Republican presidential candidate Jeb Bush — or just “Jeb!” as he’s called in his campaign signs — probably won’t win the endorsement of the Electronic Frontier Foundation given his positions on tech policy. In fact, we can’t imagine many Silicon Valley types are pleased with Jeb’s latest declarations this week that as president he’ll kill net neutrality rules while at the same time bulking up the data collection powers of the National Security Agency. More →
The National Security Agency (NSA) has a bunch of sophisticated tools at its disposal to conduct massive data collection operations all in the name of doing good – and that’s definitely something you’d want from your intelligence agencies. Ironically, the NSA is already worried about the advanced computers that might be available to humans in the not so distant future, which could be used by hackers to break the complex cryptography that makes possible encryption. More →
Spy agencies like the NSA and many others aren’t the only ones able to bug your calls and text messages, a new investigation shows. It turns out that anyone with the right equipment and know-how can tap into a carrier’s phone network to access calls and text messages for without the target’s knowledge. More →
For decades, AT&T actively helped the NSA engage in widespread surveillance on both phone calls and Internet traffic. Citing documents made available by former NSA employee Edward Snowden, The New York Times and ProPublica both report that AT&T and the NSA have long shared a working relationship that is much closer than most people previously imagined.
In what one classified document termed a “highly collaborative” relationship, AT&T employed a number of varying methods to help the NSA acquire an incomprehensible amount of data.
NBC News this week obtained leaked slides from a February 2014 NSA presentation which highlight in specific detail the extent to which China has successfully hacked U.S. corporations and individuals.
As indicated by the map above, each red dot represents a unique “successful Chinese attempt to steal corporate and military secrets and data about America’s critical infrastructure, particularly the electrical power and telecommunications and internet backbone.” All told, there were nearly 700 successful hacking attempts on U.S. targets over the last five years.
Russian antivirus company Kaspersky revealed recently that it was the target of hackers behind the Stuxnet and Duqu worms last year. The hackers have been attacking the company’s network for months, collecting data on its operations and software. But it turns out that intelligence agencies including the NSA and GCHQ have spied on antivirus companies for years, looking for exploitable vulnerabilities. More →
Intelligence agencies in the U.S. won’t be able to use some of their highly sophisticated spying programs on Americans as easily as before, as certain portions of the Patriot Act have just expired on Sunday just before midnight, after the U.S. Senate decided not to extend them. More →
Once again, we have to tip our cap in grudging admiration for the lengths the National Security Administration will go to hack into our mobile devices. The Intercept has published some new documents leaked by Edward Snowden that show how the NSA and other spy agencies at one point planned to conduct man-in-the-middle attacks between end users and Android app stores to infect users’ phones with spyware. More →
Edward Snowden was behind one of the biggest leaks of classified information in modern history. The only problem is that most of the information that he leaked is extraordinarily difficult to parse for the average American. Do you really understand what PRISM does? Do you have any idea how Executive Order 12333 affects your life?
The many Snowden revelations, which have detailed the advanced spying and mass data collection operations conducted by some of the world’s most important agencies including the NSA and the GCHQ, have revealed that various U.S. tech companies might also be involved, whether willingly or unwillingly, in some NSA programs. The implications of the leaks detailing the Prism data collection program – that says the NSA has access to personal customer data from various U.S. companies including Apple, Facebook, Skype, Microsoft and Yahoo – might be far greater than initially believed, as they could affect the U.S.-EU Safe Harbor Framework for transatlantic data transfer and connected trade deals. More →
While the NSA certainly has the technical chops to eavesdrop, monitor, and intercept all types of electronic communications, they’re also not afraid to employ more straightforward and simpler spycraft methods when it comes to keeping an eye on enemies of the state.
A new Snowden leak a few days ago revealed that the NSA and GCHQ conducted a complex hack operation that focused on obtaining the secure encryption keys that protect mobile communications in devices with SIM cards. A subsequent report revealed that the goal of spy agencies might have been a lot bigger, as they may have been hunting for other security keys that would let them deploy spyware on any mobile device with a SIM card inside, and users would have no idea that anything had happened. More →