Skip to main content

NSA

Hacker uses open source to replicate NSA spy tools

posted onJune 10, 2014
by l33tdawg

Thanks to hacker Michael Ossmann, you can now build gadgets like the National Security Agency uses to intercept communications from the comfort of your own home.

Ossmamnn, a prolific engineer who specializes in wireless Internet security and is widely known for the open source HAckRF, Ubertooth and Dashio projects, was curious about the NSA’s ANT catalog leaked by fugitive Edward Snowden. He decided to do something about it.

Senators question need to rein in NSA surveillance

posted onJune 6, 2014
by l33tdawg

The U.S. Congress would endanger the nation's security by passing even watered-down legislation to limit the National Security Agency's bulk collection of domestic phone records, several U.S. senators said Thursday.

Several members of the Senate Intelligence Committee voiced opposition to the USA Freedom Act, a bill aimed at reining in NSA bulk collection of telephone and other records, even though many civil liberties groups and technology companies have questioned whether the bill would work as its sponsors originally envisioned.

Tor security compromised by NSA, according to Microsoft

posted onMay 19, 2014
by l33tdawg

Andy Malone, head of Microsoft's Enterprise Security, claims that the TOR (The Onion Router) network does not provide the anonymity that its many users think it does.

Speaking at Microsoft's TechEd North America event earlier this week, the founder of the Cyber Crime Security Forum said that hackers and government agencies can now compromise the security of the TOR network.  

Cisco chief writes to Obama to decry NSA activities

posted onMay 19, 2014
by l33tdawg

Cisco chief executive John Chambers has complained to US President Barack Obama about the National Security Agency's spying practices, saying they were harming overseas business for US tech firms.

"This issue affects an entire industry," the head of the telecom equipment maker said in a letter dated Friday obtained by AFP.

Encrypted or not, Skype communications prove "vital" to NSA surveillance

posted onMay 13, 2014
by l33tdawg

Last year, Ars documented how Skype encryption posed little challenge to Microsoft abuse filters that scanned instant messages for potentially abusive Web links. Within hours of newly created, never-before-visited URLs being transmitted over the service, the scanners were able to pluck them out of a cryptographically protected stream and test if they were malicious. Now comes word that the National Security Agency is also able to work around Skype crypto—so much so that analysts have deemed the Microsoft-owned service "vital" to a key surveillance regimen known as PRISM.

Glenn Greenwald: how the NSA tampers with US-made internet routers

posted onMay 13, 2014
by l33tdawg

The NSA has been covertly implanting interception tools in US servers heading overseas – even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald, in an extract from his new book about the Snowden affair, No Place to Hide

Keith Alexander: NSA Makes The Entire Internet Weaker To Protect You From Terrorists

posted onMay 8, 2014
by l33tdawg

The NSA has never said much about the open secret that it collects and sometimes even pays for information about hackable flaws in commonly used software. But in a rare statement following his retirement last month, former NSA chief Keith Alexander acknowledged and defended that practice. In doing so, he admitted the deeply contradictory responsibilities of an agency tasked with defending Americans’ security and simultaneously hoarding bugs in software they use every day.