NSA Encryption Backdoors Privacy

The NSA has a brilliant stance on encryption

By on January 22, 2016 at 8:24 PM.

The NSA has a brilliant stance on encryption

Discussions about the U.S. government’s need for breaking encryption have intensified following the mid-November attacks in Paris. Law enforcement agencies including the FBI and politicians have challenged tech leaders from Silicon Valley to find ways to include backdoors in encrypted products. That way, surveillance operations targeting potential terror suspects might have a better chance of successfully intercepting relevant communication.

Tech leaders, meanwhile, have stood firm against crippling encryption with backdoors, with Apple and Tim Cook at the forefront of this argument. That doesn’t mean tech companies unwilling to help intelligence agencies address terrorist threats – but they’ll just do it differently for the time being.

With all that in mind, one can’t help but applaud the NSA’s brilliant stance on encryption while simultaneously feeling a chill running down your spine. More →

No Comments
Jeb Bush Police State NSA

Meet Jeb Bush’s police state: The NSA in charge of civilian data

By on January 15, 2016 at 7:45 PM.

Meet Jeb Bush’s police state: The NSA in charge of civilian data

Given the various recent terrorist attacks, it’s no wonder that hackers, cybersecurity, encryption and surveillance are all major topics of this year’s presidential campaign. Encryption was on the table during the sixth Republican debate on Thursday night, with Jeb Bush proposing a solution for guarding the American people that seems to be taken out of a George Orwell novel. More →

No Comments
EX NSA Director Hayden Encryption

Ex-NSA chief defends end-to-end encryption, says ‘backdoors’ will make us less secure

By on January 13, 2016 at 12:57 PM.

Ex-NSA chief defends end-to-end encryption, says ‘backdoors’ will make us less secure

No one will ever accuse the National Security Agency of being champions of privacy. But General Michael Hayden, a former Director of the NSA, does see some value in preserving secure end-to-end encryption on the web without giving government agencies their own “backdoors” they can use to break it in the name of intelligence gathering. Per CNN, Hayden told a cybersecurity conference in Florida this week that breaking encryption would not make Americans safer even if encrypted communications do pose new challenges for intelligence and law enforcement agencies. More →

No Comments
Government Surveillance

Bombshell report details dozens of secret devices U.S. Government uses to track cellphones

By on December 17, 2015 at 3:58 PM.

Bombshell report details dozens of secret devices U.S. Government uses to track cellphones

Though Edward Snowden’s first revelations regarding NSA surveillance surfaced more than two years ago, government surveillance remains a hot-button and controversial topic because we’re still learning about the full extent of spy agencies’ tracking and eavesdropping capabilities.

The latest news surrounding NSA, and in a broader sense – governmental surveillance, comes from a fascinating new report from The Intercept which details and catalogs an extensive list of devices the military and U.S. government agencies use to listen in on cell phone conversations, jam a phone, and even track individual user locations. Some devices, a few of which are small enough to be carried in a backpack or even on someone’s person, can track a target’s location even when they’re not making a call.

The catalog itself, which was provided to The Intercept by a source within the intelligence community, lists out dozens of devices used to keep tabs on targets. While some devices are purportedly for military-only use, others are reportedly already being used by local police forces across various parts of the country.

More →

No Comments
NSA Tor Tails Online Privacy

The NSA will spy on you for reading this article

By on December 16, 2015 at 7:15 AM.

The NSA will spy on you for reading this article

Are you looking for ways to protect your privacy while browsing the web? Are you trying to learn how to use Tor, the browser that anonymizes your Internet traffic? Are you interested in ditching Windows for something that’s more privacy-friendly? The good news is that there are ways to do that. The bad news is that this sort of online behavior apparently triggers NSA spying, especially if you’re a foreigner. More →

No Comments
NSA Email Surveillance Program

Loophole lets the NSA spy on your email even though it’s not allowed to anymore

By on November 20, 2015 at 7:30 PM.

Loophole lets the NSA spy on your email even though it’s not allowed to anymore

The NSA and other Western spy agencies came under intense scrutiny following the massive Snowden leaks that revealed their tremendous powers when it comes to collecting increasing amounts of personal data. And while the U.S. government had to take steps to try to limit the NSA’s reach following these revelations, it turns out that the intelligence agency can bypass existing laws and still collect plenty of data – such as email – even though it’s not supposed to be legal

More →

No Comments
Opinions
Paris ISIS Attacks Encryption

Selling us safety: The huge PR problem spy agencies have on their hands

By on November 18, 2015 at 10:59 AM.

Selling us safety: The huge PR problem spy agencies have on their hands

The horrendous November 13th attacks on Paris are exactly what intelligence agencies have told us all along: Something bad will happen because they can’t conduct massive surveillance operations in light of the Snowden revelations, and because more products and online services offer end-to-end encryption that can’t be tapped into.

The NSA and all its international partners might be right about encryption, but at the same time, they’re doing a poor job of selling it to the public. It’s all a huge PR mess. More →

No Comments
NSA Encryption Flaw Spy

How the NSA broke encryption on trillions of secure connections

By on October 20, 2015 at 5:30 PM.

How the NSA broke encryption on trillions of secure connections

Some Edward Snowden leaks have revealed that the NSA and other intelligence agencies can break encryption barriers for mass surveillance purposes. It has been theorized that a flaw in encryption used by many Internet services lets the spy agency decrypt HTTPS, SSH, and VPN traffic, and a new paper seems to prove that.

Indeed, a massive effort comparable to the attempts of breaking the German Enigma coding machine during the World War II seems to have given the NSA the tools required to break trillions of secure connections. More →

No Comments
Jeb Bush Net Neutrality NSA

Jeb’s plan to woo Silicon Valley: Gut net neutrality, kill encryption, bulk up NSA

By on September 23, 2015 at 9:30 PM.

Jeb’s plan to woo Silicon Valley: Gut net neutrality, kill encryption, bulk up NSA

Republican presidential candidate Jeb Bush — or just “Jeb!” as he’s called in his campaign signs — probably won’t win the endorsement of the Electronic Frontier Foundation given his positions on tech policy. In fact, we can’t imagine many Silicon Valley types are pleased with Jeb’s latest declarations this week that as president he’ll kill net neutrality rules while at the same time bulking up the data collection powers of the National Security Agency. More →

No Comments
NSA Encryption Quantum Computers

Irony: NSA worried hackers with super computers might break current encryption standards

By on August 25, 2015 at 6:35 PM.

Irony: NSA worried hackers with super computers might break current encryption standards

The National Security Agency (NSA) has a bunch of sophisticated tools at its disposal to conduct massive data collection operations all in the name of doing good – and that’s definitely something you’d want from your intelligence agencies. Ironically, the NSA is already worried about the advanced computers that might be available to humans in the not so distant future, which could be used by hackers to break the complex cryptography that makes possible encryption.  More →

No Comments
Call Text Messages Bugging SS7 Hack

Huge phone network security flaw lets anyone bug calls and text messages

By on August 18, 2015 at 12:46 PM.

Huge phone network security flaw lets anyone bug calls and text messages

Spy agencies like the NSA and many others aren’t the only ones able to bug your calls and text messages, a new investigation shows. It turns out that anyone with the right equipment and know-how can tap into a carrier’s phone network to access calls and text messages for without the target’s knowledge. More →

No Comments
AT&T NSA

How AT&T helped the NSA spy on Internet traffic

By on August 17, 2015 at 7:45 AM.

How AT&T helped the NSA spy on Internet traffic

For decades, AT&T actively helped the NSA engage in widespread surveillance on both phone calls and Internet traffic. Citing documents made available by former NSA employee Edward Snowden, The New York Times and ProPublica both report that AT&T and the NSA have long shared a working relationship that is much closer than most people previously imagined.

In what one classified document termed a “highly collaborative” relationship, AT&T employed a number of varying methods to help the NSA acquire an incomprehensible amount of data.

More →

No Comments
NSA China Hacking

Leaked NSA slides: Chinese hackers have been wreaking havoc on corporate America

By on July 31, 2015 at 10:15 PM.

Leaked NSA slides: Chinese hackers have been wreaking havoc on corporate America

NBC News this week obtained leaked slides from a February 2014 NSA presentation which highlight in specific detail the extent to which China has successfully hacked U.S. corporations and individuals.

As indicated by the map above, each red dot represents a unique “successful Chinese attempt to steal corporate and military secrets and data about America’s critical infrastructure, particularly the electrical power and telecommunications and internet backbone.” All told, there were nearly 700 successful hacking attempts on U.S. targets over the last five years.

More →

No Comments