Snowden Leak: NSA Flagged Israel as Leading Espionage Threat - 0 views
-
The National Security Agency listed Israel among a handful of nations considered to pose the “greatest threat” to American government, military and industrial secrets, classified documents leaked by whistleblower Edward Snowden reveal.
FBI surveillance malware in bomb threat case tests constitutional limits | Ars Technica - 0 views
-
The FBI has an elite hacker team that creates customized malware to identify or monitor high-value suspects who are adept at covering their tracks online, according to a published report.
-
as the capability to remotely activate video cameras and report users' geographic locations—is pushing the boundaries of constitutional limits on searches and seizures
-
Critics compare it to a physical search that indiscriminately seizes the entire contents of a home, rather than just those items linked to a suspected crime. Former US officials said the FBI uses the technique sparingly, in part to prevent it from being widely known.
- ...1 more annotation...
Snowden Keeps Outwitting U.S. Spies - The Daily Beast - 0 views
-
First, it assumes that Snowden’s master file includes data from every network he ever scanned. Second, it assumes that this file is already in or will end up in the hands of America’s adversaries. If these assumptions turn out to be true, then the alarm raised in the last week will be warranted. The key word here is “if.”
-
One U.S. intelligence official briefed on the report said the DIA concluded that Snowden visited classified facilities outside the NSA station where he worked in Hawaii while he was downloading the documents he would eventually leak to journalists Glenn Greenwald and Barton Gellman. On Tuesday, Clapper himself estimated that less than 10 percent of the documents Snowden took were from the NSA.
-
assume
- ...10 more annotations...
How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputatio... - 0 views
-
“The Art of Deception: Training for Online Covert Operations.”
-
Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.
-
Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends. The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:
- ...4 more annotations...
F-Secure: Android accounted for 97% of all mobile malware in 2013, but only 0.1% of tho... - 0 views
-
Android threats are primarily a non-US problem
-
F-Secure believes it would be incorrect to say that “Google hasn’t been actively making efforts to increase the security of the Android platform.”
-
At the very bottom of the list was Google Play itself, with the lowest percentage of malware in the gathered samples: 0.1 percent. F-Secure also noted that “the Play Store is most likely to promptly remove nefarious applications, so malware encountered there tends to have a short shelf life.”
NSA's bulk phone data collection ruled unconstitutional, 'almost Orwellian,' by federal... - 0 views
-
“The government does not cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack,” the judge wrote.
-
“Given the limited record before me at this point in the litigation – most notably, the utter lack of evidence that a terrorist attack has ever been prevented because searching the NSA database was faster than other investigative tactics – I have serious doubts about the efficacy of the metadata collection program as a means of conducting time-sensitive investigations in cases involving imminent threats of terrorism.”
-
“I acted on my belief that the NSA's mass surveillance programs would not withstand a constitutional challenge, and that the American public deserved a chance to see these issues determined by open courts,” Snowden wrote. “Today, a secret program authorized by a secret court was, when exposed to the light of day, found to violate Americans’ rights. It is the first of many.”
Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks | Ars Technica - 0 views
-
Since some time in the second half of 2014, a different state-sponsored group had been casing their corporate network using malware derived from Stuxnet, the highly sophisticated computer worm reportedly created by the US and Israel to sabotage Iran’s nuclear program.
-
the malware was more advanced than the malicious programs developed by the NSA-tied Equation Group that Kaspersky just exposed. More intriguing still, Kaspersky antivirus products showed the same malware has infected one or more venues that hosted recent diplomatic negotiations the US and five other countries have convened with Iran over its nuclear program.
-
We see this battle or arms race emerging and now it involves some kind of confrontation between the security industry and nation-state sponsored spies
- ...3 more annotations...
Destructive cyber attack inevitable: NSA chief - 0 views
-
The US National Security Agency (NSA) chief General Keith Alexander, pictured here in 2010, on Thursday urged top computer security specialists to harden the nation's critical infrastructure against inevitable destructive cyber attacks. LUMPY HAS NOTES BELOW THISQUOTE Ties in with Stuxnet and Anonymous and Antonymous having Stuxnet. Might make a nice security and malware 30 news shows
1 - 10 of 10
Showing 20▼ items per page