trevor Timm | Opinion | The Guardian


Yahoo secretly monitored emails on behalf of the US government – report | Technology | The Guardian

Yahoo last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by US intelligence officials, sources have told Reuters.The company complied with a classified US government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency (NSA) or FBI, said two former employees and a third person who knew about the programme.

Fuente: Yahoo secretly monitored emails on behalf of the US government – report | Technology | The Guardian


FBI Says Edward Snowden Is Reason Companies Are Resisting Handing Over Phone Records

Companies became more resistant to the FBI’s collection of their customers’ information following revelations by former NSA contractor Edward Snowden, according to an inspector general report released Thursday.

Fuente: FBI Says Edward Snowden Is Reason Companies Are Resisting Handing Over Phone Records


A Walking Tour of New York’s Massive Surveillance Network

In her book, Burrington, a writer and artist, has sketched the pieces of the internet that are visible on and above the streets of the city, and has explained the business interests and politicking behind their installation. Her book is designed to make the internet tangible

Fuente: A Walking Tour of New York’s Massive Surveillance Network


Russian telecoms groups mount fight against anti-terror law – FT.com

The bill, signed by Vladimir Putin, Russian president, last week requires telecoms companies to store all text and voice messages, as well as all images, sound and video, transmitted via Russia on servers in the country for up to six months. They are also required to store metadata — information about when and from where messages were sent — for three years.

Fuente: Russian telecoms groups mount fight against anti-terror law – FT.com


China’s scary lesson to the world: Censoring the Internet works – The Washington Post

BEHIND THE FIREWALL: How China tamed the Internet | This is part of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.

Fuente: China’s scary lesson to the world: Censoring the Internet works – The Washington Post


Snowden Debates CNN’s Fareed Zakaria on Encryption

NSA whistleblower and privacy advocate Edward Snowden took part in his first public debate on encryption on Tuesday night, facing off against CNN’s Fareed Zakaria, a journalist and author known for his coverage of international affairs.

Fuente: Snowden Debates CNN’s Fareed Zakaria on Encryption


The Vigilante Who Hacked Hacking Team Explains How He Did It | Motherboard

Back in July of last year, the controversial government spying and hacking tool seller Hacking Team was hacked itself by an outside attacker. The breach made headlines worldwide, but no one knew much about the perpetrator or how he did it.That mystery has finally been revealed.

Fuente: The Vigilante Who Hacked Hacking Team Explains How He Did It | Motherboard


The CIA Is Investing in Firms That Mine Your Tweets and Instagram Photos

SOFT ROBOTS THAT can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence that will sift through large data sets — these are just a few of the technologies being pursued by companies with investment from In-Q-Tel, the CIA’s venture capital firm, according to a document obtained by The Intercept.

Fuente: The CIA Is Investing in Firms That Mine Your Tweets and Instagram Photos


Uber proporcionó datos de 14 millones de usuarios a agencias reguladoras de Estados Unidos – 20minutos.es

La plataforma informó sobre 12,2 millones de usuarios de julio a diciembre. California, con más de 5,7 millones de datos y Nueva York, con más de 3, fueron las zonas en las que Uber dio más información a las autoridades. El estudio divide la entrega de información en función de si se trata de requerimientos legales ordinario o está relacionado con investigaciones criminales.

Fuente: Uber proporcionó datos de 14 millones de usuarios a agencias reguladoras de Estados Unidos – 20minutos.es


Drive towards strong encryption will end

What happens when the wave of encryption rippling through the personal technology world washes up against the realities of the data economy?Most of the recent debate over the spread of encryption has centred on the implications for personal privacy and national security. Less has been said about business: in particular, what a greater use of encryption will mean for the usability of tech products and services, and for the business models that rely on capturing and extracting value from data.

Fuente: Drive towards strong encryption will end


Hacking Team Is Back In Business, But Struggling To Survive | Motherboard

Earlier this year, a representative for the notorious surveillance vendor Hacking Team traveled to South America to pitch the company’s marquee spyware product to a potential new customer.The representative gave a presentation at the office of a government agency, showed off the spyware control center, and handed out some marketing materials.It was an unremarkable sales pitch—affirmed by the fact that the potential client decided not to buy, according to a source who attended the meeting—except for the timing, which was almost six months after what some consider Hacking Team’s near-death experience.

Fuente: Hacking Team Is Back In Business, But Struggling To Survive | Motherboard


Forget Apple's fight with the FBI – our privacy catastrophe has only just begun | Technology | The Guardian

The privacy crisis is a disaster of our own making – and now the tech firms who gathered our data are trying to make money out of privacy

Fuente: Forget Apple’s fight with the FBI – our privacy catastrophe has only just begun | Technology | The Guardian


Facebook, Google and WhatsApp plan to increase encryption of user data | Technology | The Guardian

Spurred on by Apple’s battles against the FBI, some of tech’s biggest names are to expand encryption of user data in their services, the Guardian can reveal

Fuente: Facebook, Google and WhatsApp plan to increase encryption of user data | Technology | The Guardian


Apple gains support from tech rivals in FBI case – FT.com

ft.com > Companies >TechnologySubscribe Sign in Home World Companies Energy Financials Health Industrials Luxury 360 Media Retail & Consumer Tech Telecoms Transport By Region Tools Markets Global Economy Lex Comment Management Life & Arts March 4, 2016 2:25 amApple gains support from tech rivals in FBI caseTim Bradshaw in San Francisco Share Print Clip CommentsFBI and Apple logos©FBI/AppleAmerica’s largest technology companies have joined Apple’s fight against the government over data protection and security, in an unusual display of unity by the Silicon Valley rivals.More than a dozen motions filed on Thursday sided with Apple as it tries to resist a demand to write software that would help the FBI unlock the San Bernardino shooter’s iPhone. Civil liberties groups and IT trade associations lined up alongside dozens of law professors and cryptography experts, after Apple filed its own motion for the judicial order to be withdrawn last week.

Fuente: Apple gains support from tech rivals in FBI case – FT.com


MPs warn increased internet surveillance will hit tech companies – FT.com

The UK government’s plans to increase internet surveillance risk imposing uncertain costs on British technology businesses, and impeding their ability to compete in a global market, a committee of MPs has warned. The draft Investigatory Powers Bill

Fuente: MPs warn increased internet surveillance will hit tech companies – FT.com


Big tech groups warn UK against spy bill – FT.com

Silicon Valley’s biggest companies have urged the UK government to reconsider swaths of its proposed surveillance law, saying it will have far-reaching implications for how other countries upgrade their spying regimes. In a rare show of unity,

Fuente: Big tech groups warn UK against spy bill – FT.com


Apple's Tim Cook defends encryption. When will other tech CEOs do so? | Trevor Timm | Opinion | The Guardian

More high-profile titans need to use their platforms to make crystal clear how important encryption is to users everywhere

Fuente: Apple’s Tim Cook defends encryption. When will other tech CEOs do so? | Trevor Timm | Opinion | The Guardian


Apple believes bill creates ‘key under doormat for bad guys’ – FT.com

Shortly after Theresa May introduced the draft Investigatory Powers bill in November to update the UK’s surveillance laws for the internet age, the home secretary met privately with Tim Cook, Apple’s chief executive. He laid out a number of

Fuente: Apple believes bill creates ‘key under doormat for bad guys’ – FT.com


Comey Calls on Tech Companies Offering End-to-End Encryption to Reconsider “Their Business Model”

The FBI director essentially wants tech companies to roll back secure encryption to something less secure that law enforcement can intercept.

Fuente: Comey Calls on Tech Companies Offering End-to-End Encryption to Reconsider “Their Business Model”