Group items matching
in title, tags, annotations or urlInside NZ Police Megaupload files: US investigation began in 2010 | Ars Technica - 0 views
-
Further evidence of overeager and illegal police work emerged Thursday in New Zealand as Inspector General of Security and Intelligence Paul Neazor released a report on the illegal bugging of Kim Dotcom and Megaupload programmer Bram van der Kolk. Two GCSB officers were present at a police station nearby Dotcom’s mansion as the raid took place.
-
Police weighed several options for the raid named “Operation Debut,” undertaken at the behest of US authorities, and sought to take Dotcom and associates with the “greatest element of surprise” and to minimise any delays the in executing the search and seizure operation should the German file sharing tycoon’s staff be uncooperative or even resist officers on arrival.
-
The police planners also noted that “Dotcom will use violence against person’s [sic] and that he has several staff members who are willing to use violence at Dotcom’s bidding” after a U.S. cameraman, Jess Bushyhead, reported the Megaupload founder for assaulting him with his stomach after a dispute. Based on Dotcom’s license plates such as MAFIA, POLICE, STONED, GUILTY, and HACKER, police said this indicates the German “likes to think of himself as a gangster” and is “described as arrogant, flamboyant and having disregard for law enforcement.” However, the documents show that Dotcom had only been caught violating the speed limit in New Zealand. The request for assistance from the STG notes that the US investigation against Mega Media Group and Dotcom was started in March 2010 by prosecutors and the FBI. According to the documents, US prosecutors and FBI “discovered that the Mega Media Group had engaged in and facilitated criminal copyright infringement and money laundering on a massive scale around the world.” FBI in turn contacted NZ Police in “early 2011," requesting assistance with the Mega Media Group investigation as Dotcom had moved to New Zealand at the time.
Ain't No Science Fiction, Suspended Animation Is FDA Approved and Heading To Clinical Trials | Singularity Hub - 0 views
-
The Food and Drug Administration has already approved his technique for human trials, and he has secured funding from the Army to conduct the feasibility phase. Dr. Rhee is currently lobbying for funds to conduct a full trial. If he’s successful human trials could begin as early as next year.
-
What Dr. Rhee hopes to test on humans is a method he worked out for the past couple decades on pigs. Patients would be injected with a cold fluid to induce severe hypothermia. Clinically hypothermia is characterized by the drop of a person’s body temperature from its normal 98.6 degrees Fahrenheit (37 degrees Celcius) to lower than 95 degrees (35 C). Below 95, the heart, nervous system and other organs begin to fail. The strict range is indicative of a metabolic system with strict temperature requirements for proper function (death waits only a few degrees the other way as well). Dr. Rhee’s method involves injecting patients with a cold fluid that would bring the body’s temperature down to 50 degrees Fahrenheit (10 C). Sounds chilling, but when he induced the extreme hypothermia in pigs they came out just fine. Heart function, breathing, and brain function was completely normal.
-
Dr. Rhee is no stranger to high-stakes medicine. The native South Korean was trained at the Uniformed Services University Medical School in Bethesda, Maryland. Following a fellowship in trauma and critical care at the University of Washington’s Harborview Medical Center he served in the US Navy as director of the University of South California’s Navy Trauma Training Center at Los Angeles County. He was then sent to Afghanistan where he was one of the first surgeons at Camp Rhino. Later he started the first surgical unit at Ramadi, Iraq. His cool under fire was on display nationally as he performed surgery on US Representative Gabrielle Giffords after she was shot through the skull in the Tucson shootings this past January. His experience with induced hypothermia came into play the night of the shootings when Dr. Rhee removed part of the congresswoman’s skull. The wound had raised her body temperature and began “cooking the brain.” He used a device to cool Rep. Giffords’ skin.
Snowden hints at new revelations of industrial espionage by the NSA | The Verge - 0 views
-
"I don't want to pre-empt the work of journalists," he said, "but there's no question the US is engaged in economic spying. If there's information at Siemens that they think would be beneficial to the national interests (not the national security) of the United States, they'll go after that information."
-
While evidence shows the NSA has spied on Brazil's Petrobras oil company, the US government has never been conclusively linked to the surveillance or theft of trade secrets on an international stage. If true, the revelations would have a grave diplomatic impact, particularly the government attempts to regain the trust of allied nations.
Snowden Keeps Outwitting U.S. Spies - The Daily Beast - 0 views
-
First, it assumes that Snowden’s master file includes data from every network he ever scanned. Second, it assumes that this file is already in or will end up in the hands of America’s adversaries. If these assumptions turn out to be true, then the alarm raised in the last week will be warranted. The key word here is “if.”
-
One U.S. intelligence official briefed on the report said the DIA concluded that Snowden visited classified facilities outside the NSA station where he worked in Hawaii while he was downloading the documents he would eventually leak to journalists Glenn Greenwald and Barton Gellman. On Tuesday, Clapper himself estimated that less than 10 percent of the documents Snowden took were from the NSA.
-
assume
- ...10 more annotations...
Yahoo webcam images from millions of users intercepted by GCHQ | World news | theguardian.com - 0 views
-
Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.
-
between 2008 and 2010
-
Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.The system, eerily reminiscent of the telescreens evoked in George Orwell's 1984, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs
- ...1 more annotation...
Caphaw Banking Malware Distributed via YouTube Ads - The Hacker News - 0 views
-
The Exploitation process relied upon a Java vulnerability (CVE-2013-2460) and after getting dropped into the target computer system, the malware detects the Java version installed on the operating system and based upon it requests the suitable exploit.
How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations - The Intercept - 0 views
-
“The Art of Deception: Training for Online Covert Operations.”
-
Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.
-
Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends. The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:
- ...4 more annotations...
Uroburos Rootkit: Most sophisticated 3-year-old Russian Cyber Espionage Campaign - The Hacker News - 0 views
-
The researchers claimed that the malware may have been active for as long as three years before being discovered and appears to have been created by Russian developers.
-
The two main components of Uroburos are - a driver and an encrypted virtual file system, used to disguise its nasty activities and to try to avoid detection. Its driver part is extremely complex and is designed to be very discrete and very difficult to identify.
-
The virtual file system can’t be decrypted without the presence of drivers, according to the Gdata’s analysis explained in the PDF.
- ...2 more annotations...
Snowden: I raised NSA concerns internally over 10 times before going rogue - 0 views
-
Snowden wrote that he reported policy or legal issues related to spying programs to more than 10 officials, but as a contractor he had no legal avenue to pursue further whistleblowing.
-
Yes. I had reported these clearly problematic programs to more than ten distinct officials, none of whom took any action to address them. As an employee of a private company rather than a direct employee of the US government, I was not protected by US whistleblower laws, and I would not have been protected from retaliation and legal sanction for revealing classified information about lawbreaking in accordance with the recommended process.
-
lsewhere in his testimony, Snowden described the reaction he received when relating his concer
Cutting the cord: Brazil's bold plan to combat the NSA | The Verge - 0 views
-
"The real danger [from] the publicity about [NSA surveillance] is that other countries will begin to put very serious encryption – we use the term 'Balkanization' in general – to essentially split the internet and that the internet's going to be much more country specific," Google executive chairman Eric Schmidt said at an event in New York this month. "That would be a very bad thing, it would really break the way the internet works, and I think that's what I worry about."
Former Microsoft Privacy Chief Says He No Longer Trusts The Company - HotHardware - 0 views
-
This is a fundamental problem for nations that aren't interested in exposing their traffic to American observation, whether they're engaged in nefarious activities or not. Long term, the problem could lead to the construction of digital firewalls, in which the United States is effectively isolated behind protective nodes built by local governments to scrub and redirect traffic away from potential capture points. This is directly in opposition to the central concept of the Internet, which is a dynamic structure capable of responding to outages or damage by routing around the problem.
2 million Facebook, Gmail and Twitter passwords stolen in massive hack - Dec. 4, 2013 - 0 views
-
The massive data breach was a result of keylogging software maliciously installed on an untold number of computers around the world,
-
The virus was capturing log-in credentials for key websites over the past month and sending those usernames and passwords to a server controlled by the hackers.
-
Of all the compromised services, Miller said he is most concerned with ADP. Those log-ins are typically used by payroll personnel who manage workers' paychecks. Any information they see could be viewed by hackers until passwords are reset.
- ...1 more annotation...
FBI surveillance malware in bomb threat case tests constitutional limits | Ars Technica - 0 views
-
The FBI has an elite hacker team that creates customized malware to identify or monitor high-value suspects who are adept at covering their tracks online, according to a published report.
-
as the capability to remotely activate video cameras and report users' geographic locations—is pushing the boundaries of constitutional limits on searches and seizures
-
Critics compare it to a physical search that indiscriminately seizes the entire contents of a home, rather than just those items linked to a suspected crime. Former US officials said the FBI uses the technique sparingly, in part to prevent it from being widely known.
- ...1 more annotation...
Snowden leak examines gaming as a terrorist propaganda and training tool | Ars Technica - 0 views
-
But those leaked documents also include an in-depth report on the potential for games to be used as recruitment, training, and propaganda tools by extremist organizations.
-
Even if, as the report says, "the line between the ‘virtual’ world and the ‘real’ world is blurring, and to some users may be non-existent," most of the game-related terrorist training and planning scenarios laid out here seem a lot less likely than plain old non-game-related options. In any case, the leak of this report and the scenarios it outlines show that the security apparatus is interested in online games as more than just a place to spy on potential enemy communications.
NSA collects nearly 5 billion cellphone location records per day | Ars Technica - 0 views
-
The Washington Post added another noteworthy finding to the growing pile of information leaked by former NSA contractor Edward Snowden: the NSA is collecting nearly five billion cellphone location records per day from across the world.
-
This gigantic data collection feeds a database that stores information on "hundreds of millions of devices," according to the documents obtained by
-
27 terabytes
- ...1 more annotation...
« First
‹ Previous
41 - 60 of 71
Next ›
Showing 20▼ items per page