Skip to main content

Home/ Advanced Concepts Team/ Group items tagged NSA

Rss Feed Group items tagged

ESA ACT

NSA Whistleblower: Grill the CEOs on Illegal Spying | Threat Level from Wired.com - 0 views

  •  
    so if you want to hid anything from the NSA just say it in more than 2 min :-) ....
LeopoldS

Edward Snowden: the whistleblower behind the NSA surveillance revelations | World news ... - 2 views

  •  
    long live the sys admins!
  •  
    careful, NSA is listening... you are now in their blacklist
  •  
    "Annual Security Inspection at ESTEC"... ... What exactly is this P.R.I.S.M. process that is running on Sophia?
LeopoldS

"new" tablet form an unusual place - 2 views

  •  
    if any of you happen to pass by North Korea, get me one of these ... probably the only tablet on the market with out an NSA backdoor - unfortunately it can't connect to the internet either ....
  •  
    I am not so sure if its NSA backdoor proof (unless you mean no internet connection? :P), as it is build on Android OS (Ice Cream sandwich)
Dario Izzo

Heml.is - The Beautiful & Secure Messenger - 3 views

  •  
    And thats the answer to NSA form Pirate Bay .... not as soon as I expected, but still fast :)
LeopoldS

David Miranda, schedule 7 and the danger that all reporters now face | Alan Rusbridger ... - 0 views

  •  
    During one of these meetings I asked directly whether the government would move to close down the Guardian's reporting through a legal route - by going to court to force the surrender of the material on which we were working. The official confirmed that, in the absence of handover or destruction, this was indeed the government's intention. Prior restraint, near impossible in the US, was now explicitly and imminently on the table in the UK. But my experience over WikiLeaks - the thumb drive and the first amendment - had already prepared me for this moment. I explained to the man from Whitehall about the nature of international collaborations and the way in which, these days, media organisations could take advantage of the most permissive legal environments. Bluntly, we did not have to do our reporting from London. Already most of the NSA stories were being reported and edited out of New York. And had it occurred to him that Greenwald lived in Brazil?

    The man was unmoved. And so one of the more bizarre moments in the Guardian's long history occurred - with two GCHQ security experts overseeing the destruction of hard drives in the Guardian's basement just to make sure there was nothing in the mangled bits of metal which could possibly be of any interest to passing Chinese agents. "We can call off the black helicopters," joked one as we swept up the remains of a MacBook Pro.

    Whitehall was satisfied, but it felt like a peculiarly pointless piece of symbolism that understood nothing about the digital age. We will continue to do patient, painstaking reporting on the Snowden documents, we just won't do it in London. The seizure of Miranda's laptop, phones, hard drives and camera will similarly have no effect on Greenwald's work.

    The state that is building such a formidable apparatus of surveillance will do its best to prevent journalists from reporting on it. Most journalists can see that. But I wonder how many have truly understood
  •  
    Sarah Harrison is a lawyer that has been staying with Snowden in Hong Kong and Moscow. She is a UK citizen and her family is there. After the miranda case where the boyfriend of the reporter was detained at the airport, can Sarah return safely home? Will her family be pressured by the secret service? http://www.bbc.co.uk/news/world-latin-america-23759834
LeopoldS

Tox: A New Kind of Instant Messaging - 5 views

shared by LeopoldS on 02 Sep 14 - No Cached
  •  
    skype alternative - open source, no central server, encryption built in ....
  • ...4 more comments...
  •  
    It's free and w/o ads. What's the business model? Their page doesn't say anything about it.
  •  
    To help society...
  •  
    They plan to secretly capture all communications and then sell them to NSA...
  •  
    probably developed by the NSA directly
  •  
    its open source - go check it :-)
  •  
    my ID: 7C53B574D888EE0E2A97FCD62B144DD14730E45C1B7158D4ED3EBCCB920CB93A68C62E6C9385
LeopoldS

Crypto-Gram: October 15, 2013 - 2 views

  •  
    interesting blog entry on TOR and the NSA
  •  
    on a somewhat related note. court document from the fbi agent that was chasing that silk road guy a friend sent me the other week. an interesting read if only because i found the content quite unexpected e.g. 2 pages of login instructions http://www1.icsi.berkeley.edu/~nweaver/UlbrichtCriminalComplaint.pdf
ESA ACT

Nice "old" NSA article about electronic surveillance - 0 views

  •  
    in case you have free time and interest ...
Thijs Versloot

Dutch NSA says merry christmas with this crypto christmas puzzle (Dutch) - 0 views

  •  
    Each year the dutch NSA (AIVD) comes out with a christmas puzzle (never knew) which consists of 20 severe cryptic questions. Unfortunately, all the questions are in Dutch :( I solved 3 at the moment...
LeopoldS

Operation Socialist: How GCHQ Spies Hacked Belgium's Largest Telco - 4 views

  •  
    interesting story with many juicy details on how they proceed ... (similarly interesting nickname for the "operation" chosen by our british friends) "The spies used the IP addresses they had associated with the engineers as search terms to sift through their surveillance troves, and were quickly able to find what they needed to confirm the employees' identities and target them individually with malware. The confirmation came in the form of Google, Yahoo, and LinkedIn "cookies," tiny unique files that are automatically placed on computers to identify and sometimes track people browsing the Internet, often for advertising purposes. GCHQ maintains a huge repository named MUTANT BROTH that stores billions of these intercepted cookies, which it uses to correlate with IP addresses to determine the identity of a person. GCHQ refers to cookies internally as "target detection identifiers." Top-secret GCHQ documents name three male Belgacom engineers who were identified as targets to attack. The Intercept has confirmed the identities of the men, and contacted each of them prior to the publication of this story; all three declined comment and requested that their identities not be disclosed. GCHQ monitored the browsing habits of the engineers, and geared up to enter the most important and sensitive phase of the secret operation. The agency planned to perform a so-called "Quantum Insert" attack, which involves redirecting people targeted for surveillance to a malicious website that infects their computers with malware at a lightning pace. In this case, the documents indicate that GCHQ set up a malicious page that looked like LinkedIn to trick the Belgacom engineers. (The NSA also uses Quantum Inserts to target people, as The Intercept has previously reported.) A GCHQ document reviewing operations conducted between January and March 2011 noted that the hack on Belgacom was successful, and stated that the agency had obtained access to the company's
  •  
    I knew I wasn't using TOR often enough...
  •  
    Cool! It seems that after all it is best to restrict employees' internet access only to work-critical areas... @Paul TOR works on network level, so it would not help here much as cookies (application level) were exploited.
Athanasia Nikolaou

How the NSA Identified Satoshi Nakamoto - Slashdot - 1 views

  •  
    The source is anonymous
LeopoldS

The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Leve... - 0 views

  •  
    scaring ...
LeopoldS

Cell phones are 'Stalin's dream,' says free software movement founder - 3 views

  •  
    "I don't have a cell phone. I won't carry a cell phone," says Stallman, founder of the free software movement and creator of the GNU operating system. "It's Stalin's dream. Cell phones are tools of Big Brother. I'm not going to carry a tracking device that records where I go all the time, and I'm not going to carry a surveillance device that can be turned on to eavesdrop." he is right once more ...
  •  
    I am going to live in the forest! Sadly, while true, there's no way around it these days. On the up-side the information overflow these days exceeds processing speeds. Soon it will become increasingly difficult for NSA or other organizations to find anything in the tons of data they stash away. Like some guy said in a random youtube video I can't find now anymore: "good luck trying to find my personal data when I'm tagged in 5000 pictures of cats!"
H H

The Search Engine You're Probably Not Using - 4 views

  •  
    The search engine that gives you google results without NSA knowing.
Dario Izzo

How to visualize what your metadata say about you - 3 views

  •  
    A cool add on from MIT to understand, visualizing, what google knows about you
LeopoldS

The edge of the abyss: exposing the NSA's all-seeing machine | The Verge - 0 views

  •  
    nice summary overview
johannessimon81

GCHQ and European spy agencies worked together on mass surveillance - 1 views

  •  
    "Edward Snowden papers unmask close technical cooperation and loose alliance between British, German, French, Spanish and Swedish spy agencies" - I thought we were the good guys... ;-D
jcunha

scrible | smarter online research - annotate, organize & collaborate on web pages - 2 views

  •  
    A personal need for organizing the information I access online, going away from the pdf print of page, or browser tab just lying open for ages (Anna style) brought me here. Seems to be a quite good and featureful service, sponsored by the NSF.
  •  
    not convinced ... still stick to pdf for time being
  •  
    NSF, NSA, more or less the same. I'm growing increasingly weary about giving increasingly more private data away to online services.
1 - 20 of 23 Next ›
Showing 20 items per page