Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

+ - CSE tracks millions of downloads daily: Snowden documents-> 2

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "Canada's electronic spy agency sifts through millions of videos and documents downloaded online every day by people around the world, as part of a sweeping bid to find extremist plots and suspects, CBC News has learned. Details of the Communications Security Establishment project dubbed "Levitation" are revealed in a document obtained by U.S. whistleblower Edward Snowden and recently released to CBC News. Under Levitation, analysts with the electronic eavesdropping service can access information on about 10 to 15 million uploads and downloads of files from free websites each day, the document says."
Link to Original Source

+ - US expands spy program on American drivers beyond border region->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The revelation comes from new documents obtained and published late Monday by the American Civil Liberties Union (ACLU) under the Freedom of Information Act. The documents also show the DEA captured over 793 million license plates from May 2009 through May 2013 with the stated goal of drug-related asset forfeiture. "The government has essentially created a program of mass tracking," Catherine Crump, a former ACLU lawyer who now teaches at the University of California, Berkeley, told Ars. "The US has created a system where the government can track you and the American public simply has to accept it as a fait accompli."

Also see this link (https://www.aclu.org/blog/technology-and-liberty-criminal-law-reform/foia-documents-reveal-massive-dea-program-record-ame)"

Link to Original Source

+ - Secret 'BADASS' Intelligence Program Spied On Smartphones->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "British and Canadian spy agencies accumulated sensitive data on smartphone users, including location, app preferences, and unique device identifiers, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden. The document, included in a trove of Snowden material released by Der Spiegel on January 17, outlines a secret program run by the intelligence agencies called BADASS."
Link to Original Source

+ - NSA Preps America for Future Battle->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.

Also check out — New Snowden documents show that the NSA and its allies are laughing at the rest of the world (http://www.theverge.com/2015/1/17/7629721/nsa-is-pwning-everyone-and-having-a-chuckle-about-it)"

Link to Original Source

+ - Operation AURORAGOLD: How the NSA hacks cellphone networks worldwide->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers. Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks."
Link to Original Source

+ - New Snowden Docs: GCHQ ties to Telcos gave Spies Global Surveillance Reach->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "According to a report in the German newspaper Süddeutsche Zeitung, the telecommunications company Cable & Wireless—now a subsidiary of Vodafone—“actively shaped and provided the most data to GCHQ surveillance programs and received millions of pounds in compensation.” The relationship was so extensive that a GCHQ employee was assigned to work full time at Cable & Wireless (referred to by the code name “Gerontic” in NSA documents) to manage cable-tap projects in February of 2009. By July of 2009, Cable & Wireless provided access to 29 out of the 63 cables on the list, accounting for nearly 70 percent of the data capacity available to surveillance programs."
Link to Original Source

+ - Malware in European Union Attack linked to U.S and British Intelligence Agencies->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The Regin malware, whose existence was first reported by the security firm Symantec on Sunday, is among the most sophisticated ever discovered by researchers. Symantec compared Regin to Stuxnet, a state-sponsored malware program developed by the U.S. and Israel to sabotage computers at an Iranian nuclear facility. Sources familiar with internal investigations at Belgacom and the European Union have confirmed to The Intercept that the Regin malware was found on their systems after they were compromised, linking the spy tool to the secret GCHQ and NSA operations."
Link to Original Source

+ - British Spies are free to target Lawyers and Journalists->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "British spies have been granted the authority to secretly eavesdrop on legally privileged attorney-client communications, according to newly released documents. On Thursday, a series of previously classified policies confirmed for the first time that the U.K.’s top surveillance agency Government Communications Headquarters (pictured above) has advised its employees: “You may in principle target the communications of lawyers.” The country’s other major security and intelligence agencies—MI5 and MI6—have adopted similar policies, the documents show. The guidelines also appear to permit surveillance of journalists and others deemed to work in “sensitive professions.”"
Link to Original Source

+ - Secret manuals show the spyware sold to despots and cops worldwide->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The manuals describe Hacking Team’s software for government technicians and analysts, showing how it can activate cameras, exfiltrate emails, record Skype calls, log typing, and collect passwords on targeted devices. They also catalog a range of pre-bottled techniques for infecting those devices using wifi networks, USB sticks, streaming video, and email attachments to deliver viral installers. With a few clicks of a mouse, even a lightly trained technician can build a software agent that can infect and monitor a device, then upload captured data at unobtrusive times using a stealthy network of proxy servers, all without leaving a trace. That, at least, is what Hacking Team’s manuals claim as the company tries to distinguish its offerings in the global marketplace for government hacking software."
Link to Original Source

+ - Core Secrets: NSA Saboteurs in China and Germany->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The National Security Agency has had agents in China, Germany, and South Korea working on programs that use “physical subversion” to infiltrate and compromise networks and devices, according to documents obtained by The Intercept. The documents, leaked by NSA whistleblower Edward Snowden, also indicate that the agency has used “under cover” operatives to gain access to sensitive data and systems in the global communications industry, and that these secret agents may have even dealt with American firms. The documents describe a range of clandestine field activities that are among the agency’s “core secrets” when it comes to computer network attacks, details of which are apparently shared with only a small number of officials outside the NSA."
Link to Original Source

+ - US says it can hack into foreign-based servers without warrants->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The US government may hack into servers outside the country without a warrant, the Justice Department said in a new legal filling in the ongoing prosecution of Ross Ulbricht. The government believes that Ulbricht is the operator of the Silk Road illicit drug website. Monday's filing in New York federal court centers on the legal brouhaha of how the government found the Silk Road servers in Iceland. Ulbricht said last week that the government's position—that a leaky CAPTCHA on the site's login led them to the IP address—was "implausible" and that the government (perhaps the National Security Agency) may have unlawfully hacked into the site to discover its whereabouts"
Link to Original Source

+ - The FBI Just Finished Its Insane New Facial Recognition System->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes ""After six years and over one billion dollars in development, the FBI has just announced that its new biometric facial recognition software system is finally complete. Meaning that, starting soon, photos of tens of millions of U.S. citizen's faces will be captured by the national system on a daily basis. The Next Generation Identification (NGI) program will logs all of those faces, and will reference them against its growing database in the event of a crime. It's not just faces, though. Thanks to the shared database dubbed the Interstate Photo System (IPS), everything from tattoos to scars to a person's irises could be enough to secure an ID. What's more, the FBI is estimating that NGI will include as many as 52 million individual faces by next year, collecting identified faces from mug shots and some job applications. So if you apply for any type of job that requires fingerprinting, for instance, those prints (which will now also likely be asked for along with a photo) will be sent off to the government for processing."

Here are two recent and related news items.

Boston police used facial recognition software on thousands of people at a music festival (http://theweek.com/speedreads/index/266552/speedreads-boston-police-used-facial-recognition-software-on-thousands-of-people-at-a-music-festival)

"Attendees of last year's Boston Calling music festival were — without their knowledge — test subjects for the Boston Police Department's new facial recognition software. The IBM program — which also analyzes each individual's build, clothes, and skin color — captured video of thousands of people, 50 hours of which is still intact."

and

General Motors May Be The First To Offer Cars That Detect Distracted Drivers (http://www.washingtonpost.com/cars/general-motors-may-be-the-first-to-offer-cars-that-detect-distracted-drivers/2014/09/02/d00b5bc4-32b9-11e4-9f4d-24103cb8b742_story.html)

"According to CNBC, the technology will come from an Australian firm called Seeing Machines. It will take the form of a series of cameras paired with facial recognition software — kind of like the software that Facebook uses to auto-tag your friends in photos, but in this case, it'll take note of things like the rotation of the driver's head and how often he/she blinks. That will help the system determine whether a driver is looking at the road, at a cell phone, or even nodding off. If the situation proves dire enough, the system could theoretically slow the vehicle and force the driver to pull over — not unlike a certain attention-powered car we've seen before.""

Link to Original Source

+ - U.S. threatened massive fine to force Yahoo to release data-> 1

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user data that the company believed was unconstitutional, according to court documents unsealed Thursday that illuminate how federal officials forced American tech companies to participate in the NSA’s controversial PRISM program. The documents, roughly 1,500 pages worth, outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the National Security Agency extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms."
Link to Original Source

I'd rather be led to hell than managed to heavan.

Working...