BND-Spionage unter Freunden: Dutzende Regierungsstellen im Visier


Kanzlerin Merkel hatte 2013 gesagt: "Ausspähen unter Freunden – das geht gar nicht." Dann wurde klar: Das geht doch. Kontrolleure des Bundestags haben nun ein Fazit gezogen und das birgt gehörig Sprengstoff. In der BND-Affäre um Spionage unter Freunden sind neue Details über den Umfang der bis Oktober 2013 laufenden Aktionen bekannt geworden. Nach einer der dpa vorliegenden Bewertung des Bundestagsgremiums zur Kontrolle der Geheimdienste (PKGr) wurde "eine niedrige zweistellige Zahl von Teilnehmern" abgehört, die Regierungen von EU- oder Nato-Ländern zuzuordnen sind. Darunter sind Staats- oder Regierungschefs und Minister, deren Umfeld – also der Amtssitz, der Stab oder das Büro – sowie militärische Einrichtungen. Es gehe um "mehrere Dutzend" solcher Fälle, erfuhr die dpa.

heise.de

... Link (0 comments) ... Comment



Do You Own Your Own Fingerprints?


An obscure law could lead to broader limits on biometrics. These days, many of us regularly feed pieces of ourselves into machines for convenience and security. Our fingerprints unlock our smartphones, and companies are experimenting with more novel biometric markers—voice, heartbeat, grip—as ID for banking and other transactions. But there are almost no laws in place to control how companies use such information. Nor is it clear what rights people have to protect scans of their retinas or the contours of their face from cataloging by the private sector.

bloomberg.com

... Link (0 comments) ... Comment



NSA targets the privacy-conscious


The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA. Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states. The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".

daserste.ndr.de

... Link (0 comments) ... Comment



Quellcode entschlüsselt: Beweis für NSA-Spionage in Deutschland


Deutsche, die sich mit Verschlüsselung im Internet beschäftigen, werden gezielt vom US-Geheimdienst NSA ausgespäht. Anhand eines geheimen Quellcodes der NSA konnten WDR und NDR nun in Deutschland Opfer der NSA Überwachung namentlich identifizieren. Einer davon ist der Erlanger Student Sebastian Hahn, der sich in seiner Freizeit mit Anonymisierungstechnologie beschäftigt. Er ist nach Angela Merkel das erste namentlich bekannte Opfer der NSA.

ndr.de

... Link (0 comments) ... Comment



NSA classifies Linux Journal readers, Tor and Tails Linux users as "extremists"


Are you a Linux Journal reader or use software such as Tor and Tails Linux? If so, you've probably been flagged as an "extremist" by the NSA. Leaked documents related to the XKeyscore snooping program reveal that the agency is targeting anyone who is interested in online privacy, specifically those who use the aforementioned software and visit the Linux user community website. XKeyscore is a collection and analysis software that was among a number of surveillance programs revealed by Edward Snowden last year. Its source code (basically a rule file), which has been obtained and analyzed by members of the Tor project and security specialists for German broadcasters NDR and WDR, identifies two German Tor Directory Authority servers as being under surveillance by the NSA. The code also cites a number of specific IP addresses of the Tor Directory Authority.

n.techspot.com

... Link (0 comments) ... Comment



Here are the creeps who sell ATM skimmers on Alibaba


Last week I posted about a guy who came across a well-made skimmer at an ATM in Vienna. I wondered who made such a fine looking piece of sociopathic hardware. Turns out this company sells such devices in bulk via Alibaba.

ATM skimmers on Alibaba

boingboing.net

... Link (0 comments) ... Comment



INTERVIEW | CRYPTOME: 1996/2016


"Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance -- open, secret and classified documents -- but not limited to those. Documents are removed from this site only by order served directly by a US court having jurisdiction. No court order has ever been served; any order served will be published here -- or elsewhere if gagged by order. Bluffs will be published if comical but otherwise ignored. "

tecno-grafias.com

... Link (0 comments) ... Comment



Secure-K is an encryped OS that lives on a USB drive


If you're looking for a encrypted, portable OS that can be securely loaded on any computer, Secure-K may be the answer. Also if you're afraid of hackers wearing hoodies in darkened rooms and find joy in a British man repeatedly saying "privacy" in an excited tone, you'll enjoy this video.

theverge.com

... Link (0 comments) ... Comment



How a Kitten Video Can Transmit Secret Instructions to Criminals


An ancient form of information-hiding known as steganography has infiltrated the viral internet. Imagine your computer is infected. The virus that has infiltrated your machine commands it to perform tasks and open applications that you would normally use–except you’re not there to run them. At the same time every day, it launches Twitter, then generates user handles and hunts through tweets. It searches and waits until, bingo—it finds a recently tweeted link that leads to a photo of a flower. But, this is no ordinary photo. Laced into the Github image file’s long string of code are secret instructions that it needs to extract and upload information from your compromised computer to an internet cloud service set up by a hacker.

atlasobscura.com

... Link (0 comments) ... Comment



How Terrorists Use Encryption


Abstract: As powerful encryption increasingly becomes embedded in electronic devices and online messaging apps, Islamist terrorists are exploiting the technology to communicate securely and store information. Legislative efforts to help law enforcement agencies wrestle with the phenomenon of “going dark” will never lead to a return to the status quo ante, however. With the code underlying end-to-end encryption now widely available, unbreakable encryption is here to stay. However, the picture is not wholly bleak. While end-to-end encryption itself often cannot be broken, intelligence agencies have been able to hack the software on the ends and take advantage of users’ mistakes.

ctc.usma.edu

... Link (0 comments) ... Comment



New 'Hardened' Tor Browser Protects Users From FBI Hacking


According to a new paper, security researchers are now working closely with the Tor Project to create a "hardened" version of the Tor Browser, implementing new anti-hacking techniques which could dramatically improve the anonymity of users and further frustrate the efforts of law enforcement... "Our solution significantly improves security over standard address space layout randomization (ASLR) techniques currently used by Firefox and other mainstream browsers," the researchers write in their paper, whose findings will be presented in July at the Privacy Enhancing Technologies Symposium in Darmstadt, Germany.

slashdot.org

... Link (0 comments) ... Comment



Olympic threats designed to trick you


Are you planning to visit Brazil during the Olympic Games? Or watch it online? In this blog post we discuss the threats to visitors aiming to travel to Brazil to watch the games and to those planning to watch it online. In the first part we’ll talk about phishing attacks, including one against the organizers of the Games; in the second we highlight WiFi security and the results of the wardriving we did on the streets of Rio, visiting the same places as tourists and the athletes. In the third and final part we touch upon physical security that involves the usage of USB charging spots at airports, the problem of credit card cloning and ATM skimmers that will directly affect visitors to this summer’s Olympic Games in Rio.

securelist.com

... Link (0 comments) ... Comment