The so-called Shadow Brokers, who claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world, said they have a new suite of tools and vulnerabilities in newer software. The possible targets include Microsoft’s Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.
Fuente: Shadow Brokers threaten to unleash more hacking tools | Technology | The Guardian
The documents, published Monday in collaboration with Japanese news broadcaster NHK, reveal the complicated relationship the NSA has maintained with Japan over a period of more than six decades. Japan has allowed NSA to maintain at least three bases on its territory and contributed more than half a billion dollars to help finance the NSA’s facilities and operations. In return, NSA has kitted out Japanese spies with powerful surveillance tools and shared intelligence with them. However, there is a duplicitous dimension to the partnership. While the NSA has maintained friendly ties with its Japanese counterparts and benefited from their financial generosity, at the same time it has secretly spied on Japanese officials and institutions.
Fuente: Japan Made Secret Deals With the NSA That Expanded Global Surveillance
The story of Edward Snowden’s disclosure of NSA secrets to the press has been told and retold in books, films, and countless articles. Left unreported has been the quiet role of two journalists who literally had Snowden material mailed to them in a cardboard box.
Fuente: The Strangers Who Got Snowden’s Secrets in the Mail
A number of recent cases in the media have revealed instances of U.S. citizens and others being compelled by CBP agents to unlock their devices for search. In some instances, people have claimed to have been physically coerced into complying, including one American citizen who said that CBP agents grabbed him by the neck in order to take his cellphone out of his possession.
Fuente: Lawsuit Seeks Transparency as Searches of Cellphones and Laptops Skyrocket at Borders
Yesterday, WikiLeaks released its latest batch of pilfered CIA material, five documents describing malicious software for taking over Apple MacBooks and iPhones, and wrote in an accompanying post that “the CIA has been infecting the iPhone supply chain of its targets,” prompting concerned readers to wonder if their iPhone or MacBook had been infected on the factory floor. In a statement, Apple says that is almost certainly not the case.
Fuente: Apple Says It Fixed CIA Vulnerabilities Years Ago
Bajo el nombre “Dark Matter” Wikileaks publicó una nueva tanda de documentos secretos, en los que detalla varios proyectos de la CIA para lograr infectar y “hackear” cualquier iPhone o Mac.
Fuente: Wikileaks filtra nuevos documentos secretos sobre cómo “hackeaba” la CIA cualquier iPhone o Mac – El Mostrador
Internal US law enforcement documents describe a highly controversial community initiative aimed at identifying potential terrorists before they “radicalize” as being intimately related to intelligence gathering.Despite years of official denials, American Muslim civil rights groups have claimed that Barack Obama’s Countering Violent Extremism (CVE) initiative was a euphemistic approach that targeted Muslims for surveillance.
Fuente: Documents support fears of Muslim surveillance by Obama-era program | World news | The Guardian
Both the Snowden revelations and the CIA leak highlight the variety of creative techniques intelligence agencies can use to spy on individuals, at a time when many of us are voluntarily giving up our personal data to private companies and installing so-called “smart” devices with microphones (smart TVs, Amazon Echo) in our homes.So, where does this leave us? Is privacy really dead, as Silicon Valley luminaries such as Mark Zuckerberg have previously declared?
Fuente: With the latest WikiLeaks revelations about the CIA – is privacy really dead? | World news | The Guardian
A new report from Rand Corp. may help shed light on the government’s arsenal of malicious software, including the size of its stockpile of so-called “zero days” — hacks that hit undisclosed vulnerabilities in computers, smartphones, and other digital devices.The report also provides evidence that such vulnerabilities are long lasting. The findings are of particular interest because not much is known about the U.S. government’s controversial use of zero days.
Fuente: Malware Attacks Used by the U.S. Government Retain Potency for Many Years, New Evidence Indicates
“Theoretically, do I think that a director of the FBI who knows for a fact that something is a mythology but is misleading to the American people … should set the record straight? Yes, I do think he should say that, publicly,” Pelosi said
Fuente: Nancy Pelosi urges FBI director to debunk Donald Trump’s wiretap claim | US news | The Guardian
The US intelligence agencies are facing fresh embarrassment after WikiLeaks published what it described as the biggest ever leak of confidential documents from the CIA detailing the tools it uses to break into phones, communication apps and other electronic devices.
Fuente: WikiLeaks publishes ‘biggest ever leak of secret CIA documents’ | Media | The Guardian
It’s difficult to buy a new TV that doesn’t come with a suite of (generally mediocre) “smart” software, giving your home theater some of the functions typically found in phones and tablets. But bringing these extra features into your living room means bringing a microphone, too — a fact the CIA is exploiting, according to a new trove of documents released today by Wikileaks.
Fuente: Wikileaks Dump Shows CIA Could Turn Smart TVs into Listening Devices
La información revelada hoy sobre “hacking” (ataque cibernético) es parte de una serie en siete entregas que define como “la mayor filtración de datos de inteligencia de la historia”.
Fuente: WikiLeaks filtra programa encubierto de la CIA que usa celulares y televisores como “micrófonos encubiertos” – El Mostrador
We have to take action now to root out Russian and other foreign influences before they become too deeply enmeshed in our political ecosystem. First and foremost, leaders in the US and Europe must stop any attempt by the Trump administration to ease sanctions on Russia. It must be abundantly clear that attacking our elections through cyberspace will prompt a tough and proportional response.
Fuente: Russia hacked the US election. Now it’s coming for western democracy | Robby Mook | Opinion | The Guardian
For example, the bureau’s agents can decide that a campus organization is not “legitimate” and therefore not entitled to robust protections for free speech; dig for derogatory information on potential informants without any basis for believing they are implicated in unlawful activity; use a person’s immigration status to pressure them to collaborate and then help deport them when they are no longer useful; conduct invasive “assessments” without any reason for suspecting the targets of wrongdoing; demand that companies provide the bureau with personal data about their users in broadly worded national security letters without actual legal authority to do so; fan out across the internet along with a vast army of informants, infiltrating countless online chat rooms; peer through the walls of private homes; and more. The FBI offered various justifications of these tactics to our reporters. But the documents and our reporting on them ultimately reveal a bureaucracy in dire need of greater transparency and accountability.
Fuente: Secret Docs Reveal: President Trump Has Inherited an FBI With Vast Hidden Powers
Earlier on Wednesday, Maria Zakharova, a foreign ministry spokeswoman, wrote on Facebook that Snowden’s right to stay had recently been extended “by a couple of years”. Her post came in response to a suggestion from the former acting CIA director Michael Morell that Vladimir Putin might hand over Snowden to the US, despite there being no extradition treaty between the countries.
Fuente: Edward Snowden’s leave to remain in Russia extended for three years | US news | The Guardian
With Barack Obama’s presidency coming to a close, Ewen MacAskill, the Guardian’s defence and intelligence correspondent, helps us explore what mass surveillance in America might look like under Donald Trump
Fuente: State of surveillance: privacy in Donald Trump’s America – tech podcast | Technology | The Guardian
Now the most audacious display of support for Snowden is under way. Messages calling for his pardon are being beamed on to the outside wall of the Newseum, the Washington institution devoted to freedom of speech and the press that stands less than two miles from the White House.
Fuente: Edward Snowden backers beam calls for pardon on Washington news museum | US news | The Guardian
In January, Motherboard reported on the FBI’s “unprecedented” hacking operation, in which the agency, using a single warrant, deployed malware to over one thousand alleged visitors of a dark web child pornography site. Now, it has emerged that the campaign was actually an order of magnitude larger.
Fuente: The FBI Hacked Over 8,000 Computers In 120 Countries Based on One Warrant | Motherboard
November 18 2016, 3:35 p.m.President Obama indicated on Friday that he won’t pardon NSA whistleblower Edward Snowden, even as President-elect Donald Trump announced his pick to run the CIA: Kansas congressman Mike Pompeo, who has called for “the traitor Edward Snowden” to be executed.
Fuente: Obama Refuses to Pardon Edward Snowden. Trump’s New CIA Pick Wants Him Dead.
In an exclusive tour of the new lab, Fortune got a glimpse of Law & Order in the digital age. The lab is Exhibit A in how America’s biggest city is embracing big data analytics and a dash of hacker culture to solve complex crimes. It also raises hard questions about how to balance these sophisticated crime-fighting tools with civil liberties.
Fuente: New York’s New Digital Crime Lab Is a Forensic Marvel
He’ll control an unaccountable drone program, and the prison at Guantanamo Bay. His FBI, including a network of 15,000 paid informants, already has a record of spying on mosques and activists, and his NSA’s surveillance empire is ubiquitous and governed by arcane rules, most of which remain secret. He will inherit bombing campaigns in seven Muslim countries, the de facto ability to declare war unilaterally, and a massive nuclear arsenal — much of which is on hair-trigger alert.
Fuente: Commander-In-Chief Donald Trump Will Have Terrifying Powers. Thanks, Obama.
Privacy activists, human rights campaigners and former US security officials have expressed fears over the prospect of Donald Trump gaining access to the vast global US and UK surveillance network.
Fuente: Privacy experts fear Donald Trump accessing global surveillance network | World news | The Guardian
Legislation raises concerns foreign companies may need to hand over intellectual property and help security agencies in return for market access
Fuente: China’s new cybersecurity law sparks fresh censorship and espionage fears | World news | The Guardian
just as Apple has come to be seen as a warrior for digital protection and privacy against overreaching government surveillance, Cellebrite is emerging as its law-and-order counterpart, endeavoring to build tools to break through the barriers Apple and other phone makers erect to protect data.
Fuente: When the FBI Has a Phone It Can’t Crack, It Calls These Israeli Hackers
“The people of this country can’t hold the government accountable for its surveillance activities unless they know what our laws allow,” said Patrick Toomey, a staff attorney with the ACLU’s National Security Project. “These secret court opinions define the limits of the government’s spying powers. Their disclosure is essential for meaningful public oversight in our democracy.”
Fuente: ACLU Wants 23 Secret Surveillance Laws Made Public
More than 117 million adults included in ‘virtual, perpetual lineup’, which authorities can use to track citizens, raising concerns over privacy and profiling
Fuente: Half of US adults are recorded in police facial recognition databases, study says | World news | The Guardian
The FBI has contracted out with a private firm to handle, distribute and monitor highly sensitive surveillance documents, in an arrangement veteran FBI agents consider a potential privacy and counterintelligence risk.
Fuente: Security fears over FBI contracting out highly sensitive surveillance documents | US news | The Guardian
Contrary to a denial by Yahoo and a report by the New York Times, the company’s scanning program, revealed earlier this week by Reuters, provided the government with a custom-built back door into the company’s mail service — and it was so sloppily installed that it posed a privacy hazard for hundreds of millions of users, according to a former Yahoo employee with knowledge of the company’s security practices.
Fuente: Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email
Booz Allen Hamilton, the defense contracting giant whose employee was charged Wednesday in connection with the theft of hacking codes used by the National Security Agency, provides a fairly ironic service to the government: spotting rogue employees.
Fuente: NSA Theft Suspect Worked For Contractor That Sells the Government Tech for Spotting Rogue Employees
By what legal authority do the National Security Agency and the FBI ask Yahoo to search its users’ emails? Neither the government nor the tech company would say, after Reuters first reported on Tuesday that Yahoo “secretly built a custom software program” it used on behalf of the NSA and CIA to scan customer emails.
Fuente: Yahoo email surveillance: who approved the secret scanning program? | Technology | The Guardian
Finally, Yahoo’s possible betrayal of its users is another example of why whistleblowers and leaks to the press are so important. The US government considers this type of surveillance “legal” even though it shocks the conscience of many ordinary Americans and dozens of civil liberties groups have been attempting to have courts rule it illegal for years.
Fuente: Yahoo may have let the government spy on emails. Now will we embrace encryption? | Trevor Timm | Opinion | The Guardian
Yahoo last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by US intelligence officials, sources have told Reuters.The company complied with a classified US government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency (NSA) or FBI, said two former employees and a third person who knew about the programme.
Fuente: Yahoo secretly monitored emails on behalf of the US government – report | Technology | The Guardian
Companies became more resistant to the FBI’s collection of their customers’ information following revelations by former NSA contractor Edward Snowden, according to an inspector general report released Thursday.
Fuente: FBI Says Edward Snowden Is Reason Companies Are Resisting Handing Over Phone Records
In her book, Burrington, a writer and artist, has sketched the pieces of the internet that are visible on and above the streets of the city, and has explained the business interests and politicking behind their installation. Her book is designed to make the internet tangible
Fuente: A Walking Tour of New York’s Massive Surveillance Network
Newspaper criticised for calling for the criminal prosecution of its own source, on ‘whose back the paper won and eagerly accepted a Pulitzer Prize’
Fuente: Washington Post says Obama should not pardon whistleblower Ed Snowden | Media | The Guardian
Oliver Stone’s latest film, “Snowden,” bills itself as a dramatized version of the life of Edward Snowden, the NSA whistleblower who revealed the global extent of U.S. surveillance capabilities.
Fuente: New Film Tells the Story of Edward Snowden; Here Are the Surveillance Programs He Helped Expose
Bernie Sanders, Daniel Ellsberg, former members of the NSA and more weigh in on whether Obama should grant clemency to the divisive whistleblower
Fuente: ‘Edward Snowden did this country a great service. Let him come home’ | US news | The Guardian
Edward Snowden has set out the case for Barack Obama granting him a pardon before the US president leaves office in January, arguing that the disclosure of the scale of surveillance by US and British intelligence agencies was not only morally right but had left citizens better off.
Fuente: Edward Snowden makes ‘moral’ case for presidential pardon | US news | The Guardian
Harris Corp.’s Stingray surveillance device has been one of the most closely-guarded secrets in law enforcement for more than 15 years. The company and its police clients across the United States have fought to keep information about the mobile-phone-monitoring boxes from the public against which they are used. The Intercept has obtained several Harris instruction manuals spanning roughly 200 pages and meticulously detailing how to create a cellular surveillance dragnet.
Fuente: Long-Secret Stingray Manuals Detail How Police Can Spy on Phones
in the heart of the tranquil English countryside, is the National Security Agency’s largest overseas spying base. Originally used to monitor Soviet communications through the Cold War, its focus has since dramatically shifted, and today it is a vital part of the NSA’s sprawling global surveillance network.
Fuente: The NSA’s British Base at the Heart of U.S. Targeted Killing
As part of an ongoing effort to “exploit medical intelligence,” the National Security Agency teamed up with the military-focused Defense Intelligence Agency to extract “medical SIGINT” from the intercepted communications of nonprofit groups starting in the early 2000s, a top-secret document shows.
Fuente: How the U.S. Spies on Medical Nonprofits and Health Defenses Worldwide
“Las noticias sobre mi muerte han sido enormemente exageradas”, escribió Snowden en su cuenta de Twitter, en la que colgó una foto del escritor estadounidense, Mark Twain, al que pertenece la famosa cita.
Fuente: Snowden desmiente su muerte en Twitter con una cita de Mark Twain – El Mostrador
Microsoft has defeated a US order to hand over a customer’s email that was stored in Ireland, dealing the US government the latest setback in its struggle with the tech industry over the reach of law enforcement and the limits of personal privacy.
Fuente: Microsoft wins battle with US over data privacy – FT.com
Germany has approved new measures to rein in the activities of its foreign intelligence agency after a scandal over improper collusion with the US National Security Agency.
Fuente: Germany to further curb activities of spy agency in wake of NSA scandal | World news | The Guardian
The FBI has “hundreds of millions of dollars” to spend on developing technology for use in both national security and domestic law enforcement investigations — but it won’t reveal the exact amount.
Fuente: FBI’s Secret Surveillance Tech Budget Is ‘Hundreds of Millions’
A provision snuck into the still-secret text of the Senate’s annual intelligence authorization would give the FBI the ability to demand individuals’ email data and possibly web-surfing history from their service providers without a warrant and in complete secrecy.
Fuente: Secret Text in Senate Bill Would Give FBI Warrantless Access to Email Records
BEHIND THE FIREWALL: How China tamed the Internet | This is part of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.
Fuente: China’s scary lesson to the world: Censoring the Internet works – The Washington Post
13 miembros de la UE, entre los que se encuentran Irlanda, Bélgica, Polonia, Suecia y Reino Unido se muestran partidarios de que los datos fluyan solo por territorio europeo
Fuente: La mitad de los ministros de telecomunicaciones europeos quiere que tus datos fluyan libremente
SIDtoday is the internal newsletter for the NSA’s most important division, the Signals Intelligence Directorate. After editorial review, The Intercept is releasing nine years’ worth of newsletters in batches, starting with 2003. The agency’s spies explain a surprising amount about what they were doing, how they were doing it, and why.
Fuente: The Intercept Is Broadening Access to the Snowden Archive. Here’s Why