The Equation Group's sourcecode is totally fugly

With the leak of exploits developed by The Equation Group, the long-secret, NSA-adjacent super-elite hacking squad -- published by The Shadow Brokers, who have some extremely heterodox theories about auction design -- it's now possible to audit the source code of some of the NSA's crown-jewel cyberweapons. Read the rest

The NSA's program of tech sabotage created the Shadow Brokers

glass-984457_960_720

The more we learn about the Shadow Brokers, who claim to be auctioning off "cyberweapons" that crafted for the NSA's use, the scarier the breach gets: some of the world's biggest security companies are tacitly admitting that the exploits in the Shadow Brokers' initial release can successfully penetrate their products, and they have no fix at hand. Read the rest

Snowden explains the Shadow Brokers/Equation Group/NSA hack

050 056c026d-1c66-4d42-9fae-a8e96df290c5-1020x1187

The news that a group of anonymous hackers claimed to have stolen some of the NSA's most secret, valuable weaponized vulnerabilities and were auctioning them off for bitcoin triggered an epic tweetstorm from Edward Snowden, who sets out his hypothesis for how the exploits were captured and what relation that has to the revelations he made when he blew the whistle on illegal NSA spying in 2013. Read the rest

Hackers claim to have stolen NSA cyberweapons, auctioning them to highest bidder

050 056c026d-1c66-4d42-9fae-a8e96df290c5-1020x1185

The Shadow Brokers, a previously unknown hacker group, has announced that it has stolen a trove of ready-to-use cyber weapons from The Equation Group (previously), an advanced cyberweapons dealer believed to be operating on behalf of, or within, the NSA. Read the rest

After New Zealand spooks misidentified pro-democracy activist, NSA spied on him for them

050 056c026d-1c66-4d42-9fae-a8e96df290c5-1020x1180

Tony Fullman is one of the only people that we know to have been targeted by Prism, the NSA's signature mass-surveillance tool: he's a Fijian-born expatriate with New Zealand citizenship, and had his passport seized and his name added to terrorism watchlists after the NSA helped their New Zealand counterparts spy on him, intercepting his bank statements, Facebook posts, Gmail messages, recorded phone conversations, and more. Read the rest

Snowden's flesh is trapped in Russia, but his mind roams the world in a robot body

24-snowden-3.nocrop.w529.h421.2x

The Snowbot -- a $14,000 Beampro telepresence robot that Edward Snowden pilots from Moscow -- is becoming a fixture at conferences, meetings, and in the halls of power in the USA, where Snowden is a frequent invited guest. Read the rest

Stasi radio monitoring department, hard at work, 1980s

0_123f78_7dd72d5_XL (1)

Here's a small gallery of the East German secret police's 26th Division, hard at work during the 1980s. Read the rest

Hong Kong bookseller: I was forced to confess on China TV

056c026d-1c66-4d42-9fae-a8e96df290c5-1020x1091

Lam Wing Kee, one of the dissident Hong Kong booksellers who was kidnapped to the mainland by Chinese spies, only to surface on TV confessing to "illegal trading," now says he was forced into the confession. (Image: BBC) Read the rest

Mounties used Stingrays to secretly surveil millions of Canadians for years

Mountie_in_Banff,_Alberta

Motherboard used public records requests to extract 3,000+ pages of court docs from a massive 2010 RCMP mafia/drug bust in Montreal, codenamed "Project Clemenza," which revealed the full extent of the Mounties' secret use of Stingrays -- AKA "IMSI Catchers," the fake cellular towers that let cops covertly track whole populations by tricking their phones into revealing information about them. Read the rest

MI5 warning: we're gathering more than we can analyse, and will miss terrorist attacks

hand-792923_960_720

In 2010, the UK spy agency MI5 drafted memos informing top UK officials that its dragnet surveillance programme was gathering more information than it could make sense of, and warning that its indiscriminate approach to surveillance could put Britons at risk when signals about dangerous terror attacks were swamped by the noise of meaningless blips from the general population. Read the rest

NSA dumps docs about its Snowden response, reveals that Snowden repeatedly raised alarms about spying

edward-snowden-leaks-tried-to-tell-nsa-about-surveillance-concerns-body-image-1465060915

Since the earliest days of the Snowden revelations, apologists for the NSA's criminal spying program have said that Snowden should have gone "through channels" to report his concerns, rather than giving evidence to journalists and going public. Read the rest

Untangling the Web: the NSA's supremely weird, florid guide to the Internet

056c026d-1c66-4d42-9fae-a8e96df290c5-1020x1071

Michael from Muckrock found a reference to "Untangling the Web," an internal NSA guide to the Internet, on Google Books, so he requisitioned a copy from the NSA under the Freedom of Information Act. Read the rest

Study shows detailed, compromising inferences can be readily made with metadata

1223787629_e67ae9c054_o

In Evaluating the privacy properties of telephone metadata, a paper by researchers from Stanford's departments of Law and Computer Science published in Proceedings of the National Academy of Sciences, the authors analyzed metadata from six months' worth of volunteers' phone logs to see what kind of compromising information they could extract from them. Read the rest

Edward Snowden performs radical surgery on a phone to make it "go black"

animation (1)

If you think that your phone may have been hacked so that your adversaries can watch you through the cameras and listen through the mics, one way to solve the problem is to remove the cameras and microphones, and only use the phone with a headset that you unplug when it's not in use. Read the rest

Tor Project is working on a web-wide random number generator

hs_montreal_4

Random number generators are the foundation of cryptography -- that's why the NSA secretly sabotaged the RNG standard that the National Institute for Standards and Technology developed. Read the rest

What the NSA's assault on whistleblowers taught Snowden

056c026d-1c66-4d42-9fae-a8e96df290c5-1020x1067

Investigative journalist Mark Hertsgaard's new book Bravehearts: Whistle-Blowing in the Age of Snowden tells the story of modern intelligence community whistleblowing; in a fantastic longread excerpted from the book, he recounts how the US military's program of punishing whistleblowers, and the officials charged with protecting them, convinced Snowden that he should take a thumbdrive full of documents directly to the media.

Read the rest

The Intercept begins publishing Snowden docs

056c026d-1c66-4d42-9fae-a8e96df290c5-1020x1059

The Intercept has begun publishing a large tranche of NSA documents leaked by Edward Snowden. All 166 articles from SID Today, an NSA internal newsletter, are coming in the first portion of Snowden docs that The Intercept will release, with more to come. Read the rest

More posts