NYU Accidentally Exposed Military Code-breaking Computer Project to Entire Internet

The supercomputer described in the trove, “WindsorGreen,” was a system designed to excel at the sort of complex mathematics that underlies encryption, the technology that keeps data private, and almost certainly intended for use by the Defense Department’s signals intelligence wing, the National Security Agency. WindsorGreen was the successor to another password-cracking machine used by the NSA, “WindsorBlue,” which was also documented in the material leaked from NYU and which had been previously described in the Norwegian press thanks to a document provided by National Security Agency whistleblower Edward Snowden. Both systems were intended for use by the Pentagon and a select few other Western governments, including Canada and Norway.

Fuente: NYU Accidentally Exposed Military Code-breaking Computer Project to Entire Internet


Japan Made Secret Deals With the NSA That Expanded Global Surveillance

The documents, published Monday in collaboration with Japanese news broadcaster NHK, reveal the complicated relationship the NSA has maintained with Japan over a period of more than six decades. Japan has allowed NSA to maintain at least three bases on its territory and contributed more than half a billion dollars to help finance the NSA’s facilities and operations. In return, NSA has kitted out Japanese spies with powerful surveillance tools and shared intelligence with them. However, there is a duplicitous dimension to the partnership. While the NSA has maintained friendly ties with its Japanese counterparts and benefited from their financial generosity, at the same time it has secretly spied on Japanese officials and institutions.

Fuente: Japan Made Secret Deals With the NSA That Expanded Global Surveillance


Ciberguerra: cuando el arma más poderosa es un ejército de hackers

La ciberguerra ha dejado de ser una excentricidad reservada a actos aislados, a pequeñas cosas. Las nuevas tecnologías forman parte de los civiles y sus ejércitos. Y atacarlas se ha puesto a la par de la guerra convencional.

Fuente: Ciberguerra: cuando el arma más poderosa es un ejército de hackers


Wiretaps, data dumps and zero days: is digital privacy no longer possible? – video | World news | The Guardian

From Russian hacking to WikiLeaks, Edward Snowden and CIA cyber weapons, does digital surveillance mean the end of privacy?

Fuente: Wiretaps, data dumps and zero days: is digital privacy no longer possible? – video | World news | The Guardian


Apple Says It Fixed CIA Vulnerabilities Years Ago

Yesterday, WikiLeaks released its latest batch of pilfered CIA material, five documents describing malicious software for taking over Apple MacBooks and iPhones, and wrote in an accompanying post that “the CIA has been infecting the iPhone supply chain of its targets,” prompting concerned readers to wonder if their iPhone or MacBook had been infected on the factory floor. In a statement, Apple says that is almost certainly not the case.

Fuente: Apple Says It Fixed CIA Vulnerabilities Years Ago


Malware Attacks Used by the U.S. Government Retain Potency for Many Years, New Evidence Indicates

A new report from Rand Corp. may help shed light on the government’s arsenal of malicious software, including the size of its stockpile of so-called “zero days” — hacks that hit undisclosed vulnerabilities in computers, smartphones, and other digital devices.The report also provides evidence that such vulnerabilities are long lasting. The findings are of particular interest because not much is known about the U.S. government’s controversial use of zero days.

Fuente: Malware Attacks Used by the U.S. Government Retain Potency for Many Years, New Evidence Indicates


La ciudad vigilada | The Santiago Times

Los alcaldes de las comunas acomodadas del sector oriente de Santiago han liderado una iniciativa por sumar tecnología de vigilancia a las medidas para reducir la delincuencia. Esta tendencia fue estrenada por las comunas de Lo Barnechea y Las Condes a mediados del año 2015, al instalar tres globos de video vigilancia de naturaleza militar en sus comunas. Luego de las elecciones municipales de 2016, el alcalde Felipe Alessandri anunció que un globo de similares características sería instalado en la comuna de Santiago, cuya implementación sigue pendiente. Este año el debate ha vuelto a la palestra pública luego del anuncio de las municipalidades de Las Condes y Providencia, quienes pretenden utilizar drones a control remoto equipados cámaras de alta resolución para vigilar los parques y calles de sus comunas para reducir la tasa de criminalidad.

Fuente: La ciudad vigilada | The Santiago Times


Estonia, la diminuta república báltica que pasó de ser un satélite soviético a convertirse en la meca tecnológica de Europa – El Mostrador

Conocida como el “Silicon Valley europeo”, Estonia fue el primer país del mundo en instaurar el voto por internet en unas elecciones generales. Y esa es sólo una de las razones por las que es considerada una de las sociedades digitales más avanzadas del planeta.

Fuente: Estonia, la diminuta república báltica que pasó de ser un satélite soviético a convertirse en la meca tecnológica de Europa – El Mostrador


The U.S. Government Thinks Thousands of Russian Hackers May Be Reading My Blog. They Aren’t.

It’s plausible, and in my opinion likely, that hackers under orders from the Russian government were responsible for the DNC and Podesta hacks in order to influence the U.S. election in favor of Donald Trump. But the Grizzly Steppe report fails to adequately back up this claim. My research, for example, shows that much of the evidence presented is evidence of nothing at all.

Fuente: The U.S. Government Thinks Thousands of Russian Hackers May Be Reading My Blog. They Aren’t.


Top-Secret Snowden Document Reveals What the NSA Knew About Previous Russian Hacking

Now, a never-before-published top-secret document provided by whistleblower Edward Snowden suggests the NSA has a way of collecting evidence of Russian hacks, because the agency tracked a similar hack before in the case of a prominent Russian journalist, who was also a U.S. citizen.

Fuente: Top-Secret Snowden Document Reveals What the NSA Knew About Previous Russian Hacking


A Macri se le tildó el voto electrónico | Página12 | La otra mirada

Los senadores del bloque del Partido Justicialista-Frente para la Victoria decidieron no respaldar la reforma electoral impulsada por el Gobierno, que había sido incluida en el temario de la convocatoria a Sesiones Extraordinarias. La decisión fue acordada con los gobernadores peronistas tras una reunión en el Congreso.

Fuente: A Macri se le tildó el voto electrónico | Página12 | La otra mirada


With authoritarianism and state surveillance on the rise, how can civil society be protected from digital threats?

Policymakers have given a great deal of attention to the cyber security of governments, critical infrastructure, military targets and commercial enterprises. But civil society groups are also under threat, including human rights defenders, environmental activists, political watchdogs, and other groups promoting the rule of law and democracy.What can be done about these digital threats to civil society around the world?

Fuente: With authoritarianism and state surveillance on the rise, how can civil society be protected from digital threats?


A Macri se le tildó el voto electrónico | Página12 | La otra mirada

“Se recogieron las objeciones que los expertos informáticos presentaron en las reuniones de Comisión en cuanto a la alta vulnerabilidad de algunos de los métodos electrónicos propuestos, lo cual determina la imposibilidad del apoyo al proyecto tal cual fue aprobado por la Cámara de Diputados”, sentenciaron los senadores en un comunicado para justificar su rechazo.

Fuente: A Macri se le tildó el voto electrónico | Página12 | La otra mirada


Los peligros del voto electrónico | Derechos Digitales

El voto electrónico presenta serias vulnerabilidades que afectan directamente derechos como la privacidad, la seguridad o la protección de datos personales. El software utilizado durante las votaciones almacena datos de los y las votantes, que podrían ser usados para identificarles.

Fuente: Los peligros del voto electrónico | Derechos Digitales


Las 25 noticias más censuradas 2015-2016 (04): ¿Cómo controlar las máquinas electrónicas de votación? | Resumen

Desde los algoritmos de motor de búsqueda (search engine) a las máquinas electrónica de votación, la tecnología ofrece oportunidades para la manipulación de votantes y de los sufragios de maneras que podrían afectar profundamente los resultados de una elección.

Fuente: Las 25 noticias más censuradas 2015-2016 (04): ¿Cómo controlar las máquinas electrónicas de votación? | Resumen


New York’s New Digital Crime Lab Is a Forensic Marvel

In an exclusive tour of the new lab, Fortune got a glimpse of Law & Order in the digital age. The lab is Exhibit A in how America’s biggest city is embracing big data analytics and a dash of hacker culture to solve complex crimes. It also raises hard questions about how to balance these sophisticated crime-fighting tools with civil liberties.

Fuente: New York’s New Digital Crime Lab Is a Forensic Marvel


Organizaciones Latinas preocupadas por reforma electoral argentina

Las abajo firmantes, organizaciones dedicadas a la defensa de los derechos humanos y civiles en entornos tecnológicos, expresamos nuestra profunda preocupación por el proyecto de ley argentino para la incorporación de tecnologías informáticas en la emisión del voto.Seguidamente, detallaremos tres puntos clave del proyecto aprobado en la Cámara de Diputados Argentina que tendrían un impacto negativo en los derechos fundamentales de los ciudadanos.

Fuente: Organizaciones Latinas preocupadas por reforma electoral argentina


When the FBI Has a Phone It Can’t Crack, It Calls These Israeli Hackers

just as Apple has come to be seen as a warrior for digital protection and privacy against overreaching government surveillance, Cellebrite is emerging as its law-and-order counterpart, endeavoring to build tools to break through the barriers Apple and other phone makers erect to protect data.

Fuente: When the FBI Has a Phone It Can’t Crack, It Calls These Israeli Hackers


How old do you look? I wouldn’t ask the internet | Tim Dowling | Opinion | The Guardian

The how-old.net website – which uses photos to judge your age – didn’t work for me. For women and refugees, of course, there’s the Daily Mail

Fuente: How old do you look? I wouldn’t ask the internet | Tim Dowling | Opinion | The Guardian


Hillary Clinton’s Encryption Proposal Was “Impossible,” Said Top Adviser

Hillary Clinton’s advisers recognized that her policy position on encryption was problematic, with one writing that it was tantamount to insisting that there was “‘some way’ to do the impossible.”Instead, according to campaign emails released by Wikileaks, they suggested that the campaign signal its willingness to use “malware” or “super code breaking by the NSA” to get around encryption.

Fuente: Hillary Clinton’s Encryption Proposal Was “Impossible,” Said Top Adviser


Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email

Contrary to a denial by Yahoo and a report by the New York Times, the company’s scanning program, revealed earlier this week by Reuters, provided the government with a custom-built back door into the company’s mail service — and it was so sloppily installed that it posed a privacy hazard for hundreds of millions of users, according to a former Yahoo employee with knowledge of the company’s security practices.

Fuente: Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email


“Un Estado democrático debería garantizar el voto secreto” » Noticias Urbanas

A un año de las elecciones legislativas, y a tres meses de que pueda legalizarse el voto electrónico en todo el país, Noticias Urbanas consultó a expertos informáticos para conocer más sobre la BUE.

Fuente: “Un Estado democrático debería garantizar el voto secreto” » Noticias Urbanas


Long-Secret Stingray Manuals Detail How Police Can Spy on Phones

Harris Corp.’s Stingray surveillance device has been one of the most closely-guarded secrets in law enforcement for more than 15 years. The company and its police clients across the United States have fought to keep information about the mobile-phone-monitoring boxes from the public against which they are used. The Intercept has obtained several Harris instruction manuals spanning roughly 200 pages and meticulously detailing how to create a cellular surveillance dragnet.

Fuente: Long-Secret Stingray Manuals Detail How Police Can Spy on Phones


The NSA’s British Base at the Heart of U.S. Targeted Killing

in the heart of the tranquil English countryside, is the National Security Agency’s largest overseas spying base. Originally used to monitor Soviet communications through the Cold War, its focus has since dramatically shifted, and today it is a vital part of the NSA’s sprawling global surveillance network.

Fuente: The NSA’s British Base at the Heart of U.S. Targeted Killing


Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas

Un grupo de hackers vinculado a la Agencia de Seguridad Nacional de los Estados Unidos, mejor conocida como la NSA (National Security Agency), ha sido hackeado recientemente y sus herramientas de espionaje, recolección de información, malware y más, han sido puestas en venta por 1 millón de bitcoins (más de 550 millones de dólares al momento de la publicación).

Fuente: Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas


¿Son estas las armas de espionaje de la NSA? | Derechos Digitales

Un grupo de hackers dice haber obtenido información confidencial de Equation Group, un conocido y sofisticado grupo de ciber atacantes ligado a la NSA. Parte de la información publicada permite por primera vez echar un vistazo a las herramientas utilizadas por la agencia de seguridad estadounidense.

Fuente: ¿Son estas las armas de espionaje de la NSA? | Derechos Digitales


Israeli firm accused of creating iPhone spyware | World news | The Guardian

An Israeli technology company has been accused of creating and supplying an aggressive interception program capable of taking over Apple’s iPhones and turning them into remote spying devices, after it was allegedly used to target a Middle Eastern human rights activist and others.

Fuente: Israeli firm accused of creating iPhone spyware | World news | The Guardian


Bulk data collection vital to prevent terrorism in UK, report finds | World news | The Guardian

The bulk collection of personal data by British spy agencies is vital in preventing terrorist attacks, an independent review of draft security legislation has found.David Anderson QC, the independent reviewer of terrorism legislation, concluded that laws giving MI5, MI6 and GCHQ the right to gather large volumes of data from members of the public had a “clear operational purpose”.

Fuente: Bulk data collection vital to prevent terrorism in UK, report finds | World news | The Guardian


FBI’s Secret Surveillance Tech Budget Is ‘Hundreds of Millions’

The FBI has “hundreds of millions of dollars” to spend on developing technology for use in both national security and domestic law enforcement investigations — but it won’t reveal the exact amount.

Fuente: FBI’s Secret Surveillance Tech Budget Is ‘Hundreds of Millions’


Take that, FBI: Apple goes all in on encryption | Technology | The Guardian

The new feature is just the latest move towards more widespread encryption in consumer technology products following Apple’s standoff with the FBI earlier in 2016, in which it refused to help the agency weaken its own security processes to access information on an iPhone belonging to a terrorist. Facebook and Google both pledged support for Apple during the fight, and both are subsequently reported to be planning encrypted versions of their messaging apps.

Fuente: Take that, FBI: Apple goes all in on encryption | Technology | The Guardian


Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure

A secret report warned that British spies may have put lives at risk because their surveillance systems were sweeping up more data than could be analyzed, leading them to miss clues to possible security threats.

Fuente: Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure


‘Crypto Wars’ timeline: A history of the new encryption debate

Encryption is finally mainstream.Government officials and technologists have been debating since the early 1990s whether to limit the strength of encryption to help the law-enforcement and intelligence communities monitor suspects’ communications. But until early 2016, this was a mostly esoteric fight, relegated to academic conferences, security agencies’ C-suites, and the back rooms of Capitol Hill.Everything changed in mid-February, when President Barack Obama’s Justice Department, investigating the terrorists who carried out the San Bernardino, California, shooting, asked a federal judge to force Apple to help the Federal Bureau of Investigation unlock one attacker’s iPhone.What followed was an unexpectedly rancorous and unprecedentedly public fight over how far the government should go to pierce and degrade commercial security technology in its quest to protect Americans from terrorism.

Fuente: ‘Crypto Wars’ timeline: A history of the new encryption debate


With Facebook No Longer a Secret Weapon, Egypt’s Protesters Turn to Signal

Although the police in Cairo sealed off parts of the Egyptian capital where protests scheduled on Facebook were to have taken place on Monday, opposition activists managed to stage brief rallies that resembled flash mobs, calling for an end to military rule and the cancellation of a deal to surrender two islands to Saudi Arabia.The fact that Facebook is now so closely monitored by the security forces prompted one leading activist to offer an online tutorial in how to use a new tool, the encrypted messaging app Signal, to help protesters find each other on the city’s streets, and stay one step ahead of the authorities.

Fuente: With Facebook No Longer a Secret Weapon, Egypt’s Protesters Turn to Signal


Russia’s chief internet censor enlists China’s know-how — FT.com

For an authoritarian government looking to tighten control of an unruly internet, who better to call than the architect of China’s “great firewall”? That was the thinking of Konstantin Malofeev, a multimillionaire with close links to the Kremlin and Russian Orthodox Church, who has become a key player in Moscow’s drive to tame the web and limit America’s digital influence.

Fuente: Russia’s chief internet censor enlists China’s know-how — FT.com


El imperio ‘Ilegal’ de Hacking Team en América Latina | Motherboard

A principios de Abril de 2014, un espía del servicio de inteligencia de Ecuador mandó una serie de correos electrónicos al servicio al cliente de Hacking Team, una compañía italiana de hackers pagados que trabaja con agencias gubernamentales alrededor del mundo.

Fuente: El imperio ‘Ilegal’ de Hacking Team en América Latina | Motherboard


El auge del software de vigilancia en América Latina – Derechos Digitales

El software de Hacking Team es contrario a los estándares legales y violatorio de los derechos a la privacidad, a la libertad de expresión y al debido proceso.

Fuente: El auge del software de vigilancia en América Latina – Derechos Digitales


La crisis del voto electrónico en Perú | Hiperderecho

La problemática institucional entorno al voto electrónico continúa. Desde su lanzamiento, la Oficina Nacional de Procesos Electorales (ONPE) no ha podido defenderlo con fundamentos sólidos: le han cuestionado la falta de auditorías públicas, como también que muchos electores no sabían ni siquiera que iban a votar mediante este sistema. En consecuencia, esta semana (a días de los comicios) la ONPE ha emitido una nota de prensa donde informa la reducción de los distritos que votarán con el cuestionado sistema. Esta medida, en parte acertada, demuestra demasiada improvisación a pocos días de practicar el acto principal de la vida democrática de nuestro país.

Fuente: La crisis del voto electrónico en Perú | Hiperderecho


San Bernardino iPhone: US ends Apple case after accessing data without assistance | Technology | The Guardian

With the court filing, Silicon Valley and Washington are poised to return to a cold war over the balance between privacy and law enforcement in the age of apps

Fuente: San Bernardino iPhone: US ends Apple case after accessing data without assistance | Technology | The Guardian


Government keeping its method to crack San Bernardino iPhone ‘classified’ | Technology | The Guardian

Revealed: After postponing a court hearing with Apple, the FBI is testing a new technique which Apple says they will pressure government to reveal

Fuente: Government keeping its method to crack San Bernardino iPhone ‘classified’ | Technology | The Guardian


Facebook, Google and WhatsApp plan to increase encryption of user data | Technology | The Guardian

Spurred on by Apple’s battles against the FBI, some of tech’s biggest names are to expand encryption of user data in their services, the Guardian can reveal

Fuente: Facebook, Google and WhatsApp plan to increase encryption of user data | Technology | The Guardian


Paraguay y Uruguay en polémica por adquirir software espía

Paraguay y Uruguay están inmersos en la polémica tras haber adquirido distintos software avanzados para intervenir comunicaciones como parte de su estrategia nacional de seguridad, un tema que se debate entre la defensa de la privacidad de los ciudadanos y las tácticas para identificar a posibles cibercriminales. Lo anterior pone en duda ¿hasta dónde es válida la vigilancia de comunicaciones privadas por parte de los Estados?

Fuente: Paraguay y Uruguay en polémica por adquirir software espía


Apple’s FBI Battle Is Complicated. Here’s What’s Really Going On | WIRED

The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and also generated some misinformation.  In the interest of clarifying the facts and correcting some misinformation, we’ve pulled together a summary of the issues at hand.

Fuente: Apple’s FBI Battle Is Complicated. Here’s What’s Really Going On | WIRED


We cannot trust our government, so we must trust the technology | US news | The Guardian

Apple’s battle with the FBI is not about privacy v security, but a conflict created by the US failure to legitimately oversee its security service post Snowden

Fuente: We cannot trust our government, so we must trust the technology | US news | The Guardian


Apple to beef up customers’ iCloud encryption – FT.com

Apple is working on new ways to strengthen the encryption of customers’ iCloud backups in a way that would make it impossible for the company to comply with valid requests for data from law enforcement, according to people familiar with its plans.

Fuente: Apple to beef up customers’ iCloud encryption – FT.com


¿Cuáles son las consecuencias de que el gobierno bloquee a Uber? | Noticias Uruguay y el Mundo actualizadas – Diario EL PAIS Uruguay

Además de que no es muy efectivo, que el gobierno uruguayo decida bloquear una aplicación puede tener consecuencias que van mucho más allá de Uber y su uso. Puede afectar la neutralidad de internet y crear un peligroso antecedente.

Fuente: ¿Cuáles son las consecuencias de que el gobierno bloquee a Uber? | Noticias Uruguay y el Mundo actualizadas – Diario EL PAIS Uruguay


FireEye bulks up for ‘cyber arms race’ – FT.com

FireEye, a cyber security company, has bought threat intelligence start-up iSight Partners, as it seeks to compliment its machine learning with data gathered by humans who watch hackers in the darkest corners of the internet. With the acquisition,

Fuente: FireEye bulks up for ‘cyber arms race’ – FT.com