Protecting your privacy online is not an easy thing to do, especially when it comes to the prying eyes of the NSA and other spy agencies that have complex tools at their disposal to help them collect massive amounts of personal data. But it turns out there are certain tools that are difficult even for the NSA to hack, a new report from Der Spiegel reveals. More →
The ripples from the massive National Security Agency leak orchestrated by former contract worker Edward Snowden continue to be felt even now. While most of the eye-opening revelations are behind us, the sheer volume of confidential documents exposed by Snowden has resulted in a continued trickle of information. Now, a new report covering information pulled from leaked NSA documents reveals several encrypted services that the NSA has been able to crack in its widespread data collection efforts.
More importantly, perhaps, the report identifies a number of secure services with encryption that the NSA has been unable to crack. More →
The NSA’s far-reaching powers have been further detailed in an extensive report from The Intercept, which reveals that the agency has conducted an advanced spying operation for years in an effort to spy on mobile operators working on phone encryption. The operation reportedly also targeted bodies that oversee telecom standards, in order to stay updated on new security protocols and identify or even insert vulnerabilities into those communication networks it wanted access to. More →
U.S. and U.K. spy agencies including the NSA and GCHQ, respectively, have performed a variety of sophisticated spy operations, collecting massive amounts of personal data, as many Edward Snowden leaks revealed in the past year. German publication Süddeutsche Zeitung has published a new report that reveals that as far back as 2009 the GCHQ, and thus also the NSA, had massive access to submarine cable links around the globe with help from now Vodafone-owned Cable & Wireless. More →
In light of the many detailed reports based on Edward Snowden’s leaks that revealed the sophisticated technologies the NSA and other spying agencies can employ for mass surveillance purposes, a new survey from Survata seems to indicate that Internet users are more afraid of their personal data being used by Google than the NSA. More →
Well over a year after the Snowden leaks changed the way we think of security in the United States, the man still has plenty of information left to reveal. In an exhaustive interview with Wired’s James Bamford, Snowden discussed the NSA’s development of a new cyberwarfare program codenamed MonsterMind which could automatically seek out patterns that indicate a looming cyberattack and stop them at the source. More →
Former NSA director Keith Alexander will charge companies up to $1 million a month to keep them safe from online hackers, Foreign Policy reports. Apparently Alexander and business partners from IronNet Cybersecurity have founded a new firm after leaving the government and military in March. The company supposedly offers a new technology that has a “unique” approach when it comes to detecting hackers online. More →
In case you didn’t know it by now, spy agencies are really good – and hopefully effective – at spying on people, including both actual valid targets as well as unsuspecting citizens who aren’t plotting anything bigger than a trip to an exotic country. To further demonstrate the power of one such agency – NSA’s close buddy, the British GCHQ, in this case – The Intercept has published a new Snowden leak, which reveals such ambitious mass spying plans, as well as their silly names. More →
The United States National Security Agency has had a rough year. It all began when former NSA contractor Edward Snowden infiltrated the agency’s systems and stole thousands upon thousands of confidential documents revealing many of the top-secret cyber surveillance programs the NSA has employed in recent years. The revelations began with PRISM but there have now been so many that it may be a good time for a quick recap. More →
More than a year ago, former NSA contractor Edward Snowden began leaking thousands of confidential documents that he stole while working for the National Security Agency. The documents shined light on a number of controversial spying methods employed by the government agency, many of which were considered violations of American citizens’ privacy.
There are very good arguments for and against Snowden’s actions, and one of the most valid arguments against the leaks was the suggestion that terrorists would alter their behavior and strategies in order to avoid the now-public NSA monitoring tactics. As it turns out, the NSA has now confirmed that this is indeed the case — but the problem apparently isn’t as serious as many people had feared. More →
After Edward Snowden’s NSA leaks from last year, rumors circulated that Snowden used Lavabit, which at the time was a hugely popular secure email service. Soon after that, Lavabit founder Ladar Levison wrote that he was forced to decide between being “complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit.” He decided to shut Lavabit down, and he added ominously, “I wish that I could legally share with you the events that led to my decision. I cannot.” More →
A new report from The Guardian reveals that NSA has allegedly been tampering with U.S.-made electronic equipment including servers, routers and other network devices that are exported to foreign markets in order to insert backdoor surveillance malware, which can be later activated to spy on networks. More →
Secretive agencies like the National Security Agency will not hurry to disclose future Heartbleed-like security issues, or at least they won’t always be interested in doing so, The White House revealed in a blog post. It also reiterated the fact that the NSA did not actually know about this major security bug that affected 66% of the entire Internet, as it was previously rumored. After all, the NSA denied everything on Twitter — and soon after, the NSA released its own set of instructions telling the public how to deal with the security flaw. More →