A fresh set of Snowden leaks show that the UK spy agency GCHQ turned spying into a profit centre for Britain's telcos, who received huge cash payouts in exchange for turning over their customers' private communications and developing spyware to infect customers' computers in order to extract more data.
But the fresh leaks also claim to be showing another side of the secret deal, with telecom majors allegedly receiving rewards for developing the spying software for GCHQ on their own. Such software could come in a form of Trojan viruses installed on targeted computers, the reports say, stating that the companies’ involvement in data collection is much larger and more complicated than previously thought.
The reports also list network attacks and deliberate disinformation as the tactics employed by the UK’s intelligence agency in their task for ‘dominating’ the internet.
So far, all but one of the providers listed in the report failed to directly confirm or deny the claims, some saying they comply with the law of the countries they operate in. German market leader Level 3 denied providing access to its communication networks to “any foreign government,” according to SZ. But the news agency then speculated that the company could still serve as a hub for outside data transfer, as in 2011 it acquired the Global Crossing, inheriting its foreign networks – and, possibly, agreements.
Telecom giants give GCHQ unlimited access to networks, develop own spyware – Snowden leaks [Russia Today]
Philips has acquired Luciom, a French startup that makes Li-Fi products, which allow for very fast network connections over short distances by flickering an LED at speeds that are too fast to register on the human eye, and which can ever work in the dark by operating at low dimness settings the human eye perceives […]
Many insurers offer breaks to people who wear activity trackers that gather data on them; as Cathy “Mathbabe” O’Neil points out, the allegedly “anonymized’ data-collection is trivial to re-identify (so this data might be used against you), and, more broadly, the real business model for this data isn’t improving your health outcomes — it’s dividing […]
As the US government ramps up its insistence that visitors (and US citizens) unlock their devices and provide their social media accounts, the solution have run the gamut from extreme technological caution, abandoning mobile devices while traveling, or asking the government to rethink its policy. But Maciej Cegłowski has another solution: a “travel mode” for […]
DJI is the world’s leading designer and producer of easy-to-fly drones and aerial photography systems. If you’re a drone enthusiast, you want a DJI. If you know absolutely nothing about drones and think they’re weird, if you win a DJI you’re going to become a drone enthusiast.Enter this giveaway (for free, yes) and you’ll get a […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]