Nancy Pelosi urges FBI director to debunk Donald Trump’s wiretap claim | US news | The Guardian

“Theoretically, do I think that a director of the FBI who knows for a fact that something is a mythology but is misleading to the American people … should set the record straight? Yes, I do think he should say that, publicly,” Pelosi said

Fuente: Nancy Pelosi urges FBI director to debunk Donald Trump’s wiretap claim | US news | The Guardian


FBI Says Edward Snowden Is Reason Companies Are Resisting Handing Over Phone Records

Companies became more resistant to the FBI’s collection of their customers’ information following revelations by former NSA contractor Edward Snowden, according to an inspector general report released Thursday.

Fuente: FBI Says Edward Snowden Is Reason Companies Are Resisting Handing Over Phone Records


Long-Secret Stingray Manuals Detail How Police Can Spy on Phones

Harris Corp.’s Stingray surveillance device has been one of the most closely-guarded secrets in law enforcement for more than 15 years. The company and its police clients across the United States have fought to keep information about the mobile-phone-monitoring boxes from the public against which they are used. The Intercept has obtained several Harris instruction manuals spanning roughly 200 pages and meticulously detailing how to create a cellular surveillance dragnet.

Fuente: Long-Secret Stingray Manuals Detail How Police Can Spy on Phones


Silicon Valley empuja a América Latina | Tecnología | EL PAÍS

Silicon Valley empuja a América Latina | Tecnología | EL PAÍS.

Emprendedores del programa Start-Up Chile.

Un disco duro, un DVD o un pendrive, es todo lo que necesita un cubano para guardar taquilleras películas, populares series de televisión norteamericanas, documentales o telenovelas mexicanas del Paquete Semanal, un compendio de entretenimiento audiovisual clandestino que cuesta unos dos dólares y que mantiene al día con las novedades televisivas extranjeras a los habitantes de la isla. Este paquete es la ventana a Hollywood para miles de cubanos que aún no pueden contratar el servicio de Netflix, pese a que la empresa de televisión en streaming desembarcó el pasado mes de febrero en Cuba y con ello se convirtió en una de las primeras compañías tecnológicas de Silicon Valley en llegar a la isla tras eldesbloqueo económico de EEUU. De momento, “para un cubano es muy difícil contratar Netflix por la escasa conectividad a Internet y porque tampoco usamos mucho tarjetas de crédito o débito, y ocho dólares al mes es dinero para nuestro bolsillo”, cuenta Dariela Aquiqui, bloguera y periodista cubana para el Diario de Cuba y Havana Times. “Tan solo los extranjeros residentes en la isla o los familiares de cubano-americanos disfrutan del servicio”, agrega. Sin embargo Netflix no tiene prisa, su apuesta es de largo plazo. El servicio íntegro de Internet llegará a la isla. Así como llegó fuertemente a América Latina revolucionando el uso de tecnologías.

La siguiente gran compañía tecnológica saldrá de algún país latino, por las necesidades de la población

Luis Samra, director de Evernote para América Latina

Por ello es que empresas creadas en Silicon Valley apuestan por una región joven y emergente, con fuerte penetración en el uso de smartphones.


ARGENPRESS.info – Prensa argentina para todo el mundo: Espionaje de Estados Unidos: El cuento de nunca acabar

ARGENPRESS.info – Prensa argentina para todo el mundo: Espionaje de Estados Unidos: El cuento de nunca acabar.

lunes, 2 de marzo de 2015

Carmen Esquivel (PL)

Cuando aún está fresco en la memoria el escándalo por el espionaje masivo contra ciudadanos, instituciones y hasta dignatarios europeos, el tema vuelve a la palestra al revelarse ahora que otros objetivos estuvieron en la mira de los servicios de inteligencia estadounidenses.

El nuevo blanco de los ataques es la compañía holandesa Gemalto, primera de su tipo en el mundo en la fabricación de tarjetas SIM (Subscriber Identity Module), en español Módulo de Identificación de Abonados, usada en teléfonos celulares y módems.

Para dar una idea de la magnitud de lo que esto significa baste señalar que la firma produce cerca de dos mil millones de estos dispositivos al año para 450 empresas de telecomunicaciones, entre ellas T-Mobile, Vodafone, Orange, Verizon y Sprint.

Gemalto trabaja, además, con unas tres mil instituciones financieras porque elabora chips para tarjetas de crédito.

De acuerdo con documentos filtrados recientemente por Edward Snowden, ex analista de la Agencia Nacional de Seguridad (NSA, por sus siglas en inglés), las inteligencias estadounidense y británica lograron apropiarse de las claves de la compañía, lo cual les abrió las puertas a los celulares de medio mundo.

La NSA y el Cuartel General de Comunicaciones del gobierno de Gran Bretaña (GCHQ) obtuvieron las llaves al acceder a los servidores centrales de Gemalto, valiéndose de información privada de algunos ingenieros, fabricantes de tarjetas y proveedores.

De esta manera pudieron espiar las llamadas, mensajes y correos electrónicos de una persona o empresa sin necesidad de pasar por una operadora o de obtener una orden judicial y, lo más alarmante, sin dejar ningún tipo de rastro.

“Es imposible saber cuántos códigos robaron la NSA y el GCHQ, pero si nos basamos en hipótesis modestas, el número es impresionante”, afirmó el sitio digital The Intercept, que filtró la información.


Gemalto Doesn't Know What It Doesn't Know – The Intercept

Gemalto Doesn’t Know What It Doesn’t Know – The Intercept.

Featured photo - Gemalto Doesn’t Know What It Doesn’t Know

Gemalto CEO Olivier Piou shows a cellphone SIM card before a press conference on February 25, 2015 in Paris.

Gemalto, the French-Dutch digital security giant, confirmed that it believes American and British spies were behind a “particularly sophisticated intrusion” of its internal computer networks, as reported by The Intercept last week.

This morning, the company tried to downplay the significance of NSA and GCHQ efforts against its mobile phone encryption keys — and, in the process, made erroneous statements about cellphone technology and sweeping claims about its own security that experts describe as highly questionable.

Gemalto, which is the largest manufacturer of SIM cards in the world, launched an internal investigation after The Intercept six days ago revealed that the NSA and its British counterpart GCHQ hacked the company and cyberstalked its employees. In the secret documents, provided by NSA whistleblower Edward Snowden, the intelligence agencies described a successful effort to obtain secret encryption keys used to protect hundreds of millions of mobile devices across the globe.

The company was eager to address the claims that its systems and encryption keys had been massively compromised. At one point in stock trading after publication of the report, Gemalto suffered a half billion dollar hit to its market capitalization. The stock only partially recovered in the following days.

After the brief investigation, Gemalto now says that the NSA and GCHQ operations in 2010-2011 would not allow the intelligence agencies to spy on 3G and 4G networks, and that theft would have been rare after 2010, when it deployed a “secure transfer system.” The company also said the spy agency hacks only affected “the outer parts of our networks — our office networks — which are in contact with the outside world.”

Security experts and cryptography specialists immediately challenged Gemalto’s claim to have done a “thorough” investigation into the state-sponsored attack in just six days, saying the company was greatly underestimating the abilities of the NSA and GCHQ to penetrate its systems without leaving detectable traces.

“Gemalto learned about this five-year-old hack by GCHQ when the The Intercept called them up for a comment last week. That doesn’t sound like they’re on top of things, and it certainly suggests they don’t have the in-house capability to detect and thwart sophisticated state-sponsored attacks,” says Christopher Soghoian, the chief technologist at the American Civil Liberties Union. He adds that Gemalto remains “a high-profile target for intelligence agencies.”

Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute, said, “This is an investigation that seems mainly designed to produce positive statements. It is not an investigation at all.”


Internet Activism Worked Today. Here’s How to Keep the Momentum Going | Opinion | WIRED

Internet Activism Worked Today. Here’s How to Keep the Momentum Going | Opinion | WIRED.

  • BY KYLE WIENS AND SINA KHANIFAR
  • 5:53 PM  |
  • PERMALINK
revolt-inline

 Getty

A year and a half ago, the Internet did something it likes to do: It got outraged. A man in Washington made a bad decision that screwed over thousands of small businesses and hundreds of thousands more consumers. He made it illegal for Americans to “unlock” their cell phones and move them to a different carrier. We cried foul, and 114,000 netizens joined us in demanding that unlocking be re-legalized.

Normally, petition-signing is the flash in the pan of Internet activism. Once the signatures are collected, we all forget our anger and go back to watching cat videos. But this time was different. A bill that the Internet demanded 17 months ago made it out of committee today and is now on its way to a Senate vote.

Kyle Wiens & Sina Khanifar

Kyle Wiens is the co-founder and CEO of iFixit (launched out of his Cal Poly college dorm room a decade ago). 

Sina Khanifar is the founder oftaskforce.is, a group of volunteer developers and designers working on technology policy issues. 

Believe it or not, there are people in Congress listening to the Internet. We just have to get their attention—and, more importantly, we have to keep their attention long enough to effect real change. Last year, an Internet petition opened a door, and a few of us took advantage of that opening. Here’s how:


Is this the beginning of the end of the age of legal government spying? | Trevor Timm | Comment is free | theguardian.com

Is this the beginning of the end of the age of legal government spying? | Trevor Timm | Comment is free | theguardian.com.

The US supreme court’s new decision on cellphone searches could be a really big deal for the future of your privacy

banksy phone
We might not have to hand over so much of our data to the authorities with little to no oversight for too much longer. Photograph: Jules Annan / Barcroft Media

The US supreme court’s unanimous 9-0 opinion this week requiring police to get a warrant before searching your cellphone is arguably the most important legal privacy decision of the digital age. Its immediate impact will be felt by the more than 12m people who are arrested in America each year (many for minor, innocuous crimes), but the surprisingly tech-savvy opinion from Chief Justice John Roberts may also lead to far more protection than that.

Roberts’s analysis of the current state of the digital world in his Riley v Wurie opinion is was so thorough, and so sweeping, that I’d be willing to bet you won’t find many privacy and technology cases going forward thatdon’t cite this one.

From phone tracking to NSA snooping and beyond, here’s a look at the domino effect.


Supreme court endorses cellphone privacy rights in sweeping ruling | Law | theguardian.com

Supreme court endorses cellphone privacy rights in sweeping ruling | Law | theguardian.com.

Justices decide warrantless cellphone searches of people who have been arrested are not permitted under fourth amendment

 

 

Cellphone-related injuries sent three times as many people to emergency rooms in 2010 than in 2005.
Warrantless cellphone searches: unconstitutional. Photograph: Alamy

 

The US supreme court delivered a landmark endorsement of electronic privacy on Wednesday, ruling that police must obtain a warrant to search the contents of cellphones seized from people they have arrested.

All nine justices joined the ruling on a case hailed by civil liberties campaigners as a crucial test of the rights of individuals to be protected against intrusion into their ever-expanding digital lives.

The opinion of the court, delivered by chief justice John Roberts, recognised that many owners of modern cellphones “keep on their person a digital record of nearly every aspect of their lives”, which may disclose a uniquely large volume of personal information if searched.

“Modern cell phones are not just another technological convenience,” Roberts wrote. “With all they contain and all they may reveal, they hold for many Americans the privacies of life.

Reading his ruling from the bench, Roberts went on: “The fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the founders fought. Our answer to the question of what police must do before searching a cell phone seized incident to an arrest is accordingly simple – get a warrant.”


Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas – The Intercept

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas – The Intercept.

By , and 1
Featured photo - Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas Photo credit: Getty Images

The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas.

According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month.

SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.

All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere.

The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.

“The Bahamas is a stable democracy that shares democratic principles, personal freedoms, and rule of law with the United States,” the State Department concluded in a crime and safety report published last year. “There is little to no threat facing Americans from domestic (Bahamian) terrorism, war, or civil unrest.”

By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.

In addition, the program is a serious – and perhaps illegal – abuse of the access to international phone networks that other countries willingly grant the United States for legitimate law-enforcement surveillance. If the NSA is using the Drug Enforcement Administration’s relationship to the Bahamas as a cover for secretly recording the entire country’s mobile phone calls, it could imperil the longstanding tradition of international law enforcement cooperation that the United States enjoys with its allies.

“It’s surprising, the short-sightedness of the government,” says Michael German, a fellow at New York University’s Brennan Center for Justice who spent 16 years as an FBI agent conducting undercover investigations. “That they couldn’t see how exploiting a lawful mechanism to such a degree that you might lose that justifiable access – that’s where the intelligence community is acting in a way that harms its long-term interests, and clearly the long-term national security interests of the United States.”


Angela Merkel denied access to her NSA file | World news | theguardian.com

Angela Merkel denied access to her NSA file | World news | theguardian.com.

Frustration with US government rises over failure to clear up questions about surveillance of German chancellor’s phone
Angela Merkel, the German chancellor

Angela Merkel, the German chancellor. The US government’s refusal to allow Merkel access to her own NSA file contrasts with the ease with which Germans can see files relating to the activities of the Stasi. Photograph: Ronny Hartmann/AFP/Getty Images

The US government is refusing to grant Angela Merkel access to herNSA file or answer formal questions from Germany about its surveillance activities, raising the stakes before a crucial visit by the German chancellor to Washington.

Merkel will meet Barack Obama in three weeks, on her first visit to the US capital since documents leaked by whistleblower Edward Snowdenrevealed that the NSA had been monitoring her phone.

The face-to-face meeting between the two world leaders had been intended as an effort to publicly heal wounds after the controversy, but Germany remains frustrated by the White House’s refusal to come clean about its surveillance activities in the country.

In Germany, the aftermath of the Snowden revelations continues to be debated with vigour. On Wednesday, the head of a parliamentary inquiry into NSA surveillance resigned over a disagreement as to whether Snowden should be invited as a witness. Green and left politicians insist that the whistleblower should be invited to give testimony in person, but panel chairman Clemens Binninger, of Merkel’s Christian Democrats, was more sceptical, arguing that most of the key information was already out in the public realm.

Academics at Rostock University, meanwhile, have voted to award Edward Snowden an honorary doctorate. Members of the philosophy faculty said they wanted to reward Snowden’s “civil courage” and his “substantial contribution to a new global discourse about freedom, democracy, cosmopolitanism and the rights of the individual”.


ZumZuneo: Operación secreta en ciberguerra de EE.UU. contra Cuba estalla en los medios | SurySur

ZumZuneo: Operación secreta en ciberguerra de EE.UU. contra Cuba estalla en los medios | SurySur.

abr 4 2014

 

cuba ciberguerra-press

El mundo amaneció este 3 de abril con el escándalo, revelado por un reportaje de investigación de la agencia Associated Press, que reproducen las páginas digitales de numerosos periódicos estadounidenses, latinoamericanos y europeos y varios canales de televisión: Estados Unidos gastó ilegalmente más de un millón y medio de dólares en una red social llamada ZunZuneo para el “cambio de régimen” en Cuba, financiada por la Agencia de Estados Unidos para la Ayuda al Desarrollo (USAID).

 

Esta es una historia de guerra secreta que tiene de todo: Clandestinidad, ilegalidad, extraterritorialidad, humor y sobre todo fracaso.El gobierno de Estados Unidos se involucró así en una red de empresas fantasmas y  flujos financieros en paraísos ficales y violó sus propias leyes para esconder la trama que acaba de salir a la luz.

 

Con una investigación que abarca más de mil páginas de documentos y entrevistas a personas involucradas, varios elementos destacan en las revelaciones que seguramente tendrán consecuencias sobre la administración norteamericana del presidente Barack Obama.


NSA and GCHQ target 'leaky' phone apps like Angry Birds to scoop user data | World news | theguardian.com

NSA and GCHQ target ‘leaky’ phone apps like Angry Birds to scoop user data | World news | theguardian.com.

 

• US and UK spy agencies piggyback on commercial data
• Details can include age, location and sexual orientation
• Documents also reveal targeted tools against individual phones

 

Angry Birds
GCHQ documents use Angry Birds – reportedly downloaded more than 1.7bn times – as a case study for app data collection.

The National Security Agency and its UK counterpart GCHQ have been developing capabilities to take advantage of “leaky” smartphone apps, such as the wildly popular Angry Birds game, that transmit users’ private information across the internet, according to top secret documents.

The data pouring onto communication networks from the new generation of iPhone and Android apps ranges from phone model and screen size to personal details such as age, gender and location. Some apps, the documents state, can share users’ most sensitive information such as sexual orientation – and one app recorded in the material even sends specific sexual preferences such as whether or not the user may be a swinger.

Many smartphone owners will be unaware of the full extent this information is being shared across the internet, and even the most sophisticated would be unlikely to realise that all of it is available for the spy agencies to collect.

Dozens of classified documents, provided to the Guardian by whistleblower Edward Snowden and reported in partnership with the New York Times and ProPublica, detail the NSA and GCHQ efforts to piggyback on this commercial data collection for their own purposes.

Scooping up information the apps are sending about their users allows the agencies to collect large quantities of mobile phone data from their existing mass surveillance tools – such as cable taps, or from international mobile networks – rather than solely from hacking into individual mobile handsets.

Exploiting phone information and location is a high-priority effort for the intelligence agencies, as terrorists and other intelligence targets make substantial use of phones in planning and carrying out their activities, for example by using phones as triggering devices in conflict zones. The NSA has cumulatively spent more than $1bn in its phone targeting efforts.

The disclosures also reveal how much the shift towards smartphone browsing could benefit spy agencies’ collection efforts.

golden nugget
A May 2010 NSA slide on the agency’s ‘perfect scenario’ for obtaining data from mobile apps. Photograph: Guardian

One slide from a May 2010 NSA presentation on getting data from smartphones – breathlessly titled “Golden Nugget!” – sets out the agency’s “perfect scenario”: “Target uploading photo to a social media site taken with a mobile device. What can we get?”

The question is answered in the notes to the slide: from that event alone, the agency said it could obtain a “possible image”, email selector, phone, buddy lists, and “a host of other social working data as well as location”.


La NSA rastrea cada día cientos de millones de celulares en el mundo, dice el Washington Post | SurySur

La NSA rastrea cada día cientos de millones de celulares en el mundo, dice el Washington Post | SurySur.

dic 5 2013

,

 

La NSA rastrea cada día cientos de millones de celulares en el mundo, dice el Washington Post

internet centro operativo}

La Agencia de Seguridad Nacional de Estados Unidos recauda diariamente más de 5 mil millones de registros de ubicación de cientos de millones de celulares en el mundo que le permiten detectar redes de interrelaciones entre usuarios mediante un programa de espionaje mucho más grande en escala que los antes revelados en los documentos secretos filtrados por Edward Snowden, reporta hoy el diario The Washington Post.

 

Los registros nutren un banco de datos que almacena información sobre la ubicación de cientos de millones de aparatos, y con nuevos programas esto se convierte en una herramienta de vigilancia masiva, informa el rotativo con base en documentos filtrados por el ex contratista de la Agencia de Seguridad Nacional (NSA, por sus siglas en inglés) y entrevistas con funcionarios estadunidesnses.

 

Un funcionario de la agencia comentó al Post que están recibiendo vastos volúmenes de datos sobre la ubicación de celulares alrededor del mundo a través de intervenir los cables que vinculan a las redes móviles a escala mundial. Aunque la NSA no tiene el objetivo de espiar los datos de ubicación de estadunidenses, obtiene información de manera incidental. Además, reporta el Post, se reacaudan datos de celulares de las decenas de millones de estadunidenses que viajan al extranjero cada año.

 

En escala, dimensión e impacto potencial sobre la privacidad, los esfuerzos para recaudar y analizar datos de ubicación podrían ser insuperables entre los programas de vigilancia de la NSA que se han divulgado desde junio. Analistas pueden encontrar teléfonos celulares en cualquier parte del mundo, rastrear sus movimientos y revelar relaciones secretas entre los individuos que los usan, indica el Post.


NSA monitored calls of 35 world leaders after US official handed over contacts | World news | The Guardian

NSA monitored calls of 35 world leaders after US official handed over contacts | World news | The Guardian.

• Agency given more than 200 numbers by government official
• NSA encourages departments to share their ‘Rolodexes’
• Surveillance produced ‘little intelligence’, memo acknowledges

 

SID_460 View larger picture

The NSA memo suggests that such surveillance was not isolated as the agency routinely monitors world leaders. Photograph: Guardian

 

The National Security Agency monitored the phone conversations of 35 world leaders after being given the numbers by an official in another US government department, according to a classified document provided by whistleblower Edward Snowden.

The confidential memo reveals that the NSA encourages senior officials in its “customer” departments, such as the White House, State and the Pentagon, to share their “Rolodexes” so the agency can add the phone numbers of leading foreign politicians to their surveillance systems.

The document notes that one unnamed US official handed over 200 numbers, including those of the 35 world leaders, none of whom is named. These were immediately “tasked” for monitoring by the NSA.


Corea del Sur acusa a Obama de proteccionismo

http://tecnologia.elpais.com/tecnologia/2013/08/05/actualidad/1375691643_511131.html

Piden al presidente norteamericano que tome decisiones “justas y razonables”

El gobierno de Corea del Sur ha expresado hoy lunes su preocupación por la decisión de Estados Unidos de anular la prohibición de las ventas de algunos productos de Apple por infringir derechos industriales de Samsung.

La administración Obama vetó una reciente decisión de la oficina de comercio internacional de su país (ITC), prohibiendo la importación y venta de algunos iPhone antiguos y tabletas iPad, revirtiendo una decisión que había favorecido la surcoreana Samsung frente a Apple en su larga batalla sobre patentes. La medida fue criticada con vehemencia por los medios de comunicación de Corea del Sur como “proteccionismo”.


El peligro de ser espiado a través de tu propio celular

http://www.elmostrador.cl/vida-en-linea/2012/10/03/el-peligro-de-ser-espiado-a-traves-de-tu-propio-celular/

3 de Octubre de 2012

El programa toma fotos azarosa y subrepticiamente, que son filtradas y reconstruidas en un servidor que las convierte en imágenes 3D. No parece haber secretos para la aplicación, que se instala escondida con otras descargas.

por

No parece haber rincones ocultos para una nueva aplicación espía de teléfono móvil o celular, capaz de producir una imagen en 3D de cualquier lugar en que se ha encontrado, sin que su dueño se percate de ello.

El malware se llama PlaceRaider, y fue desarrollado por un equipo de la universidad de Indiana, con la colaboración el Naval Surface Warfare Centre de la Marina de Estados Unidos.