86674117
submission
blottsie writes:
Earlier this year, the FBI released a free, online video game featuring sheep in its attempts to fight terrorism recruitment efforts. The game is called The Slippery Slope of Violent Extremism, and it is a real thing that exists. You can play it here.
After journalists filed a FOIA request to find out more about the game, the FBI said it would take two years to respond—a staggeringly long wait that helps expose how the Bureau actively avoids responding to open-records requests.
85534881
submission
blottsie writes:
The NSA and FBI are both expected to investigate the leak of NSA-linked cyberweapons leaked this week by an entity calling itself the Shadow Brokers, experts with knowledge of the process tell the Daily Dot. However, multiple experts say any retaliation by the U.S. will likely remain secret to keep the tactical advantage.
Meanwhile, Motherboard reports that some former NSA staffers believe the leak is the work of a "rogue NSA insider."
85467147
submission
blottsie writes:
A group of hackers identifying themselves as the Shadow Brokers claims to have hacked the NSA's Equation Group, a team of American hackers that have been described as both "omnipotent" and "the most advanced" threat cyberspace has ever seen.
On the Shadow Brokers' website, the group has shared a sample of data that some cybersecurity experts say lends credibility to the breach. The the hackers' asking price for what they claim is a cache of NSA-built cyberweapons.
84622823
submission
blottsie writes:
The Romanian hacker known as Guccifer, real name Marcel Lehel Lazar, admitted to the FBI that he lied to the public when he said he repeatedly hacking into Hillary Clinton's email server in 2013, FBI Director James Comey testified before members on Congress on Thursday.
Lazar told Fox News and NBC News in May 2016 about his alleged hacking. Despite offering no proof, the claim caused a huge stir, including making headline news on some of America's biggest publications, which offered little skepticism of his claims.
83962739
submission
blottsie writes:
In the wake of programmer Jacob Appelbaum’s abrupt departure from the Tor Project, rumors and accusations about both sexual misconduct and bullying have surfaced that extend back years.
Now, four witnesses—including a current senior Tor employee—are stepping forward into the public eye, adding valuable insight into how Appelbaum allegedly intimidated those around him to keep accusations of sexual misconduct secret and pressure those who are speaking out to remain anonymous.
83719531
submission
blottsie writes:
Yet another security researcher is facing possible prosecution under the CFAA for accessing data on a publicly accessible server. The FBI on Tuesday raided Texas-based dental software security researcher Justin Shafer, who found the protected health records of 22,000 patients stored on an anonymous FTP.
“This is a troubling development. I hope the government doesn't think that accessing unsecured files on a public FTP server counts as an unauthorized access under the CFAA,” Orin Kerr, a George Washington University law professor and CFAA scholar told the Daily Dot. “If that turns out to be the government's theory—which we don't know yet, as we only have the warrant so far—it will be a significant overreach that raises the same issues as were briefed but not resolved in [Andrew 'weev' Auernheimer's] case. I'll be watching this closely.”
83047841
submission
blottsie writes:
In a Wall Street Journal editorial titled "Encryption Without Tears," Sens. Richard Burr (R-N.C.) and Dianne Feinstein (D-Calif.) pushed back on widespread condemnation of their Compliance with Court Orders Act, which would require tech companies to provide authorities with user data in an "intelligible" format if served with a warrant.
But security experts Bruce Schneir, Matthew Green, and others say the lawmakers entirely misunderstand the issue. "On a weekly basis we see gigabytes of that information dumped to the Internet," Green told the Daily Dot. "This is the whole problem that encryption is intended to solve." He added: "You can't hold out the current flaws in the Internet as a justification for why the Internet shouldn't be made secure."
83000665
submission
blottsie writes:
The latest debate over encryption did not begin with a court order demanding Apple help the FBI unlock a dead terrorist's iPhone. The new "Crypto Wars," chronicled in an comprehensive timeline by Eric Geller of the Daily Dot, dates back to at least 2003, with the introduction of "Patriot Act II." The battle over privacy and personal security versus crime-fighting and national security has, however, become a mainstream debate in recent months.