Historical Hacking Archive

Hacking Archives

Top Security Breaches

  • ALL INFORMATION WAS BREACHED AND RELEASED IN THE PUBLIC DOMAIN (Top 8)

For Historical and Educational Reference

Mysterious Group Hacks The NSA – Equation Group / SHADOW BROKERS – Requested repost from AUG 2016

  Tuesday, 16 August 2016 The latest hack revealed over the weekend has nothing to do with the Democratic Party or George Soros, and instead a mysterious hacker group by the name “The Shadow Brokers” claims to have hacked the Equation Group – a government cyberattack hacking group associated with the NSA, and released a…

Soros Hack reveals Plot for Global Power

  Soros Hack reveals Plot behind European Refugee Crisis Tuesday, 16 August 2016 In the two days since the Soros Open Society Foundation hack by the DCLeaks collective, several notable revelations have emerged among the data dump of over 2,500 documents exposing the internal strategy of the organization, which expose some of Soros’ tactics to…

Thousands of celebrities including Tom Hanks, LeBron James and Donald Trump left exposed after limo firm to the stars is hacked

By  James Nye PUBLISHED: 02:10 EST, 5  November 2013 |  UPDATED: 10:52 EST, 5 November 2013   An Internet security firm says a limousine  software company has been hacked, exposing credit card numbers and potentially  embarrassing details about close to 1 million customers, including film star Tom  Hanks, basketball player LeBron James and real-estate mogul…

Compromised Code Names, Operations and Equipment / Recent and in progress ( Updated 12:37PM PST / 27OCT2013 )

Editors Note: (Ralph Turchiano) Requested Repost from the archives (Oct 2013) EEV: Recently Compromised or exposed Code names, Operations, Software and facilities. The list is in no particular order and is being updated frequently. These are just the discoveries from the past 2 years. * Details of ALL operations can be found through inputting the…

Chinese government ‘hacks into White House office in charge of the nuclear launch codes’ (Oct 2012 Re-Post)

 Editors note: (Ralph Turchiano) Requested Re-Post from 2012 White House  confirmed the hack but downplayed it, saying no damage was done and it was  unsuccessful Military  Office targeted which controls the President’s travel, interoffice  communications, and nuclear codes By Meghan Keneally PUBLISHED:08:16 EST, 1  October 2012| UPDATED:11:54 EST, 1 October 2012 The White House revealed…

Hackers release financial records for vice president, attorney general, FBI director and others

https://web.archive.org/web/20130312002048/http://exposed.su/ Hackers have published what are alleged to be the personal financial records for several politicians and celebrities, including US Vice President Joe Biden, Attorney General Eric Holder and musicians Jay-Z and Beyoncé. Gossip website TMZ reported on Monday that hackers have leaked sensitive information pertaining to a list of prominent Americans, including celebrities Kim…

VAULT 7 “YEAR ZERO” CIA HACK Wikileaks – Press Release

Editors Note (Ralph Turchiano): Unfortunately at this time it appears that the CIA may have been majorly compromised Press Release     Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on…

Historical Hacking Archive Now Live

About 9 years of security breaches, code names, hacking tools all compiled FOR EDUCATIONAL REFERENCE ONLY (Enjoy) More Archives to come from Psychic Warfare, DNA Weapons, Financial Crimes, etc… Fun Fun Fun 😉

US State Department lacks any cyber-security whatsoever, including no passwords needed (Repost from Oct 2013)

Editors Note: (Ralph Turchiano)- Requested Repost from Oct 2103  Published time: October 28, 2013 02:01                                                                             Reuters / Jim Young Access classified data without authorization, use your account after you’ve been fired, or anonymously request a new account for an Afghan friend – these are just some of the features available in State Department’s SMART…

People Fall for NYTimes’ Fake Hacking Story of 1.2B Stolen Passwords

Friday, 08 August 2014 On August 5th, the NY Times published a story titled “Russian Hackers Amass Over a Billion Internet Passwords ” which was, in fact, a “Native Advertising” venture between this once respected newspaper and a relatively new computer company identified as Hold Security founded last year in Wisconsin by Alex Holden. “Native…

Edward Snowden’s not a one-off: US.gov hunts new secret doc leaker

Poor old Julian Assange – whistleblower went straight to Glenn Greenwald It appears former NSA contractor Edward Snowden is not the only leaker of secret US documents around, as the US government searches for another whistleblower in the aftermath of another leak of classified information. CNN reports that leaked documents related to a terrorist watch…

Intelligence expert Schmidt-Eenboom: ‘It’s a huge scandal’

According to German media, an employee of Germany’s foreign intelligence agency has been arrested on suspicion of spying for the United States. Intelligence expert Schmidt-Eenboom tells DW why this case is outrageous.   Intelligence expert Schmidt-Eenboom: ‘It’s a huge scandal’ | Germany | DW.DE | 05.07.2014   Erich Schmidt-Eenboom (photo: imago/Müller-Stauffenberg)   DW: A 31-year-old…

NBC Censored Snowden responses during interview

Saturday, 31 May 2014   Only around a quarter of the recent NBC News interview with former intelligence contractor Edward Snowden made it to broadcast, but unaired excerpts now online show that the network “neglected” to air critical statements about the 2001 terrorist attacks.   When the four-hour sit-down between journalist Brian Williams and Snowden…

NSA spied on 122 World Leaders

Sunday 30 March 2014 Secret documents newly disclosed by the German newspaper Der Spiegel on Saturday shed more light on how aggressively the National Security Agency and its British counterpart have targeted Germany for surveillance. A series of classified files from the archive provided to reporters by NSA whistleblower Edward Snowden, also seen by The…

Ukraine (cyber) war in full swing

2014-03-17 07:29 Kiev – With cyber attacks already launched against Crimean separatists, the Kremlin and Nato, the ground war may not have started in Ukraine but computer warfare is already raging. In recent days – and with increasing intensity on Sunday – a virtual war has commenced in the countries at the centre of the…

NSA’s TURBINE robot pumps ‘malware into MILLIONS of PCs’

Sysadmins, routers, criminals’ IRC botnets, and maybe terrorists, all for the pwning By Iain Thomson 12th March 2014 21:47 GMT The latest batch of top-secret intelligence documents from the hoard collected by NSA whistleblower Edward Snowden detail the massive increase in the agency’s use of its Tailored Access Operations (TAO) hacking unit – including a system…

Yahoo webcam images from millions of users intercepted by GCHQ

• Optic Nerve program collected Yahoo webcam images in bulk • 1.8m users targeted by UK agency in six-month period alone • Yahoo: ‘A whole new level of violation of our users’ privacy’ • Material included large quantity of sexually explicit images Spencer Ackerman and James Ball theguardian.com,              Thursday 27 February 2014 11.16 EST The…

Wi-Fi Computer Virus goes Airborn like common cold

  Thursday, 27 February 2014 Researchers in Britain have shown for the first time how a computer virus can spread through Wi-Fi “as efficiently as the common cold spreads between humans.” The ‘Chameleon’ Wi-Fi AP-AP virus infiltrates dense networks and spreads at an alarming rate. Chameleon was designed by a team of researchers from the…

‘I always wonder if someone is listening’: NSA spied on American lawyers but sometimes got other governments to do the work for them

U.S. law firm advising Indonesia’s government on trade issues was spied on by a foreign government Spying was done by Australia which then passed the info onto the NSA Law firm involved not identified in the latest documents The NSA is not allowed to target American citizens or businesses for surveillance without a warrant The…

Hackers used previously unknown Internet Explorer flaw in new attacks

– He said planting backdoors on the machines of VFW members and site visitors to collect military intelligence was a possible goal. Source: Reuters – Fri, 14 Feb 2014 01:25 AM Author: Reuters By Joseph Menn SAN FRANCISCO, Feb 13 (Reuters) – A previously unknown flaw in a recent version of Microsoft Corp’s Internet Explorer…

Snowden speaks: NSA spies create ‘databases of ruin’ on innocent folks

–  Firstly, the fear that everything is being recorded will change our personal behavior for the worse – secondly that the data amounted to “databases of ruin”, storing embarrassing or harmful details can be plucked out in retroactive investigations. ‘Not all spying is bad’ but bulk collection has to go, says whistleblower in web chat…

NSA statement does not deny ‘spying’ on members of Congress

– Senator Asked the Question ” about whether it “has spied, or is … currently spying, on members of Congress or other American elected officials” • Agency responds to questions from Senator Bernie Sanders • Statement cites ‘same privacy protections as all US persons’ Spencer Ackerman in Washington and Martin Pengelly in New York theguardian.com, Saturday…

NSA Warns of Rogue System Administrators 1996 / Irony?

EEV: Thank you to Cryptome for bringing attention to this. .. I decided to post the first page of the FOIA release, just to display the declassification date. A few out there will recognize the Irony 😉 4 January 2014 A sends: I was just searching through a list of declassified articles from the NSA’s    …

Not Socially Acceptable: NSA boss video ‘most hated’ on YouTube in 2013?

EEV: In all fairness to the NSA director, he is only an employee of the government. It is not appropriate he be the fall guy, unless he acted independently of his supervisors.  Published time: January 01, 2014 10:32                                                                             Director of the National Security Agency Gen. Keith Alexander.(AFP Photo / Alex Wong) A YouTube video in which…

NSA seizes full control of targeted iPhones via DROPOUTJEEP malware

Dec 30, 2013                    Will Conley                                                     The NSA developed in 2008 a software program for iPhones that can selectively and stealthily deliver data from iPhones to the NSA. The program is called DROPOUTJEEP. News of the malware is the latest to come out of the ongoing Snowden document media bonanza.   DROPOUTJEEP can read and…

Shopping for Spy Gear / Catalog Advertises NSA Toolbox

By Jacob Appelbaum, Judith Horchert and Christian Stöcker After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such methods already exist for numerous end-user devices. Editor’s note: This article accompanies our main feature story on the NSA’s Tailored Access Operations unit. You…

NSA mass collection of phone data is legal, federal judge rules

• Dragnet program deemed ‘controversial but lawful’ • Lawsuit brought by ACLU dismissed • NSA phone data collection deemed legal: full ruling Dan Roberts in Washington theguardian.com,              Friday 27 December 2013 11.52 EST Judge said the phone data-collection system could have helped investigators connect the dots before the 9/11 attacks. Photograph: Lucas Jackson /Reuters…

Phone companies might have to store snoop data instead of NSA, Obama says

  PUBLISHED : Sunday, 22 December, 2013, 5:49amUPDATED : Sunday, 22 December, 2013, 5:49am The Washington Post         US President Barack Obama winds up a press conference on possible NSA reforms. Photo: AFP US President Barack Obama signalled that he might halt the National Security Agency’s collection and storage of millions of Americans’ phone records and instead require phone companies…

Major computer security firm RSA took $10 mln from NSA to weaken encryption – report

  Published time: December 20, 2013 23:48                                                                                                                      RSA SecureID electronic keys (Reuters / Michael Caronna)                            The National Security Agency arranged a clandestine US$10 million contract with computer security power RSA that allowed the spy agency to embed encryption software it could use to infiltrate the company’s widely used products, Reuters reported.

$1,000 BOUNTY offered for FINGERPRINTS of a GLOBAL SPY CHIEF

  Privacy campaigner: NSA, GCHQ, NZSIS* – take your pick By       John Leyden Posted in Security, 18th December 2013 14:31 GMT Privacy campaigner Simon Davies is offering a $1,000 bounty for the capture of the DNA and fingerprints of spy chiefs. The 21st century treasure hunt offers a $1,000 cash windfall for anyone who supplies…

Snowden latest: NSA stalks the human race using Google, ad cookies

Every single day, every word you say, every game you play, they’ll be watching you Every single day, every word you say, every game you play, they’ll be watching youBy   Iain ThomsonPosted in Security,    12th December 2013 19:40 GMTThe already strained relationship between Google and the NSA has got a little bit worse, after claims in…

Spy agencies infiltrate gaming world

Xbox Live among game services targeted by US and UK spy agencies NSA and GCHQ collect gamers’ chats and deploy real-life agents into World of Warcraft and Second Life Read the NSA document: Exploiting Terrorist Use of Games & Virtual Environments James Ball The Guardian,  Monday 9 December 2013 18.26 EST World of Warcraft: the NSA…

NSA Claims Call Spying Reports Are False

1 November 2013 Date: Fri, 1 Nov 2013 08:13:57 +0100     Subject: update     From: <xxxxx[at]gmail.com>     To: Cryptome <cryptome[at]earthlink.net> In a letter to Dutch Parliament of October 31st [0], the Dutch Minister of  the Interior and Kingdom Relations (Ronald Plasterk) disclosed the text of  an unclassified letter he claims to have received from the NSA:…

Listing of the Most Controversial Posts as of 27 NOV 2013

As requested we have posted the list in preparation for archiving: ‘Assassination market’: Bernanke tops ‘kill-list’ in crowd-sourced bitcoin fundraiser for wannabe hitmen Current Black Market Prices for People and Organs Dangerous experiment in fetal engineering Hackers publish CIA Director Brennan’s financial records Hackers release financial records for vice president, attorney general, FBI director and…

Top secret document reveals NSA spies on porn habits of suspected terrorists in bid to discredit them

Document  was revealed by NSA whistleblower Edward Snowden It shows  agency spied on suspected radicalizers to  harm their reputations Civil liberties  campaigners have voiced concerns about the revelations One says:  ‘NSA surveillance activities are  anything but narrowly focused’ By  Daily Mail Reporter PUBLISHED: 04:50 EST, 27  November 2013 |  UPDATED: 05:58 EST, 27 November 2013…

Secretive trade pact called ‘most harmful ever’ for affordable medicine

Closed to the public, but some 600 corporations, including Walmart and Monsanto are the Trade advisors. Global health advocates say the Trans-Pacific Partnership, a proposed trade agreement between the US and 11 other countries, is an attack on public health. Part of the proposal was published by WikiLeaks last week. About 120 people gathered outside…

NSA’s goal to continually expand surveillance abilities “anyone, anytime, anywhere.”

Latest Snowden leak reveals NSA’s goal to continually expand surveillance abilities  Published time: November 23, 2013 04:05                                                                             The National Security Agency (NSA) headquarters at Fort Meade, Maryland (AFP Photo / Saul Loeb) In a mission statement last year the US National Security Agency described how it would continue to expand its power and assert…

US and UK struck secret deal to allow NSA to ‘unmask’ Britons’ personal data

• 2007 deal allows NSA to store previously restricted material • UK citizens not suspected of wrongdoing caught up in dragnet • Separate draft memo proposes US spying on ‘Five-Eyes’ allies James Balltheguardian.com,              Wednesday 20 November 2013 14.00 EST                   The memo explains that the US and UK ‘worked together to come up with a new…

Fisa court documents reveal extent of NSA disregard for privacy restrictions

Incensed Fisa court judges questioned NSA’s truthfulness after repeated breaches of rules meant to protect Americans’ privacy Fisa court judge John Bates found that the NSA engaged in ‘systemic overcollection’. Photograph: Paul J Richards/AFP Newly declassified court documents indicate that the National Security Agency shared its trove of American bulk email and internet data with…

Secret Trans-Pacific Partnership Agreement (TPP) The Documents (HTML)

Today, 13 November 2013, WikiLeaks released the secret negotiated draft text for the entire TPP (Trans-Pacific Partnership) Intellectual Property Rights Chapter. The TPP is the largest-ever economic treaty, encompassing nations representing more than 40 per cent of the world’s GDP. The WikiLeaks release of the text comes ahead of the decisive TPP Chief Negotiators summit…

WikiLeaks publishes secret draft chapter of Trans-Pacific Partnership / ‘would trample over individual rights and free expression’

Treaty negotiated in secret between 12 nations ‘would trample over individual rights and free expression’, says Julian Assange   Alex Hern and Dominic Rushe theguardian.com,              Wednesday 13 November 2013 13.12 EST Demonstrators protest against the Trans-Pacific Partnership (TPP) after the May Day rally in Tokyo, Japan. Photograph: EPA/Kimimasa Mayama WikiLeaks has released the draft…

GCHQ spoofed LinkedIn site to target global mobile traffic exchange and OPEC – report

Published time: November 11, 2013 00:23    Edited time: November 11, 2013 01:05                                                                             Satellite dishes are seen at GCHQ’s outpost at Bude, close to where trans-Atlantic fibre-optic cables come ashore in Cornwall, southwest England (Reuters/Kieran Doherty) The UK’s electronic spying agency has been using spoof version of LinkedIn professional social network’s website to target global…

Britain ‘snooped’ on Icelandic officials’ emails to recover cash from broken banks

 Published time: November 10, 2013 12:06                                                                              AFP Photo / Nicholas Kamm   An Icelandic MP says Britain spied on Iceland while wrestling to rescue its citizens’ cash from collapsed Icelandic banks after the financial crisis. Birgitta Jónsdóttir claims she received a tip-off from WikiLeaks founder Julian Assange. Jónsdóttir, who represents Iceland’s Pirate Party, maintains that…

Terrorists and Criminals may now exploit all the vunerabilities the NSA and GCHQ had built into our systems

  Berners-Lee: ‘Appalling and foolish’ NSA spying HELPS CRIMINALS Crooks rush in where spies boldly tread, says internet godhead By Jasper Hamill Posted in Security,  7th November 2013 14:58 GMT Sir Tim Berners-Lee, granddaddy of the internet, has attacked the NSA and GCHQ for their “appalling and foolish” cracking of online encryption. He warned that spooks’ attempts…

Snowden document reveals key role of companies in NSA data collection

NSA leverages relationships with commercial partners to collect vast quantities of data from fibre-optic cables, file shows • Tapping fibre-optic cables – see the NSA slide Ewen MacAskill and Dominic Rushe in New York theguardian.com,              Friday 1 November 2013 17.40 EDT Yahoo, Microsoft and Google deny they co-operate voluntarily with the intelligence agencies. Photograph:…

NSA chief Keith Alexander blames diplomats for surveillance requests

EEV: And what former General was having a relationship with a Romanian Diplomat?   https://engineeringevil.com/2013/08/03/you-were-my-greatest-love-of-my-life-deeply-personal-emails-sent-between-colin-powell-and-a-blonde-romanian-diplomat-revealed-by-hacker-but-he-denies-having-an-affair/   Barbed exchange with former ambassador over spying on foreign leaders likely to deepen rift with Obama administration Paul Lewis in Baltimore theguardian.com,              Thursday 31 October 2013 22.16 EDT Keith Alexander: pointed exchange. Photograph: Jim Watson/AFP/Getty Images The director of the…

U.S.A. Warns ‘Homeland Stupidity’ Parodist / “The NSA: The only part of government that actually listens.”

  By ELIZABETH WARMERDAM ShareThis BALTIMORE (CN) – The Department of Homeland Security and National Security Agency threatened to sue a novelty store owner who sells “Department of Homeland Stupidity” coffee cups and T-shirts with the slogan: “The NSA: The only part of government that actually listens.” In response, Dan McCall sued the NSA and…

Did the NSA even spy on the POPE? U.S. spies accused of intercepting phone calls during conclave as he was elected head of Catholic church

US security services ‘targeted Francis in  run up to and during conclave’ Claims NSA intercepted phone calls made  to and from priests’ residence Other leading bishops and cardinals ‘also  being monitored by US spies’ By  Hannah Roberts PUBLISHED: 14:58 EST, 30  October 2013 |  UPDATED: 17:42 EST, 30 October 2013   The US spied on…

NSA ‘broke into Yahoo and Google data centers to obtain millions of records every day’… and leaked doodle shows how spy agency did it with a smiley face

The Washington Post cites documents  leaked by Edward Snowden In 30 days, the NSA gleaned 180 million  new records including text, audio and video – and who sent it to whom and when  they sent it NSA: Claims that we collect data this way  are not true By  Associated Press and Daily Mail Reporter PUBLISHED:…

Spain colluded in NSA spying on its citizens, Spanish newspaper reports

El Mundo says it has document detailing collaboration between US intelligence agency and foreign countries  Paul Hamilos in Madrid theguardian.com,              Wednesday 30 October 2013 07.41 EDT A man protests against NSA spying outside the foreign ministry in Madrid. Photograph: Juan Medina/Reuters The widespread surveillance of Spanish citizens by the US National Security Agency, which…

Obama ‘gave the go-ahead for Merkel phone tapping’ as he wanted to ‘know everything’ about world’s most powerful woman, German newspaper claims

Bild  newspaper in Germany called US denials of eavesdropping ‘diplomatic lies’ as new  documents emerge They quote  a secret source which claims Obama not only sanctioned the operation against Mrs  Merkel but extended it By  Allan Hall In Berlin PUBLISHED: 20:11 EST, 27  October 2013 |  UPDATED: 20:11 EST, 27 October 2013   President Barack…

Europe should be grateful for spying, say U.S. lawmakers

World Oct. 28, 2013 – 07:00AM JST WASHINGTON — Europeans should be grateful for U.S. spying operations because they keep them safe, U.S. lawmakers said Sunday, urging allies to improve their own intelligence and oversight efforts. House Intelligence Committee Chairman Mike Rogers called “disingenuous” foreign governments’ outrage over the National Security Agency’s large dragnet over…

The NSA’s Secret Spy Hub in Berlin / SCS agents may have been compromised

 By SPIEGEL StaffAccording to SPIEGEL research, United States intelligence agencies have not only targeted Chancellor Angela Merkel’s cell phone, but they have also used the American Embassy in Berlin as a listening station. The revelations now pose a serious threat to German-American relations.It’s a prime site, a diplomat’s dream. Is there any better location for…

NSA asked Japan to tap regionwide fiber-optic cables in 2011

Kyodo Oct 27, 2013 Article history Online: Oct 27, 2013 Print: Oct 27, 2013 Last Modified: Oct 27, 2013 The U.S. National Security Agency sought the Japanese government’s cooperation in 2011 over wiretapping fiber-optic cables carrying phone and Internet data across the Asia-Pacific region, but the request was rejected, sources said Saturday.The agency’s overture was…

Euro Parliament axes data sharing with US – the NSA swiped the bytes anyway

  Hacking claims now probed by Continent’s cops By       Iain Thomson Posted in Government,  24th October 2013 18:24 GMT The European Parliament has voted to halt the Terrorist Finance Tracking Program (TFTP), an agreement to share data on financial transactions in the Continent with the US – after documents leaked by Edward Snowden showed the…

How The NSA Deploys Malware: An In-Depth Look at the New Revelations

We’ve long suspected that the NSA, the world’s premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneier—who is working with the Guardian to go through the Snowden documents—we have a much more detailed view of how the NSA uses exploits in order to…

NSA Denies Website Outage Is The Result Of A Cyberattack ( Still down as of 7:30pm PST)

Brian  Jones and Paul  Szoldra                  Oct. 25, 2013,  6:10 PM Arturo  Rodriguez / Associated Press   Despite speculation that mystery hacker-group “Anonymous” is behind  it, the NSA has denied their official website being down is the result of a  cyberattack.   The National Security Agency’s website, nsa.gov, has been down the better  part…

Senator Dianne Feinstein claims eavesdropping on phone callls is not surveillance, nor is it protected under the Fourth Amendment, which prohibits unreasonable searches.

‘No phone call, no Internet transaction, isn’t recorded by the  NSA’: Edward  Snowden fires back at U.S. government surveillance denials Senator  Dianne Feinstein claimed that the NSA’s phone-tracking is  benign Whistle-blower Snowden said in a statement that it is  pervasive in nature By  Ted Thornhill PUBLISHED: 08:49 EST, 25  October 2013 |  UPDATED: 08:56 EST,…

Malware infected International Atomic Energy Agency Computers

  Wang Wei, The Hacker News – Tuesday, October 22, 2013 Hackers and malware are everywhere, waiting for you around every corner of the Internet. The International Atomic Energy Agency (IAEA), which holds highly sensitive information and plays a key role in global efforts to prevent the spread of nuclear weapons, said on Tuesday that…

NSA monitored calls of 35 world leaders after US official handed over contacts

• Agency given more than 200 numbers by government official • NSA encourages departments to share their ‘Rolodexes’ • Surveillance produced ‘little intelligence’, memo acknowledges   James Ball The Guardian, Thursday 24 October 2013 14.14 EDT The NSA memo suggests that such surveillance was not isolated as the agency routinely monitors world leaders. Photograph: Guardian…

Europe Furious Over US Spying Allegations ” Worse than Orwell’s 1984 ” Emergency meeting Called

‘Out of Hand’ The newest allegations of US spying have unleashed a torrent of criticism and concern in Europe. If suspicions unearthed by SPIEGEL that the US tapped Chancellor Merkel’s cell phone turn out to be true, the ramifications for trans-Atlantic ties could be immense. Leading politicians and media commentators in Germany expressed serious concern…

NSA-friendly cyber-slurp law CISPA back on the table with new Senate bill

  Unsurprisingly with spooks’ full support By     Iain Thomson Posted in Law,    22nd October 2013 19:33 GMT The Cyber Intelligence Sharing and Protection Act (CISPA), which allows private companies to share customer information with the NSA and others in the name of cybersecurity, is back on the legislative agenda. Senator Dianne Feinstein (D-CA) today confirmed…

Kimsuky And The Secret Menace

October 21, 2013: Internet security researchers recently announced they had identified a new group of hackers operating out of North Korea. Calling this group Kimsuky, it has been active for about six months and has targeted universities, shipping companies and groups encouraging Korean unification. What made Kimsuky stand out was the amateurish behavior of its…

NSA Accessed Mexican President’s Email

By Jens Glüsing, Laura Poitras, Marcel Rosenbach and Holger Stark The NSA has been systematically eavesdropping on the Mexican government for years. It hacked into the president’s public email account and gained deep insight into policymaking and the political system. The news is likely to hurt ties between the US and Mexico. The National Security…

Laptops Snowden took to Hong Kong, Russia were a “diversion”

Source: Reuters – Fri, 11 Oct 2013 04:42 PM Author: Reuters By Mark Hosenball WASHINGTON, Oct 11 (Reuters) – The four laptop computers that former U.S. spy contractor Edward Snowden carried with him to Hong Kong and Moscow were a “diversion” and contained no secrets, according to an ex-CIA official who met with Snowden in…

US indicts 13 suspected members of Anonymous hacking collective

Indictment filed in US district court in Virginia charges that members attacked government and credit card websites Reuters in Washington theguardian.com,  Thursday 3 October 2013 17.15 EDT The loose-knit international group known as Anonymous has been in frequent battle with US authorities. Photograph: Jean-Philippe Ksiazek/AFP/Getty Images The United States brought criminal charges against 13 suspected…

Cold War documents show NSA spied on US senators ( “Minaret ” )

26 Sep 2013 Washington (AFP) The National Security Agency eavesdropped on civil rights icon Martin Luther King and heavyweight boxer Muhammad Ali as well as other leading critics of the Vietnam War in a secret program later deemed “disreputable,” declassified documents revealed Wednesday. The six-year spying program, dubbed “Minaret,” had been exposed in the 1970s but the…

NSA Monitors Financial World

‘Follow the Money’ By Laura Poitras, Marcel Rosenbach and Holger Stark The NSA monitors banks and credit card transactions — sometimes in apparent violation of national laws and global regulations. The European SWIFT financial transaction network is being tapped on different levels, internal documents from the US spy agency show. In the summer of 2010,…

NSA and GCHQ unlock encryption used to protect emails, banking and medical records • $250m-a-year US program works covertly with tech companies to insert weaknesses into products • Security experts say programs ‘undermine the fabric of the internet’

US and UK spy agencies defeat privacy and security on the internet James Ball, Julian Borger and Glenn Greenwald The Guardian,   Thursday 5 September 2013 15.00 EDT Through covert partnerships with tech companies, the spy agencies have inserted secret vulnerabilities into encryption software. Photograph: Kacper Pempel/Reuters US and British intelligence agencies have successfully cracked much of…

Federal court order prohibits Brown from talking to the media in what critics say is latest in crackdown on investigative journalism

US stops jailed activist Barrett Brown from discussing leaks prosecution Ed Pilkington in New York theguardian.com, Wednesday 4 September 2013 17.50 EDT Brown’s lawyer says the gagging order is a breach of Brown’s first amendment rights. Photograph: Nikki Loehr A federal court in Dallas, Texas has imposed a gag order on the jailed activist-journalist Barrett…

US activist group challanges NSA surveillance by tracking Obama’s location

EEV: Crowdsourcing the Presidents location, appears to be a valid new security risk. We do not however support the apparent risk this may bring. Screenshot: whereisobama.at In response to what some consider over-reaching surveillance programs conducted by US intelligence agencies, which have been shown to collect thousands of communications with no terror connection, a group decrying the…

NSA spied on Brazilian and Mexican presidents – media

©Photo: Flickr.com/Rev. Xanatos Satanicos Bombasticos (ClintJCL)/cc-by-nc-sa 3.0 US National Security Agency spied on the communications of the Brazilian and Mexican presidents, accessing the Mexico leader’s emails even before he was elected, Brazil’s Globo television reported.  Glenn Greenwald, a Rio de Janeiro-based columnist for the Guardian newspaper who obtained secret files from NSA leaker Edward Snowden,…

Codename ‘Apalachee’

The servers for the EU mission to the United Nations in New York are located on the 26th floor. The NSA obtained a floor plan of the offices in the autumn of 2012.     How America Spies on Europe and the UN By Laura Poitras, Marcel Rosenbach and Holger Stark President Obama promised that NSA…

US spy agency broke encryption on UN communications – report

© Collage: Voice of Russia The US National Security Agency broke the encryption securing the United Nations’ internal video conferencing at its New York headquarters, German news weekly Der Spiegel reported Sunday, citing secret NSA documents. 0The move provided the agency with “a dramatic improvement of data from video teleconferences and the ability to decrypt…

Snowden tricked NSA – and they don’t know how he did it

 Published time: August 24, 2013 17:48                                                                             View of the National Security Agency (NSA) in the Washington suburb of Fort Meade, Maryland (AFP Photo) While collecting data Edward Snowden was able to evade all safeguards at the NSA, leaving the agency puzzled at how he did it, according to new report. Officials worry that the…

NSA officers ‘spy on love interests’

The spying has been given the codename  ‘LOVEINT’ LOVEINT has been going on for at least  the past decade This revelation is the latest in a summer  of disclosures about how far the US government spy program  reaches By  Ryan Gorman PUBLISHED: 23:13 EST, 23  August 2013 |  UPDATED: 23:14 EST, 23 August 2013  …

NSA paid millions to cover Prism compliance costs for tech companies

• Top-secret files show first evidence of financial relationship • Prism companies include Google and Yahoo, says NSA • Costs were incurred after 2011 Fisa court ruling   Ewen MacAskill in New York The Guardian,        Thursday 22 August 2013 The material provides the first evidence of a financial relationship between the tech companies and…

Four ways the Guardian could have protected Snowden – by THE NSA

Spooks’ own advice lays out exactly how this crypto wypto hypto thing works By       Chris Williams Posted in Security,               22nd August 2013 11:38 GMT       Analysis The Guardian’s editor-in-chief Alan Rusbridger fears journalists – and, by extension, everyone – will be reduced to using pen and paper to avoid prying American and British spooks online.…

Journalist Michael Hastings was working on story about CIA Chief John Brennan at the time of his mysterious death / The day he was killed, He sent an email to his editors alerting them that the federal government was investigating him

Brennan has  has been described in secret emails from  the President of CIA contractor  Stratfor as being on a ‘witch hunt’ of investigative  journalists. The day he  was killed, Hastings sent an email to his editors alerting them that the federal  government was investigating him and interviewing his ‘close friends and  associates’ Hastings’  widow says…

Lies, damn lies, and China’s economic statistics

15   Aug    2013 BEIJING (AFP) China has soared almost to the top of the world’s economic league tables, but whether the official data underpinning its status can be trusted is a constant headache, analysts say. Simmering unease regarding China’s economic figures has taken on new meaning in recent months with discrepancies in some statistics and…

Cyberspy Network

EEV: I can only specualte why Guccifer’s PDF, as well as other major sources of Intel Compromise are so openly exposed. I am counting on this data being obsolete, or ineffective as the whole world has it by now. Why they would release the names of CIA employee’s as well as others again, is a total mystery to me. I…

NSA gets burned by a sysadmin, decides to burn 90% of its sysadmins

  Need to end planet-wide-snooping leaks? That’ll do the trick, thinks US spymaster By       Jasper Hamill         9th August 2013 11:23 GMT       The NSA has announced its brainwave to end further leaks about its secret operations by disaffected employees: it will simply sack 90 per cent of all its sysadmins. The US surveillance agency’s spyboss…

Chinese Hackers Caught by US water control system Honeypots

Author: Mohit Kumar, The Hacker News – Monday, August 05, 2013 A notorious Chinese hacker collective known as APT1 or Comment Crew, possibly linked to the Chinese Army, have been caught red handed breaking into a fake United States water control system i.e. known as a Honeypot. Kyle Wilhoit, a researcher with security company Trend…

US embassy closures used to bolster case for NSA surveillance programs / embassies and consulates were going to be closed anyways in accordance with local custom and practice for the bulk of the week for the Eid celebration

Congress told that NSA monitoring led to interception of al-Qaida threats but privacy campaigners fear ulterior political motives Spencer Ackerman and Dan Roberts in Washington theguardian.com,              Monday 5 August 2013 16.30 EDT Motorists drive past the US embassy in Tel Aviv. The US extended embassy closures by a week in the Middle East and…

NSA’s ‘Homeland’ includes Canada, Greenland, Mexico, Central America

Posted By Josh Peterson On 7:15 PM  08/02/2013 In Politics Americans now have responsibility for a bunch of new places they can’t find on a map. It turns out that the National Security Agency considers Canada, Greenland, Mexico and parts of Central America as part of the U.S. “Homeland.” During a Senate Judiciary Committee hearing on…

Members of Congress denied access to basic information about NSA / Suggesting a new Shadow Government

Documents provided by two House members demonstrate how they are blocked from exercising any oversight over domestic surveillance • Morgan Griffith’s requests for NSA information • Alan Grayson’s requests for NSA information Glenn Greenwald theguardian.com, Sunday 4 August 2013 08.26 EDT Members of Congress are increasingly frustrated at their inability to obtain even basic information…

Exclusive: NSA pays £100m in secret funding for GCHQ

• Secret payments revealed in leaks by Edward Snowden • GCHQ expected to ‘pull its weight’ for Americans   • Weaker regulation of British spies ‘a selling point’ for NSA Nick Hopkins and Julian Borger The Guardian,              Thursday 1 August 2013 11.04 EDT The NSA paid £15.5m towards redevelopments at GCHQ’s site in Bude, north Cornwall, which…

XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’

• XKeyscore gives ‘widest-reaching’ collection of online data • NSA analysts require no prior authorization for searches • Sweeps up emails, social media activity and browsing history • NSA’s XKeyscore program – read one of the presentations   Glenn Greenwald theguardian.com,              Wednesday 31 July 2013 08.56 EDT One presentation claims the XKeyscore program covers…

Math Behind Leak Crackdown: 153 Cases, 4 Years, 0 Indictments

  July 20, 2013   By  SHARON LaFRANIERE Soon after President Obama appointed him director of national intelligence in 2009, Dennis C. Blair called for a tally of the number of government officials or employees who had been prosecuted for leaking national security secrets. He was dismayed by what he found. In the previous four…

Hackers crippled HALF of world’s financial exchanges – report

  Repeated assaults leave bankers in quivering heaps By Jasper Hamill Posted in Data Networking, 18th July 2013 11:43 GMT Cloud storage: Lower cost and increase uptime Half of all the world’s critical financial exchanges have suffered cyber attacks in the past year, a report has found. A joint investigation by the World Federation of Exchanges…

Russian Agency Seeks Typewriters for Secret Documents

With the NSA spying scandal still making headlines, a Russian paper reports that agencies in that country have turned to typewriters to help keep their documents secret. It sounds like a Luddite response to recent revelations from Edward Snowden — a low tech way to avoid America’s prying eyes. Are Russian intelligence agencies going back…

Loading…

Something went wrong. Please refresh the page and/or try again.

%d bloggers like this: