Tag: Technology

The Pentagon Is Investigating the Ashley Madison Leak

pentagon

US Secretary of Defense Ash Carter said today that the Pentagon is investigating the recent leak of user data from Ashley Madison. According to The Hill, roughly 15,000 email addresses associated with the US government and military have been found

What We Know About the NSA and AT&T’s Spying Pact

original

Two stories published almost a decade ago by WIRED and Salon provide in-depth details about the secret rooms at AT&T facilities in San Francisco, Missouri, and other areas across the US that the NSA used to siphon internet data. According

13 of History’s Most Ingenious Spy Cameras

wpdzf1ekz9k3ufmq361z

Most of us can’t help it: When we think about spies, we think about James Bond. And when we think about James Bond, we think about his gadgets. But real life spies use gadgets too—and there’s no more amazing category

Germany signs no-spy deal with BlackBerry after NSA phone tapping

merkel

Germany has approved BlackBerry’s purchase of encryption firm Secusmart after signing a “no-spy” agreement with the Canadian smartphone maker. Duesseldorf-based Secusmart provides special smartphones to German government officials that are meant to be safe from eavesdropping. German media report that

Experts call for ‘return to human intelligence’ after Snowden

as

The UK’s national security boss, Robert Hannigan, should come clean on surveillance and stop attacking technology companies, privacy experts have said. Intelligence agencies must use the debate sparked by Edward Snowden’s surveillance revelations to overhaul their attitude to privacy and

Americans’ Cellphones Targeted in Secret U.S. Spy Program

germany-feara-nsa-stole-industrial-secrets-282089_o

WASHINGTON—The Justice Department is scooping up data from thousands of mobile phones through devices deployed on airplanes that mimic cellphone towers, a high-tech hunt for criminal suspects that is snagging a large number of innocent Americans, according to people familiar

A Spy’s Deceptive Complaints

PHILIPPINES-MUSLIM-UNREST-BRITAIN-HANNIGAN

Robert Hannigan, the new director of Britain’s electronic intelligence agency, threw down quite a gauntlet with an op-ed article in The Financial Times arguing that the ever more secure communications services provided by the American technology companies that dominate the

Brazil begins laying its own Internet cables to avoid U.S. surveillance

imrs.php

There’s a new wrinkle in Brazil’s plan to build a $185 million undersea fiber-optic cable that would connect it to Portugal and help the country avoid surveillance by U.S. intelligence authorities, reports Bloomberg: The cable will be built without the help of any U.S.

CIA Hiring Chief Demystifies Agency’s Recruitment

The logo of the U.S. Central Intelligence Agency is shown in the lobby of the CIA headquarters

A tap on the shoulder from a university professor. A call from an unknown number leaving a vague voicemail message. Finding yourself strapped to a polygraph machine in a windowless room in Langley, VA, being told you might be lying

Who Is Running Phony Cell Phone Towers Around The Country?

An illustration picture shows the logo of the U.S. National Security Agency on the display of an iPhone in Berlin

On August 29, Popular Science published a map of interceptor towers, surveillance devices that masquerade as cell phone towers to intercept voice and data transmissions from every cell user in an area. 19 of the interceptors were found in the

In Yahoo Versus NSA, Hypocrisy Wins

NSA_Surveillance_Politics_Voters-09066

Yahoo! Inc., as it turns out, has cared about privacy since 2007. It just couldn’t tell anyone. The company posted a note last week saying it was “pleased to announce” that it had gotten thousands of pages of court documents

NSA, GCHQ have secret access to German telecom networks – report

donut.gif

US and UK intelligence services have secret access points for German telecom companies’ internal networks, Der Spiegel reports, citing slides created in the NSA’s ‘Treasure Map’ program used to get near-real-time visualization of the global internet. The latest scandal continues

Fake Cell Towers Allow the NSA and Police to Keep Track of You

Source: Newsweek

The Internet is abuzz with reports of mysterious devices sprinkled across America—many of them on military bases—that connect to your phone by mimicking cell phone towers and sucking up your data. There is little public information about these devices, but

Google’s upcoming trans-Pacific cable ripe for NSA intercepts

Submarine-Cable

The National Security Agency is no doubt licking their lips over the potential intelligence trove of Google’s proposed fiber optic cable, which will span the Pacific Ocean from the U.S. to Japan. As a former NSA official told VentureBeat, “Easy to

UK School children to be trained in cyber warfare

Teenagers in the UK are being offered the opportunity to learn cyber defence skills from Northrop Grumman, manufacturer of the USAF’s B-2 Stealth Bomber. The defence giant is partnering with the government-backed Cyber Security Challenge UK to engage thousands of

Chinese officials fear Apple products may be tools for U.S. espionage

apple_nsa

BEIJING – Edward Snowden might not be such a popular figure among Chinese officials any more, after it emerged this week that government money won’t be spent on iPads or MacBooks any more because of concerns about U.S. spying. Snowden’s

Tech Companies Reel as NSA’s Spying Tarnishes Reputations

google_cameras_inside

U.S. technology companies are in danger of losing more business to foreign competitors if the National Security Agency’s power to spy on customers isn’t curbed, the New America Foundation said in a report today. The foundation called for prohibiting the

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones

NSA surveillance program revelations continue to surface

Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement and intelligence agencies use the tool to surreptitiously record and steal data from mobile phones.