Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

+ - ACLU-Obtained Documents Reveal Breadth of Secretive Stingray Use in Florida->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The results should be troubling for anyone who cares about privacy rights, judicial oversight of police activities, and the rule of law. The documents paint a detailed picture of police using an invasive technology — one that can follow you inside your house — in many hundreds of cases and almost entirely in secret. The secrecy is not just from the public, but often from judges who are supposed to ensure that police are not abusing their authority. Partly relying on that secrecy, police have been getting authorization to use Stingrays based on the low standard of “relevance,” not a warrant based on probable cause as required by the Fourth Amendment."
Link to Original Source

+ - "SSL Hijacker" Behind Superfish Debacle Imperils Large Number of Users->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The fake secure sockets layer certificate found on Lenovo machines preinstalled with Superfish came from none other than Komodia. It was bundled with a password-protected private encryption key, presumably to prevent it from being used by malicious hackers to create websites that spied on users as they visited HTTPS-protected pages. But as Ars reported Thursday, the measure was laughably easy to bypass, since it took Errata Security CEO Rob Graham just three hours to discover that the password was, you guessed it, "komodia.""
Link to Original Source

+ - The Great SIM Heist: How Spies Stole The Keys To The Encryptation Castle->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data."
Link to Original Source

Comment: The NSA hides surveillance software in hard drives (Score 5, Informative) 114

Ya.. another related post from engadget (http://www.engadget.com/2015/02/16/hard-drive-spyware/). "It's been known for a while that the NSA will intercept and bug equipment to spy on its soon-to-be owners, but the intellgency agency's techniques are apparently more clever than first thought. Security researchers at Kaspersky Lab have discovered apparently state-created spyware buried in the firmware of hard drives from big names like Seagate, Toshiba and Western Digital. When present, the code lets snoops collect data and map networks that would otherwise be inaccessible -- all they need to retrieve info is for an unwitting user to insert infected storage (such as a CD or USB drive) into an internet-connected PC. The malware also isn't sitting in regular storage, so you can't easily get rid of it or even detect it."

+ - How "omnipotent" hackers tied to NSA hid for 14 years and were found at last-> 2

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The money and time required to develop the Equation Group malware, the technological breakthroughs the operation accomplished, and the interdictions performed against targets leave little doubt that the operation was sponsored by a nation-state with nearly unlimited resources to dedicate to the project. The countries that were and weren't targeted, the ties to Stuxnet and Flame, and the Grok artifact found inside the Equation Group keylogger strongly support the theory the NSA or a related US agency is the responsible party, but so far Kaspersky has declined to name a culrit. NSA officials didn't respond to an e-mail seeking comment for this story. What is safe to say is that the unearthing of the Equation Group is a seminal finding in the fields of computer and national security, as important, or possibly more so, than the revelations about Stuxnet."
Link to Original Source

+ - Sites featuring "terrorism" or "child pornography" to be blocked in France->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "Now, the General Directorate of the National Police and its cybercrimes unit will be able to request that sites serving terrorist or pedophilia-related content be blocked by Internet Service Providers serving people in France and its territories. ISPs then have to comply with the request within 24 hours. ISPs will be able to request compensation from the French government for any extra costs incurred in blocking the sites. Users who navigate to a site “to which access is prohibited will be led to an informational page from the Ministry of the Interior,” the text of the decree said. The informational page will list the grounds for the blocking as well as any possibly remedies. Every quarter, French authorities will check whether the blocked pages still contain the offending material. If not, then the authorities will contact ISPs, which will have to unblock the sites, again within 24 hours."
Link to Original Source

+ - CSE tracks millions of downloads daily: Snowden documents-> 2

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "Canada's electronic spy agency sifts through millions of videos and documents downloaded online every day by people around the world, as part of a sweeping bid to find extremist plots and suspects, CBC News has learned. Details of the Communications Security Establishment project dubbed "Levitation" are revealed in a document obtained by U.S. whistleblower Edward Snowden and recently released to CBC News. Under Levitation, analysts with the electronic eavesdropping service can access information on about 10 to 15 million uploads and downloads of files from free websites each day, the document says."
Link to Original Source

+ - US expands spy program on American drivers beyond border region->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The revelation comes from new documents obtained and published late Monday by the American Civil Liberties Union (ACLU) under the Freedom of Information Act. The documents also show the DEA captured over 793 million license plates from May 2009 through May 2013 with the stated goal of drug-related asset forfeiture. "The government has essentially created a program of mass tracking," Catherine Crump, a former ACLU lawyer who now teaches at the University of California, Berkeley, told Ars. "The US has created a system where the government can track you and the American public simply has to accept it as a fait accompli."

Also see this link (https://www.aclu.org/blog/technology-and-liberty-criminal-law-reform/foia-documents-reveal-massive-dea-program-record-ame)"

Link to Original Source

+ - Secret 'BADASS' Intelligence Program Spied On Smartphones->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "British and Canadian spy agencies accumulated sensitive data on smartphone users, including location, app preferences, and unique device identifiers, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden. The document, included in a trove of Snowden material released by Der Spiegel on January 17, outlines a secret program run by the intelligence agencies called BADASS."
Link to Original Source

+ - NSA Preps America for Future Battle->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.

Also check out — New Snowden documents show that the NSA and its allies are laughing at the rest of the world (http://www.theverge.com/2015/1/17/7629721/nsa-is-pwning-everyone-and-having-a-chuckle-about-it)"

Link to Original Source

+ - Operation AURORAGOLD: How the NSA hacks cellphone networks worldwide->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers. Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks."
Link to Original Source

+ - New Snowden Docs: GCHQ ties to Telcos gave Spies Global Surveillance Reach->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "According to a report in the German newspaper Süddeutsche Zeitung, the telecommunications company Cable & Wireless—now a subsidiary of Vodafone—“actively shaped and provided the most data to GCHQ surveillance programs and received millions of pounds in compensation.” The relationship was so extensive that a GCHQ employee was assigned to work full time at Cable & Wireless (referred to by the code name “Gerontic” in NSA documents) to manage cable-tap projects in February of 2009. By July of 2009, Cable & Wireless provided access to 29 out of the 63 cables on the list, accounting for nearly 70 percent of the data capacity available to surveillance programs."
Link to Original Source

+ - Malware in European Union Attack linked to U.S and British Intelligence Agencies->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The Regin malware, whose existence was first reported by the security firm Symantec on Sunday, is among the most sophisticated ever discovered by researchers. Symantec compared Regin to Stuxnet, a state-sponsored malware program developed by the U.S. and Israel to sabotage computers at an Iranian nuclear facility. Sources familiar with internal investigations at Belgacom and the European Union have confirmed to The Intercept that the Regin malware was found on their systems after they were compromised, linking the spy tool to the secret GCHQ and NSA operations."
Link to Original Source

"All my life I wanted to be someone; I guess I should have been more specific." -- Jane Wagner

Working...