from the this-again dept We saw this back when Wikileaks released a bunch of documents and the Defense Department and other government agencies told employees that they weren’t allowed to look at any of the documents, even though they were… Read More ›
Technology
‘Tell your boss I owe him another friggin’ beer:’ Hot mic catches NSA boss praising FBI chiefs for supportive testimony on surveillance programs
By Hayley Peterson PUBLISHED: 15:23 EST, 18 June 2013 | UPDATED: 15:24 EST, 18 June 2013 The director of the National Security Agency was overheard offering a round of beer to the FBI’s second-in-command following Tuesday’s congressional hearing on… Read More ›
Slime mould could make memristors for biocomputers
13:49 18 June 2013 by Paul Marks Magazine issue 2922. Subscribe and save A garish yellow slime that grows on rotten leaves and logs could one day form the brains behind living computers. The feeding fronds of… Read More ›
Feds Must Produce NSA Dragnet Records for Criminal Defense
By IULIA FILIP FORT LAUDERDALE (CN) – Citing the NSA telephone dragnet, a federal judge ordered the United States government to deliver telephone records demanded by a man on trial for an armored car robbery in which a… Read More ›
Anon posts Filipino president’s phone numbers
EEV: As with all information being claimed to be leaked ,or hacked information, without validation. This information is for entertainment value only. Attempts to give Aquino a wake-up call and democracy a kick-start By Phil Muncaster Posted in Security,… Read More ›
Obama: NSA secret data gathering ‘transparent’
By KIMBERLY DOZIER / AP Intelligence Writer / June 17, 2013 WASHINGTON (AP) — President Barack Obama defended top secret National Security Agency spying programs as legal in a lengthy interview Monday, and called them transparent — even though they are authorized in secret…. Read More ›
Local hero and ‘Christ-like’ millionaire accused of massive fraud in Utah
Jeremy Johnson, 37, is charged with defrauding more than $275 million from ‘unwitting’ customers over five years in an online marketing scam The scam would allegedly sign customers up to online programs with monthly fees without their knowledge Johnson, who… Read More ›
GCHQ surveillance – the documents
http://www.guardian.co.uk/uk/interactive/2013/jun/16/gchq-surveillance-the-documents?guni=Network TOP SECRET STRAP1 Economic crisis [edited for classification] Sigint continues to provide occasional high-value, sensitive and timely reports. More strategically, a key focus for the Prime Minister is the G20 heads of state meeting in London on 2 April…. Read More ›
GCHQ intercepted foreign politicians’ communications at G20 summits / phones were monitored and fake internet cafes set up to gather information from allies in London in 2009
Exclusive: phones were monitored and fake internet cafes set up to gather information from allies in London in 2009 Ewen MacAskill, Nick Davies, Nick Hopkins, Julian Borger and James Ball The Guardian, Sunday 16 June 2013 15.46 EDT… Read More ›
We want to put a KILL SWITCH into your PHONE, say Feds
The only good mobe is a dead mobe By Bill Ray Posted in Security, 14th June 2013 11:44 GMT Magic Quadrant for Enterprise Backup/Recovery US law enforcement is calling for a mandatory kill switch on all mobiles, enabling the shut… Read More ›
All Hackable from fetal monitors used in hospitals to pacemakers implanted in people
FDA, facing cybersecurity threats, tightens medical-device standards By Lena H. Sun and Brady Dennis, Published: June 12 | Updated: Thursday, June 13, 6:01 AM The Food and Drug Administration is tightening standards for a wide range of medical devices — from fetal… Read More ›
Parents of SEAL killed in Afghanistan helicopter crash join billion-dollar lawsuit against the government after ‘their Verizon phone was tapped when they started asking questions over their son’s death’
Charles and Mary Anne Strange, from Philadelphia, said they heard strange tapping on the line in the months after son Michael’s death Mr Strange said: ‘When I started asking questions, that’s when my phone got tapped’ By Daily Mail Reporter… Read More ›
Europe warns US: Do what you like to Americans, but Do Not spy on Europeans
Wednesday, 12 June 2013 The EU has warned President Barack Obama’s administration of “grave adverse consequences” to the rights of European citizens from a huge US Internet surveillance programme, officials said Wednesday. Viviane Reding, the EU’s Justice Commissioner, wrote… Read More ›
Americans start operation “Troll the NSA”
Tuesday, 11 June 2013 An operation to troll the NSA has started up online in a bid to jam the spy scanners. The plan is to ‘test’ the system by sending a message full of terrorist buzz words to… Read More ›
Hacker who helped find Steubenville rapists threatened with decade in prison
While the rapists get minimum sentence and rehab By Iain Thomson in San Francisco Posted in Security, 10th June 2013 18:13 GMT Free whitepaper – Customer Success Testimonial: Recovery is Everything A security consultant who helped uncover evidence of the… Read More ›
The spy who came in for your soul – ” We are, like, that far from a turnkey totalitarian state.”
COLUMN – The spy who came in for your soul Source: Reuters – Sun, 9 Jun 2013 08:00 PM Author: Reuters (Jack Shafer is a Reuters columnist but his opinions are his own.) By Jack Shafer June 9 (Reuters) –… Read More ›
William Hague: Law-abiding Britons have nothing to fear from GCHQ
The Foreign Secretary will appear before the House of Commons tomorrow to try to allay concerns about the Prism spy scheme which enables the USA’s spy agency to mine data from Facebook and other web companies Andy McSmith Sunday, 9… Read More ›
NSA sucks realtime data from FIFTY companies
Companies are all compelled by the Foreign Intelligence Surveillance Act to hand over any information requested under the law, but they’re not required to make access easier PRISM data-mining program was launched in 2007 with approval from special federal judges… Read More ›
Boundless Informant: the NSA’s secret tool to track global surveillance data
Revealed: The NSA’s powerful tool for cataloguing data – including figures on US collection • Boundless Informant: mission outlined in four slides • Read the NSA’s frequently asked questions document Glenn Greenwald and Ewen MacAskill guardian.co.uk, Saturday 8… Read More ›
Spy program shows just how well US knows its people
17:35 07 June 2013 by Hal Hodson For similar stories, visit the Crime and Forensics Topic Guide They’re watching you (Image: Lucas Jackson/Reuters) The US government is watching every digital move that Americans make. More than 115 million people… Read More ›
Link to Anonymous Leaked PRISM-related NSA docs
EEV: Always Click with Caution Link to Anonymous leaks more PRISM-related NSA docs Primary Page: http://thedocs.hostzi.com/ 2010 EA Conf_RA Track Presentation_20100506.ppt 3170_01.pdf 514401Doddirectoritenetworks.pdf 6212_01.pdf 800001pDirectoriteDodinfoenterprise.pdf DT-12-COI-Glossary.pdf DoDAF-DM2_CMP_v1-0_FINAL_2011-10-03r1.docx DoD_NetOps_Strategic_Vision.pdf EATransitionStrategy.pdf NSI_EE.pdf insa-spies.pdf netcentric_jfc-1.pdf security_clearance.pdf
Foreign Governments gathering secret intelligence via covert NSA operation
UK gathering secret intelligence via covert NSA operation Exclusive: UK security agency GCHQ gaining information from world’s biggest internet firms through US-run Prism programme Nick Hopkins guardian.co.uk, Friday 7 June 2013 09.27 EDT Documents show GCHQ (above) has… Read More ›
Leak of NSA order against Verizon could cause irreversible harm to national security, says top intelligence officer
A copy of a secret order shows that the National Security Agency ordered Verizon to hand over millions of phone records with no explanation Order extends from until July 19 and includes domestic and foreign calls Nearly 150million Verizon customers… Read More ›
By the numbers: The NSA’s super-secret spy program, PRISM
Posted By Elias Groll Thursday, June 6, 2013 – 8:00 PM In a bombshell scoop, the Washington Post is reporting that the National Security Agency (NSA) has gained direct access to the servers of nine prominent Internet companies,… Read More ›
Forget phones, PRISM plan shows internet firms give NSA everything
Microsoft, Google, Apple and Yahoo! and others open their legs servers By Iain Thomson in San Francisco Posted in Security, 7th June 2013 00:23 GMT It has been a rough 24 hours for the US National Security Agency. First a leaked… Read More ›
NSA collecting phone records of millions of Americans daily – revealed
Exclusive: Top secret court order requiring Verizon to hand over all call data shows scale of domestic surveillance under Obama • Read the court order in full here Glenn Greenwald The Guardian, Wednesday 5 June 2013 Under the terms of the… Read More ›
Obama’s top appointees use secret email accounts – AP
Published time: June 04, 2013 16:04 Reuters / Kacper Pempel / Files Human rights, Internet, Obama, Scandal, Security, USA Some of US President Barack Obama’s high-ranked political appointees are using secret government email accounts, which they say… Read More ›
Germany: Microsoft’s Xbox is twisted nightmare for spying
Monday, 03 June 2013 When Microsoft launched its new Xbox One console last week, rave reviews calling it “awesome” and “stunning” were quickly forgotten when gamers began complaining about how the device doesn’t work with their old favorites (among… Read More ›
Motorola shows off tattoo and swallowable password hardware
Mobe manufacturer playing long game for end times By Iain Thomson in San Francisco Posted in Security, 31st May 2013 19:26 GMT Regcast training : Hyper-V 3.0, VM high availability and disaster recovery Motorola has shown off an electronic authentication… Read More ›
Google MUST hand over sensitive details for thousands of users to FBI – even without a warrant
By Daily Mail Reporter and Associated Press PUBLISHED: 09:06 EST, 1 June 2013 | UPDATED: 09:06 EST, 1 June 2013 Google must comply with the FBI’s warrantless demands for large amounts of customer data, a federal judge has ruled…. Read More ›
Guccifer emails link Tony Blair to top-secret Bohemian Grove gathering
Published time: March 25, 2013 17:28 Edited time: March 28, 2013 07:41 Former British prime minister Tony Blair (AFP Photo / Carl Court) Attending the elusive Bohemian Grove retreat should be a priority for former UK Prime Minister Tony… Read More ›
US National Intelligence Council boss gets personal email hacked
Guccifer claims another political scalp with anti-Obama rant By Iain Thomson in San Francisco Posted in Security, 29th May 2013 20:14 GMT In a rather embarrassing slip, the personal email account of Christopher Kojm, chairman of the US National Intelligence… Read More ›
Report: Chinese Hackers Breach Top Weapons Designs
May. 28, 2013 – 05:59PM | By DOUG STANGLIN USA Today and the Defense News staff | Cyber Attack Targets Australia Spy Headquarters: Hackers traced to a server in China have stolen the floor plans for the new Australia… Read More ›
Advanced Biological Computer Developed with ability to read and transform genetic information
Microprocessor with DNA (illustration). Scientists have developed and constructed an advanced biological transducer, a computing machine capable of manipulating genetic codes, and using the output as new input for subsequent computations (Credit: © Giovanni Cancemi / Fotolia) May 23, 2013… Read More ›
Navy Seeks To Map the Mind
May. 17, 2013 – 03:50PM By Michael Peck In some visions of the future, you’ll drive your car with little more than your mind. Electrodes on your head, you can climb into your car, think about how much you’d like… Read More ›
Do-it-yourself invisibility with 3-D printing
Contact: Richard Merritt richard.merritt@duke.edu 919-660-8414 Duke University DURHAM, N.C. – Seven years ago, Duke University engineers demonstrated the first working invisibility cloak in complex laboratory experiments. Now it appears creating a simple cloak has become a lot… Read More ›
Gang stole $45m from cash machines across globe in hours, say prosecutors
‘Virtual criminal flash mob’ used bogus swipe cards loaded with data from hacked bank databases to commit thousands of thefts Associated Press in New York guardian.co.uk, Friday 10 May 2013 05.38 EDT Seven people are being held in connection with… Read More ›
Are all telephone calls recorded and accessible to the US government?
A former FBI counterterrorism agent claims on CNN that this is the case Glenn Greenwald guardian.co.uk, Saturday 4 May 2013 08.22 EDT Former FBI counterterrorism agent Tim Clemente, on CNN, discussing government’s surveillance capabilities Photograph: CNN screegrab The real capabilities… Read More ›
‘Chinese’ attack sucks secrets from US defence contractor
Comment Crew blamed for three-year attack on QinetiQ By Phil Muncaster Posted in Security, 2nd May 2013 04:54 GMT Free whitepaper – Hands on with Hyper-V 3.0 and virtual machine movement Just when it looked like US-China relations couldn’t get… Read More ›
Red faces as Pentagon leases Chinese satellite
It’s ok, we’ve added ‘additional transmission security’ By Phil Muncaster Posted in Government, 1st May 2013 04:04 GMT Free whitepaper – Hands on with Hyper-V 3.0 and virtual machine movement US lawmakers are up in arms after it emerged that the… Read More ›
Pentagon leaning on Chinese satellite for Africa Command communications : ” sparked outcry by disclosing its lease of bandwidth from a Chinese satellite “
On the heels of a new presidential resolution for US government agencies to avoid Chinese IT hardware over security concerns, the Pentagon has sparked outcry by disclosing its lease of bandwidth from a Chinese satellite. According to Pentagon… Read More ›
Smart Meters Easily Hacked and can shut down whole neighbourhoods
Crap computers in a crap box: Smart-meter blackouts risk to UK Sniff a device’s wireless, pwn a power plant, warns Brit biz By John Leyden Posted in Security, 30th April 2013 09:06 GMT Free whitepaper – Hands on with Hyper-V… Read More ›
Serial killer hack threat to gas pipes, traffic lights, power plants
‘You could shut down the electricity grid’ warns security biz By John Leyden Posted in Security, 29th April 2013 09:04 GMT Free whitepaper – Hands on with Hyper-V 3.0 and virtual machine movement Analysis Medical systems to traffic light boxes are… Read More ›
Smart dust computers are no bigger than a snowflake
26 April 2013 by Mark Anderson Magazine issue 2914. Subscribe and save Thousands of tiny computers that scavenge power from their surroundings could one day be used to monitor your world THOUGHT your smartphone or tablet packed a big… Read More ›
E-tattoo monitors brainwaves and baby bump : “now modifying the tattoo to transmit data wirelessly to a smartphone”
26 April 2013 by Sara Reardon Magazine issue 2914. Subscribe and save For similar stories, visit the The Human Brain Topic Guide An electronic patch can analyse complex brainwaves and listen in on a fetus’s heart MIND… Read More ›
Your body’s microbiome has a unique ‘fingerprint’
Contact: Suzanne Price sprice@nutrition.org 617-954-3976 Federation of American Societies for Experimental Biology Study suggests increasing complexity of gut effect on health Boston, MA—The microbiome is your body’s set of microbial communities; microbial cells outnumber human cells roughly ten to one…. Read More ›
Your phone may not be spying on you now – BUT it soon will be
Smash it with a hammer now, it’s the only way to be sure By John Leyden Posted in Security, 24th April 2013 10:04 GMT Free whitepaper – Hands on with Hyper-V 3.0 and virtual machine movement Infosec 2013 Tibetan political… Read More ›
Special E. Coli Bacteria Produce Diesel On Demand
Apr. 22, 2013 — It sounds like science fiction but a team from the University of Exeter, with support from Shell, has developed a method to make bacteria produce diesel on demand. While the technology still faces many significant commercialisation… Read More ›
Hacked AP tweet claiming White House explosion causes Dow dip
Pro-Assad Syrian Electronic Army claims responsibility By Iain Thomson in San Francisco Posted in Security, 23rd April 2013 19:27 GMT Free whitepaper – Hands on with Hyper-V 3.0 and virtual machine movement A group calling itself the Syrian Electronic Army… Read More ›
Massive Brute-force attack Targets WordPress sites worldwide
A large distributed brute force attack against WordPress sites is understood to be occurring. A large botnet with more than 90,000 servers is attempting to log in by cycling through different usernames and passwords. According to a blog update on IXWebHosting,… Read More ›