SIM card makers hacked by NSA and GCHQ leaving cell networks wide open
L33tdawg: On a somewhat related note, Markus Vervier will be talking about an attack that enables active cloning of mobile identities at #HITB2015AMS at the end of May...
L33tdawg: On a somewhat related note, Markus Vervier will be talking about an attack that enables active cloning of mobile identities at #HITB2015AMS at the end of May...
NSA Director Admiral Michael Rogers said Thursday that the nation needs to debate security versus privacy concerns in the wake of revelations of expansive government surveillance revealed by whistle-blower Edward Snowden.
In a wide-ranging speech at UC San Diego, which operates one of the nation’s largest computer science programs and is a leader in cybersecurity, Rogers contended that the Snowden revelations have hurt the National Security Agency’s counterterrorism efforts.
Despite documents showing the U.S. National Security Agency has infiltrated North Korean networks, security experts continue to doubt the country orchestrated the cyber-attack on Sony Pictures.
Recent reports alleging that the National Security Agency has infiltrated North Korean networks and collected evidence connecting the country's leadership with the attack on Sony Pictures Entertainment should have settled the question of who was responsible for the brazen breach of the Hollywood studio's data assets. Yet, doubts persist.
Just over a year ago, Jacob Appelbaum and Der Spiegel revealed pages from the National Security Agency's ANT catalog, a sort of "wish book" for spies that listed technology that could be used to exploit the computer and network hardware of targets for espionage. One of those tools was a USB cable with embedded hardware called Cottonmouth-I—a cable that can turn the computer's USB connections into a remote wiretap or even a remote control.
It's tempting to imagine that few online safeguards will stop NSA surveillance in its tracks, but that's not true. A new leak from Edward Snowden's files reveals that there's a surprising number of ways to thwart these snoops, at least as of 2012. While you may already know that the NSA sees Tor's anonymity network as a problem, it hates the heavy encryption on chat protocols like CSpace or Off-the-Record, internet calling systems like ZRTP or highly secure email systems like Zoho.
The U.S. National Security Agency should have an unlimited ability to collect digital information in the name of protecting the country against terrorism and other threats, an influential federal judge said during a debate on privacy.
"I think privacy is actually overvalued," Judge Richard Posner, of the U.S. Court of Appeals for the Seventh Circuit, said during a conference about privacy and cybercrime in Washington on Thursday.
Many of you probably think that the National Security Agency (NSA) and open-source software get along like a house on fire. That's to say, flaming destruction. You would be wrong.
In partnership with the Apache Software Foundation, the NSA announced on Tuesday it is releasing the source code for Niagarafiles (Nifi). The spy agency said Nifi "automates data flows among multiple computer networks, even when data formats and protocols differ."
China may have the ability to remotely shut down computer systems of US power utilities, aviation networks and financial companies, according to director of the US National Security Agency Mike Rogers.
Testifying to the House of Representatives Intelligence Committee on cyber threats, Rogers said digital attackers have been able to penetrate such systems and perform "reconnaissance" missions to determine how the networks are put together.
It has been said that we are living in a post-NSA world. What this really amounts to is that we are now slightly more aware of the level of snooping that has been going on in the background for many years. There has been widespread outrage at the revelations made by Edward Snowden, and there have been similar concerns raised outside of the US. In the UK, the FBI-like National Crime Agency, wants greater powers to monitor emails and phone calls -- and it wants the public to agree to this.
The U.S. National Security Agency takes multiple steps to protect the privacy of the information it collects about U.S. residents under a secretive surveillance program, according to a report from the agency's privacy office.
Surveillance under presidential Executive Order 12333, which dates back to 1981, generally sets the ground rules for the NSA's overseas surveillance. It allows the agency to keep the content of U.S. citizens' communications if they are collected "incidentally" while the agency is targeting overseas communications.