Boing Boing 

Ecstatic NSA spooks delight in spying on spies who are spying on spies


A tranche of fresh Snowden leaks published in Der Spiegel by Laura Poitras, Jacob Appelbaum and others detail the NSA's infiltration of other countries' intelligence services, detailing the bizarre, fractal practices of "fourth-party collection" and "fifth-party collection."

Read the rest

What's in the files the NSA dribbled out after its Xmas dump?


Patrick writes, "The NSA dumped its IOB reports on Christmas Eve, except that it was short 15 files, I pointed that out, next dump was silent but an additional 12 files, I pointed out the three missing files, and as of today, the three extra files were added, but the extra 3 files have a different naming convention."

Read the rest

NSA can wiretap Skype wholesale

Another gem from the latest Der Spiegel NSA leaks: the NSA can listen in on all Skype traffic and read Skype messages, because Microsoft hands over its keys.

Read the rest

New NSA leaks: does crypto still work?


Matthew Green's got an excellent postmortem on the huge dump of NSA docs Der Spiegel last weekend.

Read the rest

NSA dumps incriminating documents on Christmas Eve


At 1:30pm on Christmas Eve, the NSA dumped a huge cache of documents on its website in response to a long-fought ACLU Freedom of Information Act request, including documents that reveal criminal wrongdoing.

Read the rest

Spies can't make cyberspace secure AND vulnerable to their own attacks


In his Sunday Observer column, John Naughton makes an important point that's hammered home by the escape of the NSA/GCHQ Regin cyberweapon into the wild: spies who make war on the Internet can't be trusted with its security.

Read the rest

NSA leak reveal plans to subvert mobile network security around the world


The NSA's AURORAGOLD program -- revealed in newly released Snowden docs -- used plundered internal emails to compromise nearly every mobile carrier in the world, and show that the agency had planned to introduce vulnerabilities into future improvements into mobile security.

Read the rest

Sweden awards Snowden the "Right Livelihood" award


The parliament gave him several standing ovations as he accepted by video-link from Moscow.

Read the rest

Vodafone made millions helping GCHQ spy on the world


A newly released Snowden doc, published in the German newspaper Süddeutsche Zeitung, shows how Cable and Wireless (now a Vodafone subsidiary) made millions of pounds illegally installing fiber-taps to help GCHQ conduct its programme of mass surveillance.

Read the rest

Essential reading: the irreconcilable tension between cybersecurity and national security


Citizenlab's Ron Diebert lays out the terrible contradiction of putting spy agencies -- who rely on vulnerabilities in the networks used by their adversaries -- in change of cybersecurity, which is securing those same networks for their own citizens.

Read the rest

E-cigs and malware: real threat or Yellow Peril 2.0?


After a redditor claimed to have gotten a computer virus from factory-installed malware on an e-cig charger, the Guardian reported out the story and concluded that it's possible.

Read the rest

Glenn Greenwald: NSA-proofing your product is good for business


Just because Congress can't even pass minimal NSA reform, it doesn't mean that privacy is dead: American tech companies are NSA-proofing their services because customers are demanding it.

Read the rest

TRAITORS

Alexander (R-TN), Ayotte (R-NH), Barrasso (R-WY), Blunt (R-MO), Boozman (R-AR), Burr (R-NC), Chambliss (R-GA), Coats (R-IN), Coburn (R-OK), Cochran (R-MS), Collins (R-ME), Corker (R-TN), Cornyn (R-TX), Crapo (R-ID), Enzi (R-WY), Fischer (R-NE), Flake (R-AZ), Graham (R-SC), Grassley (R-IA), Hatch (R-UT), Hoeven (R-ND), Inhofe (R-OK),

Read the rest

Surveillance and stalkers: how the Internet supercharges gendered violence


85% of domestic violence shelters work with women who have been GPS-tracked by their abusers; 75% have clients who were attacked with hidden mobile surveillance apps; cops routinely steal and share nude selfies from the phones of women pulled over in traffic stops, and NSA spies used agency's massive, illegal surveillance apparatus to stalk women they were sexually attracted to, a practice that was dubbed "LOVEINT."

Read the rest

What's the best way to weaken crypto?


Daniel Bernstein, the defendant in the landmark lawsuit that legalized cryptography (over howls of protest from the NSA) engages in a thought-experiment about how the NSA might be secretly undermining crypto through sabotage projects like BULLRUN/EDGEHILL.

Making sure crypto stays insecure [PDF/Daniel J Bernstein]

(via O'Reilly Radar)