Skip to main content

Home/ Advanced Concepts Team/ Group items tagged surveillance

Rss Feed Group items tagged

LeopoldS

Operation Socialist: How GCHQ Spies Hacked Belgium's Largest Telco - 4 views

  •  
    interesting story with many juicy details on how they proceed ... (similarly interesting nickname for the "operation" chosen by our british friends) "The spies used the IP addresses they had associated with the engineers as search terms to sift through their surveillance troves, and were quickly able to find what they needed to confirm the employees' identities and target them individually with malware. The confirmation came in the form of Google, Yahoo, and LinkedIn "cookies," tiny unique files that are automatically placed on computers to identify and sometimes track people browsing the Internet, often for advertising purposes. GCHQ maintains a huge repository named MUTANT BROTH that stores billions of these intercepted cookies, which it uses to correlate with IP addresses to determine the identity of a person. GCHQ refers to cookies internally as "target detection identifiers." Top-secret GCHQ documents name three male Belgacom engineers who were identified as targets to attack. The Intercept has confirmed the identities of the men, and contacted each of them prior to the publication of this story; all three declined comment and requested that their identities not be disclosed. GCHQ monitored the browsing habits of the engineers, and geared up to enter the most important and sensitive phase of the secret operation. The agency planned to perform a so-called "Quantum Insert" attack, which involves redirecting people targeted for surveillance to a malicious website that infects their computers with malware at a lightning pace. In this case, the documents indicate that GCHQ set up a malicious page that looked like LinkedIn to trick the Belgacom engineers. (The NSA also uses Quantum Inserts to target people, as The Intercept has previously reported.) A GCHQ document reviewing operations conducted between January and March 2011 noted that the hack on Belgacom was successful, and stated that the agency had obtained access to the company's
  •  
    I knew I wasn't using TOR often enough...
  •  
    Cool! It seems that after all it is best to restrict employees' internet access only to work-critical areas... @Paul TOR works on network level, so it would not help here much as cookies (application level) were exploited.
LeopoldS

David Miranda, schedule 7 and the danger that all reporters now face | Alan Rusbridger ... - 0 views

  •  
    During one of these meetings I asked directly whether the government would move to close down the Guardian's reporting through a legal route - by going to court to force the surrender of the material on which we were working. The official confirmed that, in the absence of handover or destruction, this was indeed the government's intention. Prior restraint, near impossible in the US, was now explicitly and imminently on the table in the UK. But my experience over WikiLeaks - the thumb drive and the first amendment - had already prepared me for this moment. I explained to the man from Whitehall about the nature of international collaborations and the way in which, these days, media organisations could take advantage of the most permissive legal environments. Bluntly, we did not have to do our reporting from London. Already most of the NSA stories were being reported and edited out of New York. And had it occurred to him that Greenwald lived in Brazil?

    The man was unmoved. And so one of the more bizarre moments in the Guardian's long history occurred - with two GCHQ security experts overseeing the destruction of hard drives in the Guardian's basement just to make sure there was nothing in the mangled bits of metal which could possibly be of any interest to passing Chinese agents. "We can call off the black helicopters," joked one as we swept up the remains of a MacBook Pro.

    Whitehall was satisfied, but it felt like a peculiarly pointless piece of symbolism that understood nothing about the digital age. We will continue to do patient, painstaking reporting on the Snowden documents, we just won't do it in London. The seizure of Miranda's laptop, phones, hard drives and camera will similarly have no effect on Greenwald's work.

    The state that is building such a formidable apparatus of surveillance will do its best to prevent journalists from reporting on it. Most journalists can see that. But I wonder how many have truly understood
  •  
    Sarah Harrison is a lawyer that has been staying with Snowden in Hong Kong and Moscow. She is a UK citizen and her family is there. After the miranda case where the boyfriend of the reporter was detained at the airport, can Sarah return safely home? Will her family be pressured by the secret service? http://www.bbc.co.uk/news/world-latin-america-23759834
LeopoldS

Edward Snowden: the whistleblower behind the NSA surveillance revelations | World news ... - 2 views

  •  
    long live the sys admins!
  •  
    careful, NSA is listening... you are now in their blacklist
  •  
    "Annual Security Inspection at ESTEC"... ... What exactly is this P.R.I.S.M. process that is running on Sophia?
johannessimon81

Sochi Official: Our Shower Surveillance Footage Says Hotels Are Fine - 3 views

  •  
    Among other things reporters say that bathroom facilities are terrible in Sochi. But according to the Deputy Prime Minister guest in hotels are on purpose using shower facilities incorrectly, as surveillance videos show. :-D
LeopoldS

Cell phones are 'Stalin's dream,' says free software movement founder - 3 views

  •  
    "I don't have a cell phone. I won't carry a cell phone," says Stallman, founder of the free software movement and creator of the GNU operating system. "It's Stalin's dream. Cell phones are tools of Big Brother. I'm not going to carry a tracking device that records where I go all the time, and I'm not going to carry a surveillance device that can be turned on to eavesdrop." he is right once more ...
  •  
    I am going to live in the forest! Sadly, while true, there's no way around it these days. On the up-side the information overflow these days exceeds processing speeds. Soon it will become increasingly difficult for NSA or other organizations to find anything in the tons of data they stash away. Like some guy said in a random youtube video I can't find now anymore: "good luck trying to find my personal data when I'm tagged in 5000 pictures of cats!"
johannessimon81

GCHQ and European spy agencies worked together on mass surveillance - 1 views

  •  
    "Edward Snowden papers unmask close technical cooperation and loose alliance between British, German, French, Spanish and Swedish spy agencies" - I thought we were the good guys... ;-D
Paul N

Hacking Team Breach Shows a Global Spying Firm Run Amok | WIRED - 1 views

  •  
    Few news events can unleash more schadenfreude within the security community than watching a notorious firm of hackers-for-hire become a hack target themselves. In the case of the freshly disemboweled Italian surveillance firm Hacking Team, the company may also serve as a dark example of a global surveillance industry that often sells to any government willing to pay, with little regard for that regime's human rights record. Scroll down for the commercial. :)) Funny that when I keep complaining about privacy and monitoring, people still point and laugh.
  •  
    And the direct link to the whole stash: https://ht.transparencytoolkit.org/ Their admin kept a plain text file with passwords on his desktop. Maybe they should have hired someone to do an audit :) More importantly, from the files it follows that this company found and exploited yet another vulnerability in Flash. So the current round of plugin/browser updates is thanks to this hack :)
  •  
    The vulnerability only seemed to affect some of the more recent versions. Maybe from time to time we should downgrade flash to avoid them :))
Aurelie Heritier

DARPA developing simple chameleon robot that may cost under $100 | Government Security ... - 0 views

  •  
    A low-cost rubber robot that can change color to match its surroundings like a chameleon, light up in the dark, change temperatures and fit into tight places is under development at DARPA for potential defense and surveillance applications.
Beniamino Abis

FAA approves first drones for commercial operations in US airspace - 0 views

  •  
    Let's see what happens next, and compare it to our discussion.
Thijs Versloot

Taking the internet underwater - 0 views

  •  
    University at Buffalo researchers are developing a deep-sea Internet. The technological breakthrough could lead to improvements in tsunami detection, offshore oil and natural gas exploration, surveillance, pollution monitoring...
Thijs Versloot

Tiny robots that can jump on water created by scientists [Video] - 2 views

  •  
    Small robots that jump on water have been created by scientists and could one day be used in surveillance and search and rescue missions. The team led by Seoul National University's Je-Sung Koh studied water striders to replicate the insect's ability to propel itself from the surface of water.
Juxi Leitner

The Associated Press: Launch set for US satellite to monitor space junk - 0 views

  • It's designed to give the Air Force its first full-time, space-based surveillance of satellites and debris in Earth's orbit. It monitors them for possible collisions.
pacome delva

Fruit Fly Aerial Maneuver Explained - 1 views

  • Insects can execute flying feats more impressive than fighter jets, and a team of researchers has now learned the trick behind one of them. They used high speed video cameras and a new 3D reconstruction technique to show how fruit flies execute their acrobatic turns. As they report in the 9 April Physical Review Letters, despite the complex wing motions, a fly can execute quick pirouettes by adjusting just a single parameter that controls the difference between the way its left and right wings oscillate. The results may be relevant for engineers designing flight control strategies for tiny robotic insects for search-and-rescue and surveillance.
ESA ACT

Nice "old" NSA article about electronic surveillance - 0 views

  •  
    in case you have free time and interest ...
ESA ACT

What's at Stake in the Surveillance Debate in Congress - 0 views

  •  
    not science at all .... of concern?
LeopoldS

Schneier on Security: NSA Targets the Privacy-Conscious for Surveillance - 0 views

  •  
    ever wanted to feel an important extremist to be of interest to big brother - just google for tor :-) it was never easier to be come an "extremist" what are the consequences of this? new opportunities for secure space-based communication services?
LeopoldS

Fooling automated surveillance cameras: adversarial patches to attack person detection - 3 views

  •  
    beautiful! anybody knows of similar trials to fool EO data classifiers?
  •  
    I am not aware of any similar trials, yet this study remind me of generative adversarial talking heads https://arxiv.org/pdf/1803.07716.pdf https://www.youtube.com/watch?v=p1b5aiTrGzY
1 - 20 of 20
Showing 20 items per page