A former Booz Allen Hamilton contractor who worked with the National Security Agency will face charges of espionage in a case involving 50 terabytes or more of highly sensitive NSA data the government says were stolen.
What do you do if your ailing internet giant has been outed for losing, and then keeping silent about, 500 million user accounts, then letting American spy agencies install a rootkit on its mail service, possibly scuttling its impending, hail-mary acquisition by a risk-averse, old economy phone company? Just cancel your investor call and with it, any chance of awkward, on-the-record questions. (via /.) Read the rest
Tim Shorrock at The Nation did the legwork to to come up with the numbers.
“The problem with just five companies providing the lion’s share of contractors is that the client, the U.S. government, won’t have much alternative when a company screws up,” says David Isenberg, the author of Shadow Force: Private Security Contractors in Iraq. [...] “There comes a point when the marketplace is so concentrated that the service provider simply becomes too big to fail, no matter how lousy their performance,” says Isenberg, who closely monitors the privatization of national-security work. “If that makes you think of the financial-services industry, well, that’s exactly what I’m talking about.”
Ex-Yahoo employees have spoken anonymously to Motherboard about the news that Yahoo had built an "email scanner" for a US security agency, likely the FBI or the NSA. These sources -- at least one of whom worked on the security team -- say that in actuality, the NSA or FBI had secretly installed a "rootkit" on Yahoo's mail servers and that this was discovered by the Yahoo security team (who had not been apprised of it), who, believing the company had been hacked, sounded the alarm, only to have the company executives tell them that the US government had installed the tool. Read the rest
Sometime over the last few weeks, the FBI made a secret arrest of a Maryland man who worked as a Booz Allen Hamilton contractor for the National Security Agency.
In 2015, Yahoo CEO Marissa Meyer ordered the company's engineers to build a tool that scanned Yahoo Mail messages in realtime for "characters" of interest to a US security agency, either the FBI or the NSA. Read the rest
Netzpolitik is an amazing German activist/journalist organization; in 2015, they braved a treason investigation by publishing Snowden docs that showed that the German intelligence services were conducting illegal surveillance and illegally collaborating with the NSA; now they've done it again, publishing a new leaked oversight report on spying at the Bad Aibling surveillance station. Read the rest
When Edward Snowden came in from the cold, it catapulted his employer, Booz Allen Hamilton -- a giant military/intelligence contractor -- into the public eye, but Booz is small potatoes, one of the Big Five in the intelligence contractor industry, but it's dwarfed by Leidos Holdings, which recently merged with Lockheed's Information Systems & Global Solutions to become the largest business in the $50B industry. Read the rest
With the leak of exploits developed by The Equation Group, the long-secret, NSA-adjacent super-elite hacking squad -- published by The Shadow Brokers, who have some extremely heterodox theories about auction design -- it's now possible to audit the source code of some of the NSA's crown-jewel cyberweapons. Read the rest
The more we learn about the Shadow Brokers, who claim to be auctioning off "cyberweapons" that crafted for the NSA's use, the scarier the breach gets: some of the world's biggest security companies are tacitly admitting that the exploits in the Shadow Brokers' initial release can successfully penetrate their products, and they have no fix at hand. Read the rest
As our Cory Doctorow reported previously, a previously unheard of hacker group calling themselves The Shadow Brokers announced this week it had stolen a trove of ready-to-use cyber weapons from The Equation Group (previously), an advanced cyberweapons dealer believed to be operating on behalf of, or within, the NSA.
The news that a group of anonymous hackers claimed to have stolen some of the NSA's most secret, valuable weaponized vulnerabilities and were auctioning them off for bitcoin triggered an epic tweetstorm from Edward Snowden, who sets out his hypothesis for how the exploits were captured and what relation that has to the revelations he made when he blew the whistle on illegal NSA spying in 2013. Read the rest
Tony Fullman is one of the only people that we know to have been targeted by Prism, the NSA's signature mass-surveillance tool: he's a Fijian-born expatriate with New Zealand citizenship, and had his passport seized and his name added to terrorism watchlists after the NSA helped their New Zealand counterparts spy on him, intercepting his bank statements, Facebook posts, Gmail messages, recorded phone conversations, and more. Read the rest
Wonder what kind of NSA commander-in-chief Donald Trump would be? Well, he had a phone console near his bed that could connect to every phone in his Mar-a-Lago estate, reports Aram Roston at Buzzfeed. Several workers told Buzzfeed that Trump used the equipment to secretly listen in on phone calls in the mid-2000s.