Fiscalía podrá acceder a correos electrónicos desde servidor de SQM – El Mostrador

“Se autorizó por parte del tribunal en el mes de febrero la revisión de los correos electrónicos del señor Patricio Contesse desde un servidor que se obtuvo desde Estados Unidos. Ahí hay más de tres millones de correos electrónicos que hay que revisar y analizar. En consecuencia, es una investigación compleja, ya que para analizar los correos hay que hacer una copia forense, tener programas especiales para segregar correos que han sido autorizados”, sostuvo la fiscal del caso SQM, Paola Castiglione.

Fuente: Fiscalía podrá acceder a correos electrónicos desde servidor de SQM – El Mostrador


Cinco universidades serán pilar del primer centro nacional en sistemas de información en salud – El Mostrador

“Somos una especie de broker tecnológico. Nuestro centro apoyará y certificará a quienes hayan desarrollado productos innovadores, que puedan ser validados en escenarios clínicos reales y cumpliendo estándares consensuados”, señala Capurro.

Fuente: Cinco universidades serán pilar del primer centro nacional en sistemas de información en salud – El Mostrador


Security fears over FBI contracting out highly sensitive surveillance documents | US news | The Guardian

The FBI has contracted out with a private firm to handle, distribute and monitor highly sensitive surveillance documents, in an arrangement veteran FBI agents consider a potential privacy and counterintelligence risk.

Fuente: Security fears over FBI contracting out highly sensitive surveillance documents | US news | The Guardian


Santiago, Smart City: en defensa de las ciudades estúpidas | Oficina Antivigilância

Nadie quiere vivir en una ciudad tonta. La idea de marketing detrás de las Smart Cities -así, en inglés, porque le da un toque de modernidad a lo Silicon Valley- es, en ese sentido, impecable. Pero ¿podemos si quiera considerar a una ciudad como estúpida? Al parecer, para los evangelistas de las ciudades inteligentes, y siguiendo la lógica de los pares binarios (bueno/malo; inteligente/tonto), sí.

Fuente: Santiago, Smart City: en defensa de las ciudades estúpidas | Oficina Antivigilância


Just Before Passing Surveillance Expansion, Lawmakers Partied With Pro-CISA Lobbyists

The night before Congress passed legislation to expand surveillance power, legislators attended a party with the chief lobbyists for the bill.

Fuente: Just Before Passing Surveillance Expansion, Lawmakers Partied With Pro-CISA Lobbyists


StanChart recruits former GCHQ director to tackle financial crime – FT.com

StanChart recruits former GCHQ director to tackle financial crime – FT.com.

 

In this image taken from TV, Iain Lobban director of electronic surveillance agency GCHQ gives evidence as the heads of Britain's intelligence agencies face UK lawmakers to give televised testimony for the first time in public, in London Thursday Nov. 7, 2013. The three spy agency leaders Andrew Parker head of Britain's domestic security agency MI5, John Sawers head of Britain's foreign spy service MI6 and Iain Lobban director of electronic surveillance agency GCHQ, are taking questions from Parliament's Intelligence and Security Committee, questioned on the work of their agencies, their current priorities and threats to the U.K., but not on ongoing operations.(AP Photo / Parliamentary Recording Unit)©AP

The trend of former spies joining banks has continued with Standard Chartered’s appointment of Sir Iain Lobban, former director of GCHQ, to advise its board of directors on financial crime.

The emerging markets-focused bank, which has twice been fined by US regulators for compliance failures in recent years, said Sir Iain’s appointment was “part of the group’s strategic priority of combating financial crime and continuing to invest in its conduct and compliance capabilities”.

Two years ago HSBC hired Lord Evans, former director of MI5, the UK secret services agency, to join its board of directors and sit on its financial system vulnerabilities committee.Big banks are scrambling to improve their defences against cyber crime, especially after high profile attacks by hackers, such as last year’s theft of data on millions of customers at JPMorgan Chase.

Sir Iain was director of GCHQ, the UK state communications monitoring agency, from 2008 until he stepped down last year. He was forced to defend the Cheltenham-based agency from international criticism over its extensive online eavesdropping activities that were revealed by leaks from former US intelligence worker Edward Snowden.

 


How Big Business Is Helping Expand NSA Surveillance, Snowden Be Damned – The Intercept

How Big Business Is Helping Expand NSA Surveillance, Snowden Be Damned – The Intercept.

Featured photo - How Big Business Is Helping Expand NSA Surveillance, Snowden Be Damned

Since November 11, 2011, with the introduction of the Cyber Intelligence Sharing and Protection Act, American spy agencies have been pushing laws to encourage corporations to share more customer information. They repeatedly failed, thanks in part to NSA contractor Edward Snowden’s revelations of mass government surveillance. Then came Republican victories in last year’s midterm Congressional elections and a major push by corporate interests in favor of the legislation.

Today, the bill is back, largely unchanged, and if congressional insiders and the bill’s sponsors are to believed, the legislation could end up on President Obama’s desk as soon as this month. In another boon to the legislation, Obama is expected to reverse his past opposition and sign it, albeit in an amended and renamed form (CISPA is now CISA, the “Cybersecurity Information Sharing Act”). The reversal comes in the wake of high-profile hacks on JPMorgan Chase and Sony Pictures Entertainment. The bill has also benefitted greatly from lobbying by big business, which sees it as a way to cut costs and to shift some anti-hacking defenses onto the government.

For all its appeal to corporations, CISA represents a major new privacy threat to individual citizens. It lays the groundwork for corporations to feed massive amounts of communications to private consortiums and the federal government, a scale of cooperation even greater than that revealed by Snowden. The law also breaks new ground in suppressing pushback against privacy invasions; in exchange for channeling data to the government, businesses are granted broad legal immunity from privacy lawsuits — potentially leaving consumers without protection if companies break privacy promises that would otherwise keep information out of the hands of authorities.

Ostensibly, CISA is supposed to help businesses guard against cyberattacks by sharing information on threats with one another and with the government. Attempts must be made to filter personal information out of the pool of data that is shared. But the legislation — at least as marked up by the Senate Intelligence Committee — provides an expansive definition of what can be construed as a cybersecurity threat, including any information for responding to or mitigating “an imminent threat of death, serious bodily harm, or serious economic harm,” or information that is potentially related to threats relating to weapons of mass destruction, threats to minors, identity theft, espionage, protection of trade secrets, and other possible offenses. Asked at a hearing in February how quickly such information could be shared with the FBI, CIA, or NSA, Deputy Undersecretary for Cybersecurity Phyllis Schneck replied, “fractions of a second.”

Questions persist on how to more narrowly define a cybersecurity threat, what type of personal data is shared, and which government agencies would retain and store this data. Sen. Ron Wyden, D-Ore., who cast the lone dissenting vote against CISA on the Senate Intelligence Committee, declared the legislation “a surveillance bill by another name.” Privacy advocates agree. “The lack of use limitations creates yet another loophole for law enforcement to conduct backdoor searches on Americans,” argues aletter sent by a coalition of privacy organizations, including Free Press Action Fund and New America’s Open Technology Institute. Critics also argue that CISA would not have prevented the recent spate of high-profile hacking incidents. As the Electronic Frontier Foundation’s Mark Jaycox noted in a blog post, the JPMorgan hack occurred because of an “un-updated server” and prevailing evidence about the Sony breach is “increasingly pointing to an inside job.”

But the intelligence community and corporate America have this year unified behind the bill. For a look into the breadth of the corporate advocacy campaign to pass CISA, see this letter cosigned by many of the most powerful corporate interests in America and sent to legislators earlier this year. Or another letter, reported in the Wall Street Journal, signed by “general counsels of more than 30 different firms, including 3M and Lockheed Martin Corp.”


PGP creator Phil Zimmermann: 'Intelligence agencies have never had it so good' | Technology | The Guardian

PGP creator Phil Zimmermann: ‘Intelligence agencies have never had it so good’ | Technology | The Guardian.

Phil Zimmermann: 'End-to-end encryption is everywhere now: in browsers, online banking...'

 Phil Zimmermann: ‘End-to-end encryption is everywhere now: in browsers, online banking…’

The recent hack against Sony Pictures is likely to have made companies of all sizes consider upping their cybersecurity measures. Perhaps, though, it’s also a different kind of wake-up call: a reason to think less about security, and more about privacy.

That’s the belief of Phil Zimmermann – the creator of email encryption software Pretty Good Privacy (PGP), and now president and co-founder of secure communications company Silent Circle – initially expressed in a blog post, and expanded on in an interview with the Guardian.

“Sony had all kinds of things: intrusion detection, firewalls, antivirus … But they got hacked anyway. The security measures that enterprises do frequently get breached. People break in anyway: they overcome them,” says Zimmermann.

“A lot of this stuff could have been encrypted. If those emails had been encrypted with PGP or GnuPG, the hackers wouldn’t have gotten very far. Those movie scripts that they stole? They could have been encrypted too.”

Zimmermann hopes that companies will look at what happened to Sony, and use it as a spur to explore encryption as a way to protect their employees’ privacy, rather than ramping up their spending on security measures to protect their data.

“People don’t think of privacy much when they think about enterprises, but enterprise privacy is a real thing: it’s the collective privacy of everybody in the company, and the privacy of the company assets as well,” he says.

“In Sony’s case, there were emails about Hollywood actresses that got breached. That’s connected with personal privacy. I think companies retain too much information.”

If more businesses shift their thinking from security to privacy, it’ll be good news for Silent Circle, which offers technology for encrypted voice calls, video chat and messaging, as well as being a key part of the privacy-focused Blackphonesmartphone.


Sony Hack: Clooney Says Movie is about Snowden, Not Journalism – The Intercept

Sony Hack: Clooney Says Movie is about Snowden, Not Journalism – The Intercept.

BY NATASHA VARGAS-COOPER 

Featured photo - Sony Hack: Clooney Says Movie is about Snowden, Not Journalism

As curious journalists, tabloid writers, and Hollywood watchers pore over the massive trove of hacked Sony data, the public is being given a rare glimpse into the complicated world of Hollywood and politics. Tucked between bitchy emails about Angelina Jolie and snarky comments on Will Smith’s family are details of a chummy relationship between Sony executives and the CIA, as well as rare insight into how Hollywood views potential movies about NSA whistleblower Edward Snowden.

Sony’s plan to make a Snowden movie got rolling in January 2014, when Elizabeth Cantillon, then an executive producer at Sony, sentcompany Co-Chairman Amy Pascal an email saying she had successfully closed on the rights to the book, “No Place to Hide,” by The Intercept‘s founding editor, Glenn Greenwald.  “[Y]ou will be my Oscar date,” Cantillon promised Pascal.

In March of 2014, Sony officially optioned the rights to Greenwald’s book, which chronicles how he broke the Snowden story, and moved forward with plans for a movie.


Entrevista a Julian Assange, fundador de Wikileaks: “Google nos espía e informa al Gobierno de Estados Unidos”

Entrevista a Julian Assange, fundador de Wikileaks: “Google nos espía e informa al Gobierno de Estados Unidos”.

Escrito por Ignacio Ramonet / Le Monde Diplomatique
Lunes, 01 de Diciembre de 2014 11:59

Desde hace treinta meses, Julian Assange, paladín de la lucha por una información libre, vive en Londres, refugiado en las oficinas de la Embajada de Ecuador. Este país latinoamericano tuvo el coraje de brindarle asilo diplomático cuando el fundador de WikiLeaks se hallaba perseguido y acosado por el Gobierno de Estados Unidos y varios de sus aliados (el Reino Unido, Suecia). El único crimen de Julian Assange es haber dicho la verdad y haber difundido, vía WikiLeaks, entre otras revelaciones, las siniestras realidades ocultas de las guerras de Irak y de Afganistán, y los tejemanejes e intrigas de la diplomacia estadounidense.

Como Edward Snowden, Chelsea Manning y Glenn Greenwald, Julian Assange forma parte de un nuevo grupo de disidentes que, por descubrir la verdad, son ahora rastreados, perseguidos y hostigados no por regímenes autoritarios sino por Estados que pretenden ser “democracias ejemplares”…

En su nuevo libro, Cuando Google encontró a WikiLeaks (Clave Intelectual, Madrid, 2014), cuya versión en español está en librerías desde el 1 de diciembre, Julian Assange va más lejos en sus revelaciones, estupendamente documentadas, como siempre. Todo parte de una larga conversación que Assange sostuvo, en junio de 2011, con Eric Schmidt, presidente ejecutivo de Google. Este vino a entrevistar al creador de WikiLeaks para un ensayo que estaba preparando sobre el futuro de la era digital. Cuando se publicó el libro, titulado The New Digital Era (2013), Assange constató que sus declaraciones habían sido tergiversadas y que las tesis defendidas por Schmidt eran considerablemente delirantes y megalomaníacas. El nuevo libro del fundador de WikiLeaks es su respuesta a esas elucubraciones del presidente de Google. Entre muchas otras cosas, Assange revela cómo Google –y Facebook, y Amazon, etc.– nos espía y nos vigila; y cómo transmite esa información a las agencias de inteligencia de Estados Unidos. Y cómo la empresa líder en tecnologías digitales tiene una estrecha relación, casi estructural, con el Departamento de Estado. Afirma también Assange, que hoy, las grandes empresas de la galaxia digital nos vigilan y nos controlan más que los propios Estados.

Cuando Google encontró a WikiLeaks es una obra inteligente, estimulante y necesaria. Una fiesta para el espíritu. Nos abre los ojos sobre nuestras propias prácticas de comunicación cotidianas cuando usamos un smartphone, una tablet, un ordenador o cuando navegamos simplemente por Internet con la candidez de quien se cree más libre que nunca. ¡Ojo! Nos explica Assange, como Pulgarcito, vas sembrando rastros de ti mismo y de tu vida privada que algunas empresas, como Google, recogen con sumo cuidado y archivan secretamente. Un día, las utilizarán contra ti…

Para conversar de todo esto y de algunas cosas más, nos encontramos con un Julian Assange entusiasta y fatigado, en Londres, el pasado 24 de octubre, en una pequeña sala acogedora de la Embajada de Ecuador. Llega sonriente y pálido, con una barba rubia de varios días, con su cabeza de ángel prerrafaelista, cabellos largos, rasgos finos, ojos claros… Es alto y delgado. Habla con voz muy baja y lenta. Lo que dice es profundo y pensado, le sale de muy adentro. Tiene un algo de gurú… Habíamos previsto charlar no más de media hora, para no cansarlo, pero con el paso del tiempo la conversación se fue poniendo interesante. Y finalmente hablamos más de dos horas y media…


Snowden leaks derail Oracle’s Hollywood dreams – FT.com

Snowden leaks derail Oracle’s Hollywood dreams – FT.com.

 

A still from the movie 'Jack Ryan: Shadow Recruit'©Larry Horricks/Paramount

A still from the movie ‘Jack Ryan: Shadow Recruit’

The fallout from Edward Snowden’s revelationsabout the National Security Agency has reached Hollywood after Oracle asked for its brand to be scrubbed from a new film about spies and espionage.

Oracle, the database software group, had originally paid to have its brand prominently featured in Jack Ryan: Shadow Recruit, which stars Chris Pine and Keira Knightley — just one of the many product placement deals that have become increasingly lucrative for Hollywood studios.

The request for its brand to be erased was made in the final stages of the film’s editing. Oracle declined to comment on why it asked to be taken out of the film, which was released in the US last month.