nsa

NSA Dishfire program pilfers millions of text messages per day

NSA Dishfire program pilfers millions of text messages per day

The latest in a long line of NSA-centric leaks comes a report about alleged project "Dishfire" from The Guardian, a program said to result in the harvesting of millions of text messages by the security agency on a daily basis. This is not targeted message collection, instead being the mass harvesting of nearly 200 million messages per day, which are then stored and used to extract details like credit card info, geolocation, and one's contact networks.

Continue Reading

NSA project working towards encryption-breaking quantum computer, reveals Snowden doc

NSA project working towards encryption-breaking quantum computer, reveals Snowden doc

According to documents leaked by Edward Snowden, the NSA dreams of a quantum computer that can break nearly every type of encryption -- one it is working towards (in part, at least) via a program called Penetrating Hard Targets, a $79.7 million project. The NSA isn't the only entity working on making a quantum computer reality, and such technologies would have widespread benefits beyond the cryptographically-oriented industry and various spy games.

Continue Reading

Apple denies opening NSA backdoor to iPhone

Apple denies opening NSA backdoor to iPhone

Apple has denied collaborating with the NSA to add a snooping backdoor to the iPhone, insisting that despite allegations that the DROPOUTJEEP program could access large swathes of iPhone content without the user realizing, it is unaware of any such exploit. New leaks from NSA documents acquired by whistleblower Edward Snowden led to claims earlier this week that the NSA had a tool that could access data like text messages, location, and more with "100-percent success," something Apple strongly denies either facilitating or, indeed, knowing was in operation.

Continue Reading

NSA catalog lets agents deliver cloned hardware to targets

NSA catalog lets agents deliver cloned hardware to targets

A new examination of the seemingly bottomless well of Snowden documents describes an internal NSA catalog of dead ringers for consumer hardware that the NSA can deploy on unsuspecting targets' systems. For example, when a target orders a new hard drive, router, monitor cable, or USB plug online, the NSA can intercept the order and send a bugged clone, which the target would then install by his own volition. The catalog includes hardware by Seagate, Samsung, Cisco, Huawei, Dell and many others.

Continue Reading

NSA phone surveillance ruled legal by NY judge [UPDATE]

NSA phone surveillance ruled legal by NY judge [UPDATE]

In a ruling on federal phone-tracking this week a U.S. District Judge based in New York has ruled that the NSA’s actions thus far have been legal. Judge William Pauley sent a ruling on Friday, the 27th of December, saying the NSA program “represents the government’s counter-punch” in efforts to eliminate al-Qaida network efforts. This ruling dismisses a lawsuit brought on by the American Civil Liberties Union.

Continue Reading

McAfee and Bletchley Park under fire over cyber security Snowden snub

McAfee and Bletchley Park under fire over cyber security Snowden snub

Attempts to edit Edward Snowden out of cyber security history have prompted fierce debate about the role played by the NSA whistleblower, after famed spy museum Bletchley Park opted not to include the 2013 revelations and his role in them in a new exhibit. Bletchley Park, today a museum but formerly the clandestine UK site where Alan Turing and others cracked the Nazi's Enigma code and arguably turned the fate of the Second World War, has courted controversy by electing to omit Snowden's part in digital security in a new gallery, out of concerns that doing so might be interpreted as condoning his leaks.

Continue Reading

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15