Posted By Josh Peterson On 7:15 PM 08/02/2013 In Politics Americans now have responsibility for a bunch of new places they can’t find on a map. It turns out that the National Security Agency considers Canada, Greenland, Mexico and parts of… Read More ›
Cyber Security
Members of Congress denied access to basic information about NSA / Suggesting a new Shadow Government
Documents provided by two House members demonstrate how they are blocked from exercising any oversight over domestic surveillance • Morgan Griffith’s requests for NSA information • Alan Grayson’s requests for NSA information Glenn Greenwald theguardian.com, Sunday 4 August 2013 08.26… Read More ›
Billionaire Google Board Member Is Latest Victim Of “Guccifer” Hacking Rampage / “i wear glasses right now an I have 2 zillion + in my bank accounts:))”
Add a billionaire Silicon Valley titan to the growing list of public figures victimized by the hacker “Guccifer.” Venture capitalist John Doerr had his AOL account breached several days ago by the same hacker responsible for illegally accessing the e-mails… Read More ›
Radar gun spots vehicles with illegal GPS jammers / They could disrupt Power, Financial Institutions etc, etc…
17:33 02 August 2013 by Paul Marks For similar stories, visit the Crime and Forensics Topic Guide The battle against truckers and motorists who jam GPS signals has moved up a gear. A new handheld radar can pinpoint which vehicles… Read More ›
Colin Powell admits to sending ‘very personal’ emails to a Romanian diplomat but DENIES having an affair as a hacker threatens to leak their intimate messages
The 76-year-old former secretary of state said he met Corina Cretu, a 45-year-old member of the European Parliament, 10 years ago He said they began emailing each other in 2005 and ‘the emails became of a very personal nature but… Read More ›
The Pre-Snowden NSA leaks – Bumblehive, Operation Thinthread, Going Dark, Stingray, Trapwire, Total Information Awarness, etc..
Editors Note ( Ralph Turchiano ) – This is a requested Re-post from 2013 The Intelligence community began to lose control prior to Snowden. The Boston Bombing event resulted in over zealous Intelligence Consultants revealing trade secrets. Then Following the… Read More ›
Exclusive: NSA pays £100m in secret funding for GCHQ
• Secret payments revealed in leaks by Edward Snowden • GCHQ expected to ‘pull its weight’ for Americans • Weaker regulation of British spies ‘a selling point’ for NSA Nick Hopkins and Julian Borger The Guardian, Thursday 1 August 2013 11.04… Read More ›
XKEYSCORE- NSA Tool Presentation
Stored PDF file at link below: xkeyscore-slidedeck[1]
XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’
• XKeyscore gives ‘widest-reaching’ collection of online data • NSA analysts require no prior authorization for searches • Sweeps up emails, social media activity and browsing history • NSA’s XKeyscore program – read one of the presentations Glenn Greenwald… Read More ›
Oz defence department: We don’t have a ban on Lenovo kit
EEV: Really are they this Dumb? Nobody said you did, sunshine By Phil Muncaster Posted in Security, 31st July 2013 02:59 GMT Update The Australian Department of Defence has issued an official statement denying it banned the… Read More ›
Texas students hijack superyacht with GPS-spoofing luggage
Don’t panic, yet Students from the University of Texas successfully piloted an $80m superyacht sailing 30 miles offshore in the Mediterranean Sea by overriding the ship’s GPS signals without any alarms being raised. The team, led by assistant professor Todd… Read More ›
Western spooks’ banned Lenovo PCs after finding back doors
Report suggests ‘Five Eyes’ alliance won’t work with Chinese PCs By Phil Muncaster Posted in Security, 29th July 2013 03:45 GMT Chinese PC giant Lenovo has been banned from supplying kit for the top secret networks of western… Read More ›
Researchers show how a major GPS flaw could allow terrorists and hackers to hijack commercial ships and planes
By Daily Mail Reporter PUBLISHED: 20:29 EST, 27 July 2013 | UPDATED: 20:29 EST, 27 July 2013 The world’s GPS system is vulnerable to terrorists and hackers who could use it to hijack ships, including commercial airliners and cruise… Read More ›
Hacker found dead just days before he was due to demonstrate how to kill someone fitted with a pacemaker at conference
Barnaby Jack had said he could kill a person from 30 feet by using the hack Gained infamy after demonstrating how to hack cash machines By David Gardner PUBLISHED: 10:03 EST, 26 July 2013 | UPDATED: 20:09 EST, 26 July… Read More ›
Hacker Barnaby Jack dies in San Francisco aged 35 – He was due to present his findings on the security vulnerabilities of implanted medical devices Aug 1st
Jack, who became famous after demonstrating an ATM hack, died on Thursday – but coroners did not give details Amanda Holpuch guardian.co.uk, Friday 26 July 2013 13.37 EDT Jack was due to speak at the Black Hat conference, which… Read More ›
Hackers hijack software in a CAR and remotely control the steering, brakes and horn using a laptop
Security engineers have managed to hack the software in a Toyota Prius The U.S Defense Advanced Research Projects Agency funded the hack By Victoria Woollaston PUBLISHED: 11:30 EST, 25 July 2013 | UPDATED: 11:31 EST, 25 July 2013 Forget… Read More ›
Raid millions of bank accounts. New easy-to-use tool. Yours for $5,000
F… KINS hell! By John Leyden Posted in Security, 25th July 2013 12:59 GMT Cybercrooks have brewed a new professional-grade Trojan toolkit called KINS that will pose plenty of problems for banks and their customers in the months… Read More ›
Mobe SIM crypto hijack threatens millions: Here’s HOW IT WORKS
You’ll kick yourself when you know how By Bill Ray Posted in Phones, 22nd July 2013 15:31 GMT Analysis A German researcher reckons he can take control of your phone’s SIM card and hijack the handset by cracking the… Read More ›
Sim cards hacked: A single text that unlocks millions of mobiles
New vulnerability identified by mobile security experts blamed on 1970s encryption standards James Vincent Monday, 22 July 2013 Millions of mobile phones could be at risk from hackers according to new research identifying vulnerabilities in the encryption used by Sim… Read More ›
Hackers crippled HALF of world’s financial exchanges – report
Repeated assaults leave bankers in quivering heaps By Jasper Hamill Posted in Data Networking, 18th July 2013 11:43 GMT Cloud storage: Lower cost and increase uptime Half of all the world’s critical financial exchanges have suffered cyber attacks in the… Read More ›
Stores now tracking your behavior and moods through cameras and cell phones
Retailers across the globe are tracking shoppers without their consent Technology providers will not name the stores Nordstrom ended their use of this technology in May By Ryan Gorman PUBLISHED: 18:50 EST, 15 July 2013 | UPDATED: 19:28 EST, 15… Read More ›
Russian Agency Seeks Typewriters for Secret Documents
With the NSA spying scandal still making headlines, a Russian paper reports that agencies in that country have turned to typewriters to help keep their documents secret. It sounds like a Luddite response to recent revelations from Edward Snowden —… Read More ›
Little known search engine that refuses to store data on users doubles web traffic amid NSA tapping scandal
DuckDuckGo, based in Pennsylvania, does not share user data with sites This means fewer advertisements and results that are not skewed for users Firm saw web traffic double in the wake of Snowden NSA tapping leak By Helen Collis PUBLISHED:… Read More ›
Hardware powering the US Emergency Alert System can be easily tricked into broadcasting bogus apocalyptic warnings from afar
Emergency alert system easily pwnable after epic ZOMBIE attack prank Private crypto keys found in firmware – where were their BRRAAAIINNNS? By John Leyden Posted in Security, 9th July 2013 10:11 GMT Agentless Backup is Not a Myth Hardware powering… Read More ›
US-made monitoring devices detected on Iran and Sudan networks
Ellen Nakashima Tuesday, 9 July 2013 American-made devices used for internet monitoring have been detected on government and commercial computer networks in Iran and Sudan, in apparent violation of US sanctions that ban the sale of goods, services or… Read More ›
Snowden Confirms Stuxnet Malware developed by NSA and Israel Together
Author: Mohit Kumar, The Hacker News – Monday, July 08, 2013 In an interview with Germany’s Der Spiegel Magazine, American whistleblower Edward Snowden has Confirmed that Stuxnet Malware was developed by NSA and Israel Together. Stuxnet made international headlines in 2010… Read More ›
NSA ‘In Bed Together with the Germans’
In an interview, Edward Snowden accuses the National Security Agency of partnering with Germany and other governments in its spying activities. New information also indicates close working ties between the German foreign intelligence agency and the American authority. In an… Read More ›
Key US-EU trade pact under threat after more NSA spying allegations
Reports in Der Spiegel that US agencies bugged European council building ‘reminiscent of cold war’, says German minister Ian Traynor in Brussels, Louise Osborne in Berlin and Jamie Doward guardian.co.uk, Sunday 30 June 2013 08.39 EDT The Justus Lipsius building in… Read More ›
Attacks from America: NSA Spied on European Union Offices
SPIEGEL ONLINE 06/29/2013 11:21 PM By Laura Poitras, Marcel Rosenbach, Fidelius Schmid and Holger Stark America’s NSA intelligence service allegedly targeted the European Union with its spying activities. According to SPIEGEL information, the US placed bugs in the EU representation… Read More ›
EU officials ‘targeted’ in US spying programme
30 Jun 2013 BERLIN (AFP) The European Union was one of the “targets” of Washington’s huge Internet spy programme, with bugs hidden in EU offices in Brussels and the United States, German weekly Der Spiegel said in an edition to be… Read More ›
Paper: NSA gets data from UK, Germany, Italy, Spain, France
Sunday, 30 June 2013 The NSA has been working with at least seven European other countries to collect personal communications data, according to Wayne Madsen, a former NSA contractor who has come forward because he does not think the… Read More ›
Chinese wind-turbine firm charged with stealing US trade secrets
Sinovel Wind Group accused of illegally downloading software from former supplier American Superconductor guardian.co.uk, Friday 28 June 2013 05.38 EDT A worker paints wind turbines in Guangdong, China. Photograph: Tyrone Siu/Reuters China‘s largest wind-turbine company has been charged… Read More ›
US army blocks access to Guardian website to preserve ‘network hygiene’
Military admits to filtering reports and content relating to government surveillance programs for thousands of personnel Spencer Ackerman and Dan Roberts in Washington guardian.co.uk, Friday 28 June 2013 11.42 EDT The Pentagon insisted the Department of Defense was… Read More ›
WikiLeaks volunteer was a paid informant for the FBI
Posted By Wired On 12:22 PM 06/27/2013 In World | On an August workday in 2011, a cherubic 18-year-old Icelandic man named Sigurdur “Siggi” Thordarson walked through the stately doors of the U.S. embassy in Reykjavík, his jacket pocket concealing… Read More ›
Retired 4-star general probed over Stuxnet details leak – report
Marine Corps man under investigation over malware revelations By Jasper Hamill Posted in Security, 28th June 2013 14:34 GMT A retired general has been named as the target of a US Department of Justice probe into the release of confidential… Read More ›
How the NSA is still harvesting your online data
Files show vast scale of current NSA metadata programs, with one stream alone celebrating ‘one trillion records processed’ Glenn Greenwald and Spencer Ackerman guardian.co.uk, Thursday 27 June 2013 11.03 EDT The NSA collects and analyzes significant amounts of data from US… Read More ›
UK’s Serious Organised Crime Agency (Soca) was aware of illegal hacking activity by the wealthy for six years and did nothing. Project Riverside
Media phone-hacking? Tip of the iceberg, says leaked police report Thought the NotW was bad… check out the lawyers, insurers By John Leyden Posted in Security, 24th June 2013 15:58 GMT Agentless Backup is Not a Myth A suppressed report from… Read More ›
How Skype developed a secret program called ‘Project Chess’ to make it easier for law enforcement and government officials to spy on customers’ data
By Hayley Peterson PUBLISHED: 09:56 EST, 21 June 2013 | UPDATED: 09:56 EST, 21 June 2013 The web-based calling service Skype allegedly developed a secret program called ‘Project Chess’ to make it easier for the government to spy… Read More ›
GCHQ taps fibre-optic cables for secret access to world’s communications
Exclusive: British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal Ewen MacAskill, Julian Borger, Nick Hopkins, Nick Davies and James… Read More ›
We’ll be uploading our entire MINDS to computers by 2045 and our bodies will be replaced by machines within 90 years, Google expert claims
Ray Kurzweil, director of engineering at Google, believes we will be able to upload our entire brains to computers within the next 32 years – an event known as singularity Our ‘fragile’ human body parts will be replaced by machines… Read More ›
DoD Calls Out China On Cyber Spying
Jun. 19, 2013 – 09:50AM | By Staff report | Filed Under C4ISR Journal The Pentagon for the first time is making direct allegations that China’s government and military are behind widespread cyber spying. Previously, the U.S. had tried to… Read More ›
June 7 memorandum from the DoD warning employees not to read information on any leaks
DoD Warns Employees of Classified Info in Public Domain Categories: Leaks, Secrecy As a new wave of classified documents published by news organizations appeared online over the past week, the Department of Defense instructed employees and contractors that they must… Read More ›
DoD: If You See A Leaked NSA Document, Press SHIFT And DELETE To Get Rid Of It
from the this-again dept We saw this back when Wikileaks released a bunch of documents and the Defense Department and other government agencies told employees that they weren’t allowed to look at any of the documents, even though they were… Read More ›
‘Tell your boss I owe him another friggin’ beer:’ Hot mic catches NSA boss praising FBI chiefs for supportive testimony on surveillance programs
By Hayley Peterson PUBLISHED: 15:23 EST, 18 June 2013 | UPDATED: 15:24 EST, 18 June 2013 The director of the National Security Agency was overheard offering a round of beer to the FBI’s second-in-command following Tuesday’s congressional hearing on… Read More ›
Feds Must Produce NSA Dragnet Records for Criminal Defense
By IULIA FILIP FORT LAUDERDALE (CN) – Citing the NSA telephone dragnet, a federal judge ordered the United States government to deliver telephone records demanded by a man on trial for an armored car robbery in which a… Read More ›
Anon posts Filipino president’s phone numbers
EEV: As with all information being claimed to be leaked ,or hacked information, without validation. This information is for entertainment value only. Attempts to give Aquino a wake-up call and democracy a kick-start By Phil Muncaster Posted in Security,… Read More ›
Obama: NSA secret data gathering ‘transparent’
By KIMBERLY DOZIER / AP Intelligence Writer / June 17, 2013 WASHINGTON (AP) — President Barack Obama defended top secret National Security Agency spying programs as legal in a lengthy interview Monday, and called them transparent — even though they are authorized in secret…. Read More ›
Local hero and ‘Christ-like’ millionaire accused of massive fraud in Utah
Jeremy Johnson, 37, is charged with defrauding more than $275 million from ‘unwitting’ customers over five years in an online marketing scam The scam would allegedly sign customers up to online programs with monthly fees without their knowledge Johnson, who… Read More ›
GCHQ surveillance – the documents
http://www.guardian.co.uk/uk/interactive/2013/jun/16/gchq-surveillance-the-documents?guni=Network TOP SECRET STRAP1 Economic crisis [edited for classification] Sigint continues to provide occasional high-value, sensitive and timely reports. More strategically, a key focus for the Prime Minister is the G20 heads of state meeting in London on 2 April…. Read More ›
GCHQ intercepted foreign politicians’ communications at G20 summits / phones were monitored and fake internet cafes set up to gather information from allies in London in 2009
Exclusive: phones were monitored and fake internet cafes set up to gather information from allies in London in 2009 Ewen MacAskill, Nick Davies, Nick Hopkins, Julian Borger and James Ball The Guardian, Sunday 16 June 2013 15.46 EDT… Read More ›