Edward Snowden was behind one of the biggest leaks of classified information in modern history. The only problem is that most of the information that he leaked is extraordinarily difficult to parse for the average American. Do you really understand what PRISM does? Do you have any idea how Executive Order 12333 affects your life?
The many Snowden revelations, which have detailed the advanced spying and mass data collection operations conducted by some of the world’s most important agencies including the NSA and the GCHQ, have revealed that various U.S. tech companies might also be involved, whether willingly or unwillingly, in some NSA programs. The implications of the leaks detailing the Prism data collection program – that says the NSA has access to personal customer data from various U.S. companies including Apple, Facebook, Skype, Microsoft and Yahoo – might be far greater than initially believed, as they could affect the U.S.-EU Safe Harbor Framework for transatlantic data transfer and connected trade deals. More →
While the NSA certainly has the technical chops to eavesdrop, monitor, and intercept all types of electronic communications, they’re also not afraid to employ more straightforward and simpler spycraft methods when it comes to keeping an eye on enemies of the state.
A new Snowden leak a few days ago revealed that the NSA and GCHQ conducted a complex hack operation that focused on obtaining the secure encryption keys that protect mobile communications in devices with SIM cards. A subsequent report revealed that the goal of spy agencies might have been a lot bigger, as they may have been hunting for other security keys that would let them deploy spyware on any mobile device with a SIM card inside, and users would have no idea that anything had happened. More →
A few days ago, a report revealed that spy agencies including the NSA and GCHQ, managed to bypass the security of SIM card manufacturer Gemalto and gain access to valuable encryption keys that protect cellphone signals. Even though Gemalto denied the reports, but The Verge points out that the hack might be more serious than initially believed, as it could give agencies the ability of infecting any phone using these specific SIM cards with additional spyware programs. More →
Spy agencies have some very smart tools at their disposal for their surveillance and data gathering operations, many leaks have revealed so far, but Russian security agency Kaspersky Lab has uncovered one of the most important such cyber weapon available to the NSA, Reuters reports. According to the company, a country which it decided not to identify, but which the publication confirmed to be the U.S., has been able to sneak malware in a critical part of a computer, which practically made it possible not only to spy on a variety of targets with ease, but also bypass any security measures, and reinfect the machines over and over. More →
Following the many Snowden leaks that revealed some of the advanced mass data collection practices employed by spy agencies including the NSA and GCHQ, a collection of privacy advocates including Privacy International, Bytes for All, Liberty and Amnesty International has just won a major case against these practices. More →
Protecting your privacy online is not an easy thing to do, especially when it comes to the prying eyes of the NSA and other spy agencies that have complex tools at their disposal to help them collect massive amounts of personal data. But it turns out there are certain tools that are difficult even for the NSA to hack, a new report from Der Spiegel reveals. More →
The ripples from the massive National Security Agency leak orchestrated by former contract worker Edward Snowden continue to be felt even now. While most of the eye-opening revelations are behind us, the sheer volume of confidential documents exposed by Snowden has resulted in a continued trickle of information. Now, a new report covering information pulled from leaked NSA documents reveals several encrypted services that the NSA has been able to crack in its widespread data collection efforts.
More importantly, perhaps, the report identifies a number of secure services with encryption that the NSA has been unable to crack. More →
The NSA’s far-reaching powers have been further detailed in an extensive report from The Intercept, which reveals that the agency has conducted an advanced spying operation for years in an effort to spy on mobile operators working on phone encryption. The operation reportedly also targeted bodies that oversee telecom standards, in order to stay updated on new security protocols and identify or even insert vulnerabilities into those communication networks it wanted access to. More →