Home » Posts tagged 'digital surveillance' (Page 3)

Tag Archives: digital surveillance

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Post Archives by Category

Moscow-Based Security Firm Reveals What May Be The Biggest NSA “Backdoor Exploit” Ever

Moscow-Based Security Firm Reveals What May Be The Biggest NSA “Backdoor Exploit” Ever

Since 2001, a group of hackers – dubbed the “Equation Group” by researchers from Moscow-based Kaspersky Lab – have infected computers in at least 42 countries (with Iran, Russia, Pakistan, Afghanistan, India, and Syria most infected) with what Ars Technica calls“superhuman technical feats” indicating “extraordinary skill and unlimited resources.”

The exploits – including the ‘prized technique’ of the creation of a secret storage vault that survives military-grade disk wiping and reformatting – cover every hard-drive manufacturer and have many similar characteristics to the infamous NSA-led Stuxnet virus.

According to Kaspersky, the spies made a technological breakthrough by figuring out how to lodge malicious software in the obscure code called firmware that launches every time a computer is turned on.

Disk drive firmware is viewed by spies and cybersecurity experts as the second-most valuable real estate on a PC for a hacker, second only to the BIOS code invoked automatically as a computer boots up.

“The hardware will be able to infect the computer over and over,” lead Kaspersky researcher Costin Raiu said in an interview.

Kaspersky’s reconstructions of the spying programs show that they could work in disk drives sold by more than a dozen companies, comprising essentially the entire market. They include Western Digital Corp, Seagate Technology Plc, Toshiba Corp, IBM, Micron Technology Inc and Samsung Electronics Co Ltd.

The group used a variety of means to spread other spying programs, such as by compromising jihadist websites, infecting USB sticks and CDs, and developing a self-spreading computer worm called Fanny, Kasperky said.

…click on the above link to read the rest of the article…

 

IN HISTORIC RULING, UK SURVEILLANCE SECRECY DECLARED UNLAWFUL

IN HISTORIC RULING, UK SURVEILLANCE SECRECY DECLARED UNLAWFUL

The United Kingdom’s top surveillance agency has acted unlawfully by keeping details about the scope of its Internet spying operations secret, a British court ruled in an unprecedented judgment issued on Friday.

Government Communications Headquarters, or GCHQ, was found to have breached human rights laws by concealing information about how it accesses surveillance data collected by its American counterpart, the National Security Agency.

The ruling was handed down by the Investigatory Powers Tribunal, a special court that handles complaints related to covert surveillance operations conducted by law enforcement and intelligence agencies. In its 15-year history, the tribunal has never before upheld a complaint against any intelligence agencies.

The legal challenge was brought by human rights groups, including Privacy International and Liberty, following disclosures from NSA whistleblower Edward Snowden. The groups alleged that GCHQ was unlawfully obtaining data through the NSA’s online spying program PRISM, which collects data stored by Internet giants such as Google, Apple, Microsoft, and Yahoo. The groups also focused on GCHQ’s role in obtaining private communications swept up by the NSA directly from internet cables, known as so-called “upstream” collection.

The court ruling against GCHQ found that by keeping the rules underpinning the surveillance secret, the agency had “contravened” the privacy and free expression provisions of the European Convention on Human Rights. The secret policies were released for the first time in December, meaning that until then GCHQ had been operating unlawfully, likely for several years. (GCHQ has had access to PRISM since at least 2010, according to reports based on Snowden documents.)

…click on the above link to read the rest of the article…

 

64 Percent Of News Reporters Believe That Obama Is Spying On Them

64 Percent Of News Reporters Believe That Obama Is Spying On Them

Is it okay for Barack Obama to spy on reporters?  Is it okay for government spooks to record their calls, monitor their online activity and collect their emails whenever they want?  Well, according to a shocking new pollconducted by Pew Research, 64 percent of investigative journalists believe that the government is already collecting data from them right now.  Sadly, very few of them are publicly voicing objections.

We are rapidly becoming the type of “Big Brother” society that George Orwell once wrote about, and most Americans are just going along for the ride.  One journalist that is making waves is former CBS News reporter Sharyl Attkisson.  In her new book entitledStonewalled: My Fight for Truth Against the Forces of Obstruction, Intimidation, and Harassment in Obama’s Washington, she claims that she has evidence that the government remotely activated her computer numerous times, monitored her keystrokes and even buried incriminating documents very deeply on her hard drive.  She has filed a lawsuit, and hopefully this will result in the public shaming of those involved in this spying.

With each passing day, we are becoming a little bit more like Nazi Germany, and if we continue down this road America will eventually be completely transformed into a totalitarian hellhole.

Have we really gotten to the point where virtually everyone knows that the government is spying on them but we just accept it as a fact of life?

…click on the above link to read the rest of the article…

How the Powerful Try to Rule Through Cybersecurity

How the Powerful Try to Rule Through Cybersecurity

Michael Daugherty is President & CEO of LabMD, an Atlanta-based clinical and anatomic medical laboratory with a national client base. Daugherty exposes how business was cyber bullied by federal contractors in his book The Devil Inside the Beltway, He summarizes his incredible story below:

…click on the above link to view the video…

WESTERN SPY AGENCIES SECRETLY RELY ON HACKERS FOR INTEL AND EXPERTISE

WESTERN SPY AGENCIES SECRETLY RELY ON HACKERS FOR INTEL AND EXPERTISE

The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents.

In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document.

These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.

By looking out for hacking conducted “both by state-sponsored and freelance hackers” and riding on the coattails of hackers, Western intelligence agencies have gathered what they regard as valuable content:

…click on the above link to read the rest of the article…

 

Edward Snowden tells students mass data collection can hamper attempts to foil attacks

Edward Snowden tells students mass data collection can hamper attempts to foil attacks

Video appearance of NSA whistleblower sparks debate at Upper Canada College

U.S. National Security Agency whistleblower and international fugitive Edward Snowden told students at Upper Canada College that the mass collection of data by government spy agencies can get in the way of foiling terrorist plots.

Such programs can sometimes take resources away from targeted data collection of specific threats, Snowden, told students at the private school in Toronto, where he was invited to speak.

The problem with mass surveillance is when you collect everything, you understand nothing,” he said during the video conference Monday evening.

Snowden, who exposed the NSA’s domestic spying program in 2013, was the keynote speaker at the World Affairs Conference, which is co-organized by Upper Canada College, where he also took questions from students.

The title of the talk, which also included journalist Glenn Greenwald, was “Privacy vs. Security: A Discussion of Personal Privacy in the Digital Age.”

He told students that electronic spying programs constitute a threat to democracy and ought to be subject to more public debate about limits on how information is collected and used.

“This fundamentally changes the balance of power between the citizen and the state,” he said. 

…click on the above link to read the rest of the article…

 

“Recipe for Disaster”: Canadian Government to Expand State Surveillance Powers (Again)

“Recipe for Disaster”: Canadian Government to Expand State Surveillance Powers (Again)

The “spillover effects” of overbroad anti-terror legislation.

We’ve long been lamenting the enormous and still utterly murky – despite the Snowden revelations – spy apparatus in the US that, in collaboration with Corporate America, stretches from many federal agencies to state and local agencies. It’s all there, seamless, borderless, perfect: collecting license-plate data with photos that show who went where with whom to do what, checking out our “secure” data in the Cloud, collecting phone “metadata” that is not supposed to reveal personal details….

“We kill people based on metadata,” explained helpfully Gen. Michael Hayden, former head of the NSA. To make us Americans feel better, he added, “But that’s not what we do with this metadata.”

On the corporate side, consumer surveillance technologies and methods, dressed up in appealing terms like Ad Tech, are being perfected, and an entire startup bubble has sprung up to compete with the Big Ones that already master this.

For years, and at every level, laws have been passed in the US to give Big Brother more and more tools to track us in everything we do. Despite these efforts, Big Brother is just slowly limping behind fleet-footed Corporate America.

The article below reveals how the Canadian government is marching in the same direction, perhaps at a different pace, but with equally disturbing undertones.

…click on the above link to read the rest of the article…

 

Source Code Similarities: Experts Unmask ‘Regin’ Trojan as NSA Tool

Source Code Similarities: Experts Unmask ‘Regin’ Trojan as NSA Tool

Earlier this month, SPIEGEL International published an article based on the trove of documents made available by whistleblower Edward Snowden describing the increasingly complex digital weapons being developed by intelligence services in the US and elsewhere. Concurrently, several documents were published as well as the source code of a sample malware program called QWERTY found in the Snowden archive.

For most readers, that source code was little more than 11 pages of impenetrable columns of seemingly random characters. But experts with the Russian IT security company Kaspersky compared the code with malware programs they have on file. What they found were clear similarities with an elaborate cyber-weapon that has been making international headlines since November of last year.

Last fall, Kaspersky and the US security company Symantec both reported for the first time the discovery of a cyber-weapon system which they christened “Regin”. According to Kaspersky, the malware had already been in circulation for 10 years and had been deployed against targets in at least 14 countries, including Germany, Belgium and Brazil but also India and Indonesia.

Symantec spoke of a “highly complex” threat. Many of the targets were in the telecommunications sector, but others included energy companies and airlines. Both Symantec and Kaspersky did not shy away from superlatives when describing the malware program, calling it a “top-tier espionage tool” and the most dangerous cyber-weapon since Stuxnet, the notorious malware program used to attack the Iranian nuclear program.

 

…click on the above link to read the rest of the article…

CSE tracks millions of downloads daily: Snowden documents

CSE tracks millions of downloads daily: Snowden documents

Global sites for sharing movies, photos, music targeted in mass anti-terror surveillance

Canada’s electronic spy agency sifts through millions of videos and documents downloaded online every day by people around the world, as part of a sweeping bid to find extremist plots and suspects, CBC News has learned.

Details of the Communications Security Establishment project dubbed “Levitation” are revealed in a document obtained by U.S. whistleblower Edward Snowden and recently released to CBC News.

Under Levitation, analysts with the electronic eavesdropping service can access information on about 10 to 15 million uploads and downloads of files from free websites each day, the document says.

“Every single thing that you do — in this case uploading/downloading files to these sites — that act is being archived, collected and analyzed,” says Ron Deibert, director of the University of Toronto-based internet security think-tank Citizen Lab, who reviewed the document.

In the document, a PowerPoint presentation written in 2012, the CSE analyst who wrote it jokes about being overloaded with innocuous files such as episodes of the musical TV series Glee in their hunt for terrorists.

…click on the above link to read the rest of the article…

 

The Digital Arms Race: NSA Preps America for Future Battle

The Digital Arms Race: NSA Preps America for Future Battle

Normally, internship applicants need to have polished resumes, with volunteer work on social projects considered a plus. But at Politerain, the job posting calls for candidates with significantly different skill sets. We are, the ad says, “looking for interns who want to break things.”

Politerain is not a project associated with a conventional company. It is run by a US government intelligence organization, the National Security Agency (NSA). More precisely, it’s operated by the NSA’s digital snipers with Tailored Access Operations (TAO), the department responsible for breaking into computers.

Potential interns are also told that research into third party computers might include plans to “remotely degrade or destroy opponent computers, routers, servers and network enabled devices by attacking the hardware.” Using a program called Passionatepolka, for example, they may be asked to “remotely brick network cards.” With programs like Berserkr they would implant “persistent backdoors” and “parasitic drivers”. Using another piece of software called Barnfire, they would “erase the BIOS on a brand of servers that act as a backbone to many rival governments.”

…click on the above link to read the rest of the article…

 

New Anti Terror Laws Coming After Attack On Charlie Hebdo

New Anti Terror Laws Coming After Attack On Charlie Hebdo

Stephen Harper announced that an “international Jihadist Movement Has Declared War On The World”, in the wake of the Charlie Hebdo attack in France. He also stated that new anti terrorism legislation would be introduced shortly after the House of Commons winter break.

The Canadian government responded to the fall attacks in Ottawa and Quebec, in the same fashion. Intoducing Bill C-44. You can read the full version of Bill C-44 HERE.

Critics of Bill C-44 cite concerns such as:

“Our government is already in the midst of giving spies more power through the passage of Bill C-13 (better known as the Cyberbullying Bill), which makes it easier for law enforcement agencies to surveil Canadians and allows Internet Service Providers to voluntarily turn your information over to the government without consequence, and without notifying you. The bill is so broad that even Carol Todd – mother of Amanda Todd, whose heartbreaking death helped inspire C-13 – has spoken out against its surveillance provisions.

And now, following last week’s attacks, the government wants to expand its spying powers even further through C-44. The bill has a lot of problems, but I want to concentrate on just one. C-44 would cut judicial oversight out of the admission of information from confidential informants at trial, automatically preserving the anonymity of those informants. In other words, Canadians would lose the right to confront their accusers in court; in essence, it’s the loss of our right to due process.

 

…click on the above link to read the rest of the article…

Security Apparatus and Politicians React to Paris Attacks

Security Apparatus and Politicians React to Paris Attacks

Memo from the Deep State: Surveillance Still not Ubiquitous Enough

No sooner had the blood in Paris dried so to speak, as representatives of Western security services and police reminded us that they have still not enough funding and power. Say what?

As far as we are aware, their surveillance includes practically everything, to the point that the UK’s CGHQ has probably obtained the world’s biggest collection of amateur porn, by dint of spying at millions of webcam users. Lest we forget:

“Britain’s surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.

GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images ofYahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.

In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally.

[…]

The documents also chronicle GCHQ’s sustained struggle to keep the large store of sexually explicit imagery collected by Optic Nerve away from the eyes of its staff, though there is little discussion about the privacy implications of storing this material in the first place.

(emphasis added)

…click on the above link to read the rest of the article…

 

Activist Post: How Many of These Secret Surveillance Programs Do You Know About?

Activist Post: How Many of These Secret Surveillance Programs Do You Know About?.

According to various publications in the American and foreign media, the United States has created a global system of cyber espionage that allows the interception and processing of personal data around the globe in violation of fundamental human rights.

Tapped phones, intercepted short messages, supervised discussions in social networks and stolen emails – this is the ugly reality we are living in. The NSA and other units of the United States Intelligence Community are more than capable of breaching any mobile operating system, be it iOS, Android or BlackBerry OS.

In 2011 US intelligence agencies successfully finished the development of geo-location tracking software that allows the NSA to collect and save more than five billion location records of mobile users around the world on a daily basis, and then through a special program labeled CO-TRAVELER analyze and monitor the movement of certain individuals that could be of interest for Washington. In addition, since 2010 information on social contacts of US citizens, their personal data, including telephone calls, Internet logs, bank codes, insurance data is being processed by intelligence agencies on a regular basis.

…click on the above link to read the rest of the article…

Can Iceland become the ‘Switzerland of data’? – Features – Al Jazeera English

Can Iceland become the ‘Switzerland of data’? – Features – Al Jazeera English.

Reykjavík, Iceland – On a cold, windy December afternoon in the southern Icelandic town of Reykjanesbaer, this former NATO airbase looked like nothing more than a huge warehouse from the outside.
 
But the barbed-wire fence surrounding it and surveillance cameras atop its gates betrayed its importance.
 
This facility, which began operating in February 2012, is one of several data centres in Iceland. It’s run by Verne Global, a company that allows its customers to store data on servers here.
 
Tate Cantrell, the company’s chief technical officer, explained why Verne Global favoured this tiny Nordic nation of all places. “In Iceland, you’ve got this ideal situation: energy, excellent connectivity for data, and a constant cool climate. So Iceland was an obvious choice.”
 
Iceland’s abundant renewable energy from geothermal and hydroelectric plants means the costs of running these data centres are low. And the Gulf Stream current keeps the temperature in Iceland more or less stable throughout the year, avoiding the need to provide cooling for the servers and computers.

…click on the above link to read the rest of the article…

Olduvai IV: Courage
Click on image to read excerpts

Olduvai II: Exodus
Click on image to purchase

Click on image to purchase @ FriesenPress