jump to navigation

Spyware embedded by U.S. in foreign networks, security firm says – Houston Chronicle February 17, 2015

Posted by sandyclaus in NSA, Security, Security State, US Military.
add a comment

Spyware embedded by U.S. in foreign networks, security firm says – Houston Chronicle.

The NSA’s Patents, in One Searchable Database August 2, 2014

Posted by sandyclaus in Academic Technology, NSA, Politics, Security State.
add a comment

What do a voice identifier, an automated translator, a “tamper-indicating” document tube, and a supersecure manhole cover have in common? They’re all technologies for which the secretive National Security Agency NSA has been granted patents by the U.S. government, giving the agency the exclusive rights to its inventions.The four technologies represent a tiny fraction of the more than 270 sleuthy devices, methods, and designs for which the nation’s biggest intelligence agency has been granted a patent since 1979, the earliest year for which public figures are available. As the patent holder, the NSA can license the particular technology — for a fee — to anyone who wants to use it, so long as the patent hasn’t expired.

via The NSA’s Patents, in One Searchable Database.

A Bundle of Tor | Linux Journal July 4, 2014

Posted by sandyclaus in NSA.
add a comment

I don’t know how many readers know this, but my very first Linux Journal column “Browse the Web without a Trace”, January 2008 was about how to set up and use Tor. Anonymity and privacy on the Internet certainly take on a different meaning in the modern era of privacy-invading software and general Internet surveillance. I recently went back and read my original column, and although the first few paragraphs were written six years ago, they seem just as relevant today:Is privacy dead? When I think about how much information my computer and my gadgets output about me on a daily basis, it might as well be. My cell phone broadcasts my general whereabouts, and my Web browser is worse—every site I visit knows I was there, what I looked at, what browser and OS I use, and if I have an account on the site, it could know much more.Even if you

via A Bundle of Tor | Linux Journal.

A Bundle of Tor | Linux Journal July 4, 2014

Posted by sandyclaus in Computer Security, NSA.
add a comment

I don’t know how many readers know this, but my very first Linux Journal column “Browse the Web without a Trace”, January 2008 was about how to set up and use Tor. Anonymity and privacy on the Internet certainly take on a different meaning in the modern era of privacy-invading software and general Internet surveillance. I recently went back and read my original column, and although the first few paragraphs were written six years ago, they seem just as relevant today:Is privacy dead? When I think about how much information my computer and my gadgets output about me on a daily basis, it might as well be. My cell phone broadcasts my general whereabouts, and my Web browser is worse—every site I visit knows I was there, what I looked at, what browser and OS I use, and if I have an account on the site, it could know much more.Even if you

via A Bundle of Tor | Linux Journal.

NSA targets Linux Journal as ‘extremist forum’: Report | ZDNet July 4, 2014

Posted by sandyclaus in Computer Security, NSA, Security State.
add a comment

The Linux Journal, a Linux user community website, has been flagged as an “extremist forum” by the United States’ National Security Agency NSA, while its users have been flagged as “extremists” under the agency’s XKeyscore program, according to leaked source code.The source code, which was published this week by German public broadcaster, ARD, also identified at least two German Tor Directory Authority servers — one in Berlin, the other in Nuremberg — as being under surveillance by the NSA.

via NSA targets Linux Journal as ‘extremist forum’: Report | ZDNet.

The errors of Edward Snowden and Glenn Greenwald May 21, 2014

Posted by sandyclaus in NSA, Politics.
add a comment

Edward Snowden is a child of the internet and at the same time an old American type—the solitary individual whose religion is conscience, and who follows his own regardless of where it takes him. The type goes back to the English Protestant dissenters who settled the New World in the 17th century. Its most eloquent exemplar was Henry David Thoreau, who wrote in “Civil Disobedience” (1849): “It is not desirable to cultivate a respect for the law, so much as for the right. The only obligation which I have a right to assume is to do at any time what I think right.” Thoreau withdrew to a cabin on Walden Pond, and he refused to pay taxes in protest against the Mexican War and slavery. Snowden lives in the hyperconnected isolation of the internet, and in June 2013 he committed what might have been the largest breach of state secrecy in American history, exposing the extent of internet and phone surveillance by the US National Security Agency (NSA).

via The errors of Edward Snowden and Glenn Greenwald.

Optic Nerve: millions of Yahoo webcam images intercepted by GCHQ March 5, 2014

Posted by sandyclaus in NSA, Politics, Privacy.
add a comment

• 1.8m users targeted by UK agency in six-month period alone

• Optic Nerve program collected Yahoo webcam images in bulk

• Yahoo: ‘A whole new level of violation of our users’ privacy’

• Material included large quantity of sexually explicit images

via Optic Nerve: millions of Yahoo webcam images intercepted by GCHQ.

N.S.A. Director Says Snowden Leaks Hamper Efforts Against Cyberattacks – NYTimes.com March 5, 2014

Posted by sandyclaus in NSA, Politics, Privacy, Security State.
add a comment

WASHINGTON — Gen. Keith B. Alexander, the director of the National Security Agency, said Tuesday that the leaks by the former agency contractor Edward J. Snowden had slowed the effort to protect the country against cyberattacks on Wall Street and other civilian targets.

via N.S.A. Director Says Snowden Leaks Hamper Efforts Against Cyberattacks – NYTimes.com.

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations – The Intercept February 26, 2014

Posted by sandyclaus in NSA.
add a comment

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

via How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations – The Intercept.

NSA To Sanders: We Can’t Tell You If We’re Spying On You In Order To Protect You January 15, 2014

Posted by sandyclaus in NSA, Security, Security State.
add a comment

The National Security Agency on Friday told Sen. Bernie Sanders (I-VT) that it cannot reveal whether the agency has been targeting members of Congress in its metadata collection because doing so would violate privacy provisions accorded to civilians in the program, the Huffington Post reported Tuesday.

\”Among those protections is the condition that NSA can query the metadata only based on phone numbers reasonably suspected to be associated with specific foreign terrorist groups,\” NSA chief Keith Alexander wrote in a letter to Sanders.

via NSA To Sanders: We Can’t Tell You If We’re Spying On You In Order To Protect You.