NSA hat angeblich Infrastruktur von Google und SWIFT gehackt


Die NSA spioniert gezielt interne Netzwerke großer Unternehmen, fremder Regierungen und von Finanzinstitutionen aus. Das berichtet der brasilianische Fernsehsender Globo unter Berufung auf neue Dokumente des NSA-Whistleblowers Edward Snowden. In einer Auflistung geknackter Netzwerke findet sich demnach unter anderem das des größten brasilianischen Erdölunternehmens Petrobras, die Infrastruktur von Google, ein internes Netz des französischen Außenministeriums und das Netzwerk von SWIFT, über das alle länderübergreifenden Finanztransaktionen laufen. Andere Ziele habe der Journalist Glenn Greenwald zum Schutz von US-Interessen vor der Übergabe des Dokuments geschwärzt.

heise.de

... Link (0 comments) ... Comment



How to foil NSA sabotage: use a dead man's switch


The more we learn about the breadth and depth of the NSA and GCHQ's programmes of spying on the general public, the more alarming it all becomes. The most recent stories about the deliberate sabotage of security technology are the full stop at the end of a sentence that started on 8 August, when the founder of Lavabit (the privacy oriented email provider used by whistleblower Edward Snowden) abruptly shut down, with its founder, Ladar Levison, obliquely implying that he'd been ordered to secretly subvert his own system to compromise his users' privacy.

theguardian.com

... Link (0 comments) ... Comment



Pay Us $85 To Avoid Full-On Airport Molestation


Travelers could soon be able to keep their shoes on while going through security at more airports around the country.

The U.S. Transportation Security Administration said Wednesday that it will expand faster screening lanes to 100 airports by year end, up from 40 now. The agency says the expansion is part of its attempt to make screening more effective by breaking away from a single approach at all airports.

huffingtonpost.com tsa.gov

... Link (0 comments) ... Comment



iSpy: How the NSA Accesses Smartphone Data


The US intelligence agency NSA has been taking advantage of the smartphone boom. It has developed the ability to hack into iPhones, android devices and even the BlackBerry, previously believed to be particularly secure.

Michael Hayden has an interesting story to tell about the iPhone. He and his wife were in an Apple store in Virginia, Hayden, the former head of the United States National Security Agency (NSA), said at a conference in Washington recently. A salesman approached and raved about the iPhone, saying that there were already "400,000 apps" for the device. Hayden, amused, turned to his wife and quietly asked: "This kid doesn't know who I am, does he? Four-hundred-thousand apps means 400,000 possibilities for attacks."

spiegel.de

... Link (0 comments) ... Comment



Epic: A Privacy-Focused Web Browser


I've been advising Epic Browser, a startup building a privacy-focused, Chrome-based browser that starts where incognito mode ends. Epic employs a host of tactics designed to make what happens inside your browser stay there, to the tune of a thousand blocks in a typical hour of browsing. They also provide a built-in proxy service. If the corporations and governments are going to watch us, there's no reason to make it any easier for them. Epic has Mac and Windows builds for now. Their site goes into far greater detail about how they block tracking methods most browsers don't.

epicbrowser.com

... Link (0 comments) ... Comment



Privacy Scandal: NSA Can Spy on Smart Phone Data


SPIEGEL has learned from internal NSA documents that the US intelligence agency has the capability of tapping user data from the iPhone, devices using Android as well as BlackBerry, a system previously believed to be highly secure.

The United States' National Security Agency intelligence-gathering operation is capable of accessing user data from smart phones from all leading manufacturers. Top secret NSA documents that SPIEGEL has seen explicitly note that the NSA can tap into such information on Apple iPhones, BlackBerry devices and Google's Android mobile operating system.

The documents state that it is possible for the NSA to tap most sensitive data held on these smart phones, including contact lists, SMS traffic, notes and location information about where a user has been.

spiegel.de

... Link (0 comments) ... Comment



Kein großes Smartphone-Betriebssystem vor US-Geheimdienst sicher


Der US-amerikanische Geheimdienst NSA kann sich Zugang zu Nutzerdaten von iPhones, Android-Smartphones und BlackBerry-Geräten verschaffen. Dies berichtet das Hamburger Nachrichtenmagazin Der Spiegel in seiner am morgigen Montag erscheindenden Ausgabe. In geheimen Unterlagen, die die Redaktion nach eigenen Angaben einsehen konnten, sei ausdrücklich von Smartphones mit diesen Mobil-Betriebsystemen die Rede.

heise.de

... Link (0 comments) ... Comment



Sudden spike of Tor users likely caused by one “massive” botnet


Researchers have found a new theory to explain the sudden spike in computers using the Tor anonymity network: a massive botnet that was recently updated to use Tor to communicate with its mothership.

Mevade.A, a network of infected computers dating back to at least 2009, has mainly used standard Web-based protocols to send and receive data to command and control (C&C) servers, according to researchers at security firm Fox-IT. Around the same time that Tor Project leaders began observing an unexplained doubling in Tor clients, Mevade overhauled its communication mechanism to use anonymized Tor addresses ending in .onion. In the week that has passed since Tor reported the uptick, the number of users has continued to mushroom.

arstechnica.com Cyber-thieves blamed for leap in Tor dark net use

... Link (0 comments) ... Comment



Government To Release Hundreds of Documents On NSA Spying


In response to a lawsuit by the Electronic Frontier Foundation, the Department of Justice is preparing to release a trove of documents related to the government's secret interpretation of Section 215 of the PATRIOT Act. The declassified documents will include previously secret opinions of the Foreign Intelligence Surveillance Court.

slashdot.org

... Link (0 comments) ... Comment



How to remain secure against NSA surveillance


Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves.

For the past two weeks, I have been working with the Guardian on NSA stories, and have read hundreds of top-secret NSA documents provided by whistleblower Edward Snowden. I wasn't part of today's story – it was in process well before I showed up – but everything I read confirms what the Guardian is reporting.

theguardian.com

... Link (0 comments) ... Comment



N.S.A. Able to Foil Basic Safeguards of Privacy on Web


The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.

The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.

nytimes.com Revealed: How US and UK spy agencies defeat internet privacy and security Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security Snowden leaks: US and UK 'crack online encryption'

... Link (0 comments) ... Comment



Spy Files 3: WikiLeaks veröffentlicht neue Dokumente zu Geheimdienst-Auftragsfirmen und Überwachungstechnologien


Dokumente in den Spy Files #3 umfassen sensible Verkaufsbroschüren und -präsentationen, mit denen die Geheimdienste der verschiedenen Länder dazu verleitet werden sollen, Technologien und Dienstleistungen zur Massenüberwachung bei den jeweiligen Firmen zu kaufen. Die Sammlung enthält ebenfalls Dokumente wie Verträge und Auslieferungs- und Installationsbeschreibungen, die einen Einblick geben, wie die entsprechenden System installiert und betrieben werden.

Internet-Überwachungstechnologien, die neuerdings auf dem Geheimdienst-Markt verkauft werden, beinhalten Funktionen um verschlüsselten bzw. verschleierterten Internetverkehr wie Skype, BitTorrent, VPN, SSH und SSL zu erkennen. Die Dokumente decken auch auf, wie Dienstleister dabei mit Geheimdiensten und anderen Behörden zusammenarbeiten, um in den Besitz von Schlüsseln zu dieser Kommunikation zu kommen.

Aus den Dokumenten ist zudem ersichtlich, wie die Massenerfassung von Telefonie, SMS, MMS, EMail, FAX und Satelliten-Telefonie erfolgt. Die veröffentlichten Dokumente zeigen zudem, das diese Dienstleister auch die Analyse von Web- und Mobil-Kommunikation in Echtzeit verkaufen. </p>

wikileaks.org via

... Link (0 comments) ... Comment