Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 29 declined, 43 accepted (72 total, 59.72% accepted)

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

+ - On the Dangers and Potential Abuses of DNA familial searching->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "Investigators last year turned to a controversial technique known as familial searching, which seeks to identify the last name of potential suspects through a DNA analysis focusing on the Y chromosome. A promising “partial match” emerged between the semen sample and the genetic profile of Usry’s father, Michael Usry Sr. — a finding that excluded the father but strongly suggested one of his relatives had a hand in the young woman’s murder. The results instantly breathed new life into a high-profile investigation in which Idaho Falls authorities have weathered intense criticism. But the story of how the police came to suspect the younger Usry and then eventually clear him of murder raises troubling questions about civil liberties amid the explosive — and increasingly commercial — growth of DNA testing. The elder Usry, who lives outside Jackson, Mississippi, said his DNA entered the equation through a project, sponsored years ago by the Mormon church, in which members gave DNA samples to the Sorenson Molecular Genealogy Foundation, a nonprofit whose forensic assets have been acquired by Ancestry.com, the world’s largest for-profit genealogy company."
Link to Original Source

+ - ACLU-Obtained Documents Reveal Breadth of Secretive Stingray Use in Florida->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The results should be troubling for anyone who cares about privacy rights, judicial oversight of police activities, and the rule of law. The documents paint a detailed picture of police using an invasive technology — one that can follow you inside your house — in many hundreds of cases and almost entirely in secret. The secrecy is not just from the public, but often from judges who are supposed to ensure that police are not abusing their authority. Partly relying on that secrecy, police have been getting authorization to use Stingrays based on the low standard of “relevance,” not a warrant based on probable cause as required by the Fourth Amendment."
Link to Original Source

+ - "SSL Hijacker" Behind Superfish Debacle Imperils Large Number of Users->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The fake secure sockets layer certificate found on Lenovo machines preinstalled with Superfish came from none other than Komodia. It was bundled with a password-protected private encryption key, presumably to prevent it from being used by malicious hackers to create websites that spied on users as they visited HTTPS-protected pages. But as Ars reported Thursday, the measure was laughably easy to bypass, since it took Errata Security CEO Rob Graham just three hours to discover that the password was, you guessed it, "komodia.""
Link to Original Source

+ - The Great SIM Heist: How Spies Stole The Keys To The Encryptation Castle->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data."
Link to Original Source

+ - How "omnipotent" hackers tied to NSA hid for 14 years and were found at last-> 2

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The money and time required to develop the Equation Group malware, the technological breakthroughs the operation accomplished, and the interdictions performed against targets leave little doubt that the operation was sponsored by a nation-state with nearly unlimited resources to dedicate to the project. The countries that were and weren't targeted, the ties to Stuxnet and Flame, and the Grok artifact found inside the Equation Group keylogger strongly support the theory the NSA or a related US agency is the responsible party, but so far Kaspersky has declined to name a culrit. NSA officials didn't respond to an e-mail seeking comment for this story. What is safe to say is that the unearthing of the Equation Group is a seminal finding in the fields of computer and national security, as important, or possibly more so, than the revelations about Stuxnet."
Link to Original Source

+ - Sites featuring "terrorism" or "child pornography" to be blocked in France->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "Now, the General Directorate of the National Police and its cybercrimes unit will be able to request that sites serving terrorist or pedophilia-related content be blocked by Internet Service Providers serving people in France and its territories. ISPs then have to comply with the request within 24 hours. ISPs will be able to request compensation from the French government for any extra costs incurred in blocking the sites. Users who navigate to a site “to which access is prohibited will be led to an informational page from the Ministry of the Interior,” the text of the decree said. The informational page will list the grounds for the blocking as well as any possibly remedies. Every quarter, French authorities will check whether the blocked pages still contain the offending material. If not, then the authorities will contact ISPs, which will have to unblock the sites, again within 24 hours."
Link to Original Source

+ - CSE tracks millions of downloads daily: Snowden documents-> 2

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "Canada's electronic spy agency sifts through millions of videos and documents downloaded online every day by people around the world, as part of a sweeping bid to find extremist plots and suspects, CBC News has learned. Details of the Communications Security Establishment project dubbed "Levitation" are revealed in a document obtained by U.S. whistleblower Edward Snowden and recently released to CBC News. Under Levitation, analysts with the electronic eavesdropping service can access information on about 10 to 15 million uploads and downloads of files from free websites each day, the document says."
Link to Original Source

+ - US expands spy program on American drivers beyond border region->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The revelation comes from new documents obtained and published late Monday by the American Civil Liberties Union (ACLU) under the Freedom of Information Act. The documents also show the DEA captured over 793 million license plates from May 2009 through May 2013 with the stated goal of drug-related asset forfeiture. "The government has essentially created a program of mass tracking," Catherine Crump, a former ACLU lawyer who now teaches at the University of California, Berkeley, told Ars. "The US has created a system where the government can track you and the American public simply has to accept it as a fait accompli."

Also see this link (https://www.aclu.org/blog/technology-and-liberty-criminal-law-reform/foia-documents-reveal-massive-dea-program-record-ame)"

Link to Original Source

+ - Secret 'BADASS' Intelligence Program Spied On Smartphones->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "British and Canadian spy agencies accumulated sensitive data on smartphone users, including location, app preferences, and unique device identifiers, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden. The document, included in a trove of Snowden material released by Der Spiegel on January 17, outlines a secret program run by the intelligence agencies called BADASS."
Link to Original Source

+ - NSA Preps America for Future Battle->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.

Also check out — New Snowden documents show that the NSA and its allies are laughing at the rest of the world (http://www.theverge.com/2015/1/17/7629721/nsa-is-pwning-everyone-and-having-a-chuckle-about-it)"

Link to Original Source

+ - Operation AURORAGOLD: How the NSA hacks cellphone networks worldwide->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers. Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks."
Link to Original Source

+ - New Snowden Docs: GCHQ ties to Telcos gave Spies Global Surveillance Reach->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "According to a report in the German newspaper Süddeutsche Zeitung, the telecommunications company Cable & Wireless—now a subsidiary of Vodafone—“actively shaped and provided the most data to GCHQ surveillance programs and received millions of pounds in compensation.” The relationship was so extensive that a GCHQ employee was assigned to work full time at Cable & Wireless (referred to by the code name “Gerontic” in NSA documents) to manage cable-tap projects in February of 2009. By July of 2009, Cable & Wireless provided access to 29 out of the 63 cables on the list, accounting for nearly 70 percent of the data capacity available to surveillance programs."
Link to Original Source

+ - Malware in European Union Attack linked to U.S and British Intelligence Agencies->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The Regin malware, whose existence was first reported by the security firm Symantec on Sunday, is among the most sophisticated ever discovered by researchers. Symantec compared Regin to Stuxnet, a state-sponsored malware program developed by the U.S. and Israel to sabotage computers at an Iranian nuclear facility. Sources familiar with internal investigations at Belgacom and the European Union have confirmed to The Intercept that the Regin malware was found on their systems after they were compromised, linking the spy tool to the secret GCHQ and NSA operations."
Link to Original Source

+ - British Spies are free to target Lawyers and Journalists->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "British spies have been granted the authority to secretly eavesdrop on legally privileged attorney-client communications, according to newly released documents. On Thursday, a series of previously classified policies confirmed for the first time that the U.K.’s top surveillance agency Government Communications Headquarters (pictured above) has advised its employees: “You may in principle target the communications of lawyers.” The country’s other major security and intelligence agencies—MI5 and MI6—have adopted similar policies, the documents show. The guidelines also appear to permit surveillance of journalists and others deemed to work in “sensitive professions.”"
Link to Original Source

+ - Secret manuals show the spyware sold to despots and cops worldwide->

Submitted by Advocatus Diaboli
Advocatus Diaboli (1627651) writes "The manuals describe Hacking Team’s software for government technicians and analysts, showing how it can activate cameras, exfiltrate emails, record Skype calls, log typing, and collect passwords on targeted devices. They also catalog a range of pre-bottled techniques for infecting those devices using wifi networks, USB sticks, streaming video, and email attachments to deliver viral installers. With a few clicks of a mouse, even a lightly trained technician can build a software agent that can infect and monitor a device, then upload captured data at unobtrusive times using a stealthy network of proxy servers, all without leaving a trace. That, at least, is what Hacking Team’s manuals claim as the company tries to distinguish its offerings in the global marketplace for government hacking software."
Link to Original Source

"If truth is beauty, how come no one has their hair done in the library?" -- Lily Tomlin

Working...