Forgot your password?
typodupeerror

+ - NSA built "Google-like" interface to scan 850+ billion metadata records->

Submitted by mpicpp
mpicpp (3454017) writes "Data like unique phone identifiers, e-mail addresses, and chat handles now being shared.

According to newly published documents, the National Security Agency has built a “Google-like” search interface for its vast database of metadata, and the agency shares it with dozens of other American intelligence agencies. The new documents are part of the Snowden leaks and were first published on Monday by The Intercept.

The new search tool, called ICREACH, is described in an internal NSA presentation as a “large scale expansion of communications metadata shared with [intelligence community] partners.” That same presentation shows that ICREACH has been operational since the pilot launched in May 2007. Not only is data being shared to more agencies, but there are more types of such data being shared—ICREACH searches over 850 billion records.

New data types being shared include IMEI numbers (a unique identifier on each mobile handset), IMSI (another unique identifier for SIM cards), GPS coordinates, e-mail address, and chat handles, among others. Previously, such metadata was only limited to date, time, duration, called number, and calling number."

Link to Original Source

+ - NSA/GCHQ: The HACIENDA Program for Internet Colonization->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "Since the early days of TCP, port scanning has been used by computer saboteurs to locate vulnerable systems. In a new set of top secret documents seen by Heise, it is revealed that in 2009, the British spy agency GCHQ made port scans a "standard tool" to be applied against entire nations. Twenty-seven countries are listed as targets of the HACIENDA program in the presentation, which comes with a promotional offer: readers desiring to do reconnaissance against another country need simply send an e-mail."
Link to Original Source

+ - NSA BIOS Backdoor a.k.a. God Mode Malware Part 1: DEITYBOUNCE->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "This article is the first part of a series on NSA BIOS backdoor internals. Before we begin, I’d like to point out why these malwares are classified as “god mode.” First, most of the malware uses an internal (NSA) codename in the realms of “gods,” such as DEITYBOUNCE, GODSURGE, etc. Second, these malwares have capabilities similar to “god mode” cheats in video games, which make the player using it close to being invincible. This is the case with this type of malware because it is very hard to detect and remove, even with the most sophisticated anti-malware tools, during its possible deployment timeframe."
Link to Original Source

Comment: A digital version of the "Doomsday Machine" (Score 4, Insightful) 194

by Advocatus Diaboli (#47663949) Attached to: Snowden: NSA Working On Autonomous Cyberwarfare Bot
Do the morons in NSA seriously believe that the USA is the only country with the technology to build a Digital Doomsday Machine? Has anyone of them watched Dr. Strangelove? Having said that, the level of hubris they are displaying seems about right.

+ - NSA Tried To Delete Court Transcript In Lawsuit Over Deleting Evidence->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The National Security Agency secretly tried to delete part of a public court transcript after believing one of its lawyers may have accidentally revealed classified information in a court case over alleged illegal surveillance. Following a recent hearing in the ongoing Jewel v. NSA case, in which the Electronic Frontier Foundation is challenging NSA’s ability to surveil foreign citizen’s U.S.-based email and social media accounts, the government informed U.S. District Court Judge Jeffrey White it believed one of its attorneys mistakenly revealed classified information. The government then requested that the select portion of the hearing’s public transcript be secretly deleted without alerting the public to the alteration. According to the EFF, the open courtroom case — which has been steadily picking up media coverage following NSA leaker Edward Snowden’s bulk surveillance revelations — was “widely covered by the press” and “even on the local TV news on two stations.”"
Link to Original Source

+ - Leaked docs show spyware used to snoop on US computers->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "Software created by the controversial UK-based Gamma Group International was used to spy on computers that appear to be located in the United States, the UK, Germany, Russia, Iran, and Bahrain, according to a leaked trove of documents analyzed by ProPublica. It's not clear whether the surveillance was conducted by governments or private entities. Customer e-mail addresses in the collection appeared to belong to a German surveillance company, an independent consultant in Dubai, the Bosnian and Hungarian Intelligence services, a Dutch law enforcement officer, and the Qatari government."
Link to Original Source

+ - Barack Obama's Secret Terrorist-Tracking System, by the Numbers->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "Nearly half of the people on the U.S. government’s widely shared database of terrorist suspects are not connected to any known terrorist group, according to classified government documents obtained by The Intercept. Of the 680,000 people caught up in the government’s Terrorist Screening Database—a watchlist of “known or suspected terrorists” that is shared with local law enforcement agencies, private contractors, and foreign governments—more than 40 percent are described by the government as having “no recognized terrorist group affiliation.” That category—280,000 people—dwarfs the number of watchlisted people suspected of ties to al Qaeda, Hamas, and Hezbollah combined."
Link to Original Source

+ - The FBI Is Infecting Tor Users with Malware with Drive-by Downloads->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system. The approach has borne fruit—over a dozen alleged users of Tor-based child porn sites are now headed for trial as a result. But it’s also engendering controversy, with charges that the Justice Department has glossed over the bulk-hacking technique when describing it to judges, while concealing its use from defendants."
Link to Original Source

+ - The NSA's New Partner in Spying: Saudi Arabia's Brutal State Police->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The National Security Agency last year significantly expanded its cooperative relationship with the Saudi Ministry of Interior, one of the world’s most repressive and abusive government agencies. An April 2013 top secret memo provided by NSA whistleblower Edward Snowden details the agency’s plans “to provide direct analytic and technical support” to the Saudis on “internal security” matters. The Saudi Ministry of Interior—referred to in the document as MOI— has been condemned for years as one of the most brutal human rights violators in the world. In 2013, the U.S. State Department reported that “Ministry of Interior officials sometimes subjected prisoners and detainees to torture and other physical abuse,” specifically mentioning a 2011 episode in which MOI agents allegedly “poured an antiseptic cleaning liquid down [the] throat” of one human rights activist. The report also notes the MOI’s use of invasive surveillance targeted at political and religious dissidents."
Link to Original Source

+ - The Secret Government Rulebook For Labeling You a Terrorist-> 1

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither “concrete facts” nor “irrefutable evidence” to designate an American or foreigner as a terrorist, according to a key government document obtained by The Intercept. ...The heart of the document revolves around the rules for placing individuals on a watchlist. “All executive departments and agencies,” the document says, are responsible for collecting and sharing information on terrorist suspects with the National Counterterrorism Center. It sets a low standard—”reasonable suspicion“—for placing names on the watchlists, and offers a multitude of vague, confusing, or contradictory instructions for gauging it. In the chapter on “Minimum Substantive Derogatory Criteria”—even the title is hard to digest—the key sentence on reasonable suspicion offers little clarity..."
Link to Original Source

+ - Photoshopping of adult porn nets man 10-year child-porn conviction->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "A federal appeals court upheld Thursday the child pornography conviction and accompanying 10-year prison term handed to a Nebraska man who superimposed the image of an underaged girl's face onto a picture of two adults having sex. The 8th US Circuit Court of Appeals rejected (PDF) claims from 28-year-old Jeffrey Anderson that his actions were protected by the First Amendment. Anderson sent the doctored image to his 11-year-old half-sister via Facebook, resulting in the charge of distributing child pornography. Anderson had superimposed the half sister's face onto the photo, the court said."
Link to Original Source

+ - Hacking Online Polls and Other Ways British Spies Seek to Control the Internet->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call. The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users."
Link to Original Source

+ - Obama administration says the world's servers are ours->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes ""Global governments, the tech sector, and scholars are closely following a legal flap in which the US Justice Department claims that Microsoft must hand over e-mail stored in Dublin, Ireland. In essence, President Barack Obama's administration claims that any company with operations in the United States must comply with valid warrants for data, even if the content is stored overseas. It's a position Microsoft and companies like Apple say is wrong, arguing that the enforcement of US law stops at the border. A magistrate judge has already sided with the government's position, ruling in April that "the basic principle that an entity lawfully obligated to produce information must do so regardless of the location of that information." Microsoft appealed to a federal judge, and the case is set to be heard on July 31.""
Link to Original Source

+ - Snowden Revelations Reveal GCHQ Is Just Like 4Chan Trolls, But With More Power->

Submitted by Anonymous Coward
An anonymous reader writes "So you misspent your teenage years as a 4chan troll and are trying to figure out what to do for a career? Given the latest revelations from the Snowden Files by Glenn Greenwald over at The Intercept, you might want to consider taking a job for the UK's equivalent to the NSA, better known as GCHQ. As Greenwald details (and the embedded document below reveals), among GCHQ's capabilities in its Joint Threat Research Intelligence Group (JTRIG) are a bunch of things that sound quite a bit like traditional internet trolling efforts. These include juicing internet polls to vote for GCHQ's favorite candidate (remember when moot was voted Time's Person of the Year in an online poll?) as well as flooding email inboxes or websites and even connecting two people on the phone and listening to the conversation.

Of course, this is not the first time that JTRIG has been called out by Glenn Greenwald for its sneaky online practices. Last time, Greenwald highlighted its practice of putting a bunch of false info online about someone to destroy their reputation. This just digs deeper into some of the other "tricks" in JTRIG's trick bag. Still, it is rather astounding to me just how similar many of the items sound to the kinds of things generally associated with trolling behavior. It really makes you wonder if the folks working in JTRIG are just 4chan trolls who never really had to grow up."

Link to Original Source

+ - Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The National Security Agency and FBI have covertly monitored the emails of prominent Muslim-Americans—including a political candidate and several civil rights activists, academics, and lawyers—under secretive procedures intended to target terrorists and foreign spies."
Link to Original Source

It is impossible to travel faster than light, and certainly not desirable, as one's hat keeps blowing off. -- Woody Allen

Working...