Car Wars: a dystopian science fiction story about the nightmare of self-driving cars

hero_car

Melbourne's Deakin University commissioned me to write a science fiction story about the design and regulation of self-driving cars, inspired by my essay about the misapplication of the "Trolley Problem" to autonomous vehicles. Read the rest

UK's new surveillance law creates a national browser history with a search engine to match

050-056c026d-1c66-4d42-9fae-a8

The Snoopers Charter, an extreme surveillance bill that passed last week, and it's the most extensive domestic spying regime that any "democratic" country has passed, and is a potential blueprint for Orwellian surveillance elsewhere in the years to come. Read the rest

Iphones secretly send your call history to Apple's cloud, even after you tell them not to

050-056c026d-1c66-4d42-9fae-a8

Apple has acknowledged that its Icloud service is a weak link in its security model, because by design Apple can gain access to encrypted data stored in its customers' accounts, which means that the company can be hacked, coerced or tricked into revealing otherwise secure customer data to law enforcement, spies and criminals. Read the rest

Snowden to journalists: your best defense is legal limits on spying, not crypto

1-wwju8y-fbzb00ygwhn78ha

Edward Snowden videoconferenced with a journalism roundtable at Editors Lab participants at Süddeutsche Zeitung (home of the Panama Papers) about the effect of state surveillance on a free press. Read the rest

EFF asks court to let American sue Ethiopia for hacking his computer and rounding up his friends

flag_of_ethiopia-svg

Since 2014, the Electronic Frontier Foundation has been representing "Mr Kidane," an Ethiopian-born US citizen whose computer the Ethiopian government hacked while he was living in DC, in order to extract the identities of his contacts in Ethiopia and target them for violent human-rights-abusing reprisals over their democratic opposition to the country's ruling dictatorship. Read the rest

UAE surveillance contractor is recruiting an army of foreign hackers to break into its citizens' devices

faisal-al-bennai-article-1

The world's most sophisticated security experts have been bombarded with recruiting offers from UAE-based company Darkmatter, which bills itself as a major state security contractor -- but people who've taken the bait say they were then told that they were being hired to weaponize huge arsenals of zero-day vulnerabilities so that the UAE can subject its own population to fine-grained, continuous surveillance. Read the rest

Tax-funded NZ company sold mass surveillance tech to torturers and GCHQ

endace-logo

A whistleblower has provided The Intercept with leaked documents about Endace, an obscure New Zealand company based in Auckland, revealing that the company -- which received millions in government funding -- developed the mass surveillance equipment used by the UK spy agency to engage in illegal mass surveillance on fiber-optic lines that traverse the UK, and that Endace's customer list also includes a who's-who of telcoms companies, spy agencies, and the Moroccan secret police, who make a practice of spying on people, then kidnapping and torturing them. Read the rest

After being outed for massive hack and installing an NSA "rootkit," Yahoo cancels earnings call

national_security_agency_headq

What do you do if your ailing internet giant has been outed for losing, and then keeping silent about, 500 million user accounts, then letting American spy agencies install a rootkit on its mail service, possibly scuttling its impending, hail-mary acquisition by a risk-averse, old economy phone company? Just cancel your investor call and with it, any chance of awkward, on-the-record questions. (via /.) Read the rest

The coming fight over "nonlethal neuroweapons"

zombie-man

The Chemical Weapons Convention has a giant loophole in that it allows for the stockpiling and use of chemical agents in law-enforcement; with the Eighth Review Conference of the Biological and Toxin Weapons Convention (BTWC) coming up next month, there's an urgent question about whether "neuroweapons" (chemical agents intended to pacify or disperse people) will become tools of law-enforcement and "defensive warfare." Read the rest

Yahoo secretly built a tool to scan all email in realtime for US spies

yahoo-mail-logo

In 2015, Yahoo CEO Marissa Meyer ordered the company's engineers to build a tool that scanned Yahoo Mail messages in realtime for "characters" of interest to a US security agency, either the FBI or the NSA. Read the rest

Xiaomi phones are pre-backdoored; your apps can be silently overwritten

iC1yJL.kSM3w

Thijs Broenink audited the AnalyticsCore.apk app that ships pre-installed on all Xiaomi phones (Xiaomi has their own Android fork with a different set of preinstalled apps) and discovered that the app, which seemingly serves no useful purpose, allows the manufacturer to silently install other code on your phone, with unlimited privileges and access. Read the rest

In a leaked "weaponized information" catalog, Indian cyberarms dealer offers blackest-ever SEO

1472825788119723

In 2014, an Indian company called Aglaya brought a 20-page brochure to ISS World (AKA the Wiretappers' Ball -- the annual trade fair where governments shop for surveillance technology): the brochure laid out the company's offerings, which ranged from mobile malware for Ios and Android to a unique "Weaponized Information" selection that combined denial-of-service with disinformation to "discredit a target" online. Read the rest

The DoJ is using a boring procedure to secure the right to unleash malware on the internet

Screen-Shot-2016-06-21-at-4.48.28-PM

The upcoming Rule 41 modifications to US Criminal Justice procedure underway at the Department of Justice will let the FBI hack computers in secret, with impunity, using dangerous tools that are off-limits to independent scrutiny -- all without Congressional approval and all at a moment at which America needs its law-enforcement community to be strengthening the nation's computers, not hoarding and weaponizing defects that put us all at risk. Read the rest

Leaked catalog from UK surveillance arms-dealer full of gadgets sold to US cops

050 056c026d-1c66-4d42-9fae-a8e96df290c5-1020x1173

Cobham PLC is a surveillance vendor who sells to some of the world's most egregious human rights abusing governments; in 2014, they provided a catalog of cyberweapons and spy tools to Florida Department of Law Enforcement, from whom it leaked. Read the rest

Watch: leaked demo of malware offered to spying governments

1473189548637815

Someone captured and leaked a live presentation by an RCS sales tech, demonstrating his company's cyber-weapon for spying on dissidents, criminals, and whomever else the customer wanted to infect. Read the rest

1 billion computer monitors vulnerable to undetectable firmware attacks

056c026d-1c66-4d42-9fae-a8e96df290c5-1020x1153

A team led by Ang Cui (previously) -- the guy who showed how he could take over your LAN by sending a print-job to your printer -- have presented research at Defcon, showing that malware on your computer can poison your monitor's firmware, creating nearly undetectable malware implants that can trick users by displaying fake information, and spy on the information being sent to the screen. Read the rest

EFF and partners reveal Kazakh government phished journalists, opposition politicians

056c026d-1c66-4d42-9fae-a8e96df290c5-1020x1152

At Defcon, researchers from the Electronic Frontier Foundation, First Look Media and Amnesty International, revealed their findings on a major phishing attack through which the government of Kazakhstan was able to hack opposition journalists and arrange for an opposition politician's extradition from exile in Italy to Kazakhstan. Read the rest

More posts