SURVEILLANCE

MIT's New Toy Can Read Closed Books Using Terahertz Radiation

The technology could help librarians read rare books without handling them, or help snoop on sealed documents.

A group of researchers from MIT and Georgia Tech have built a device that can see through paper and distinguish ink from blank paper to determine what is written on the sheets. The prototype successfully identified letters printed on the top nine sheets of a stack of paper, and eventually the researchers hope to develop a system that can read closed books that have actual covers.
READ MORE: http://www.popularmechanics.com/technology/a22797/mits-new-device-read-c...

The Privacy Wars Are About to Get A Whole Lot Worse

It used to be that server logs were just boring utility files whose most dramatic moments came when someone forgot to write a script to wipe out the old ones and so they were left to accumulate until they filled the computer’s hard-drive and crashed the server.

Then, a series of weird accidents turned server logs into the signature motif of the 21st century, a kind of eternal, ubiquitous exhaust from our daily lives, the CO2 of the Internet: invisible, seemingly innocuous, but harmful enough, in aggregate, to destroy our world.
READ MORE: http://www.locusmag.com/Perspectives/2016/09/cory-doctorowthe-privacy-wa...

Peter Dunne is working for the Antichrist and Satan: Super Gold card to be blended with biometric ID RealMe

United Future wants to give the SuperGold Card a super makeover. It wants to allow it to be used nationally as ID, a public transport card, and a health information card. It would do this by blending it with the Government's RealMe identification service, and be dubbed "Super Me". United Future leader Peter Dunne said it would simplify things.

"Much more comprehensive access to services than having to have different cards for different purposes."
READ MORE: http://www.newstalkzb.co.nz/news/politics/peter-dunne-the-supergold-card...

Inside Menwith Hill The NSA’s British Base at the Heart of U.S. Targeted Killing

Once known only by the code name Field Station 8613, the secret base — now called Menwith Hill Station — is located about nine miles west of the small town of Harrogate in North Yorkshire. Originally used to monitor Soviet communications through the Cold War, its focus has since dramatically shifted, and today it is a vital part of the NSA’s sprawling global surveillance network.

For years, journalists and researchers have speculated about what really goes on inside Menwith Hill, while human rights groups and some politicians have campaigned for more transparency about its activities. Yet the British government has steadfastly refused to comment, citing a longstanding policy not to discuss matters related to national security.
READ MORE: https://theintercept.com/2016/09/06/nsa-menwith-hill-targeted-killing-su...

How Spy Tech Firms Let Governments See Everything on a Smartphone

Want to invisibly spy on 10 iPhone owners without their knowledge? Gather their every keystroke, sound, message and location? That will cost you $650,000, plus a $500,000 setup fee with an Israeli outfit called the NSO Group. You can spy on more people if you would like — just check out the company’s price list.

The NSO Group is one of a number of companies that sell surveillance tools that can capture all the activity on a smartphone, like a user’s location and personal contacts. These tools can even turn the phone into a secret recording device.
READ MORE: http://www.nytimes.com/2016/09/03/technology/nso-group-how-spy-tech-firm...

FBI Director Says Prolific Default Encryption Hurting Government Spying Efforts

FBI Director James Comey warned again Tuesday about the bureau's inability to access digital devices because of encryption and said investigators were collecting information about the challenge in preparation for an "adult conversation" next year.

Widespread encryption built into smartphones is "making more and more of the room that we are charged to investigate dark," Comey said in a cybersecurity symposium.

The remarks reiterated points that Comey has made repeatedly in the last two years, before Congress and in other settings, about the growing collision between electronic privacy and national security.
READ MORE: http://abcnews.go.com/Technology/wireStory/comey-fbi-adult-conversation-...

Group Wants To Shut Down Tor For a Day On September 1

An internal group at the Tor Project is calling for a full 24-hour shutdown of the Tor network to protest the way the Tor Project dealt with the Jake Applebaum sexual misconduct accusations, and because of recent rumors it might be letting former government agents in its ranks. Two Tor members, also node operators, have shut down their servers as well, because of the same reason.
READ MORE: https://politics.slashdot.org/story/16/08/22/0319205/group-wants-to-shut...

The NSA Leak Is Real, Snowden Documents Confirm

On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.

The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA’s virtual fingerprints and clearly originates from the agency.
READ MORE: https://theintercept.com/2016/08/19/the-nsa-was-hacked-snowden-documents...

NSA HACK: Cisco Acknowledges ASA Zero Day Exposed by ShadowBrokers

Cisco has quickly provided a workaround for one of two vulnerabilities that was disclosed in the ShadowBrokers’ data dump and issued an advisory on the other, which was patched in 2011, in order to raise awareness among its customers.
The ShadowBrokers are an unknown group of hackers that emerged over the weekend with claims it had hacked the Equation Group, a top-of-the-line APT believed to be the NSA.
READ MORE: https://wp.me/p3AjUX-vcV

NSA HACK: EquationGroup Tool Leak – ExtraBacon Demo

You may have heard that recently (15/08/2016) a group known as Shadow Brokers released what are said to be a bunch of exploits and tools written and used by the NSA.

Two tar were released, one with the password of “theequationgroup”, named “eqgrp-free-file.tar.xz.gpg”. The other is named “eqgrp-auction-file.tar.xz.gpg”, and according to the post where Shadow Brokers broke the news (now removed, but cached here), they will release the key for this file, which supposedly contains juicier content, to the person who bids the most in their bitcoin auction, which ends at a time of Shadow Brokers’ choosing.
READ MORE: https://xorcatt.wordpress.com/2016/08/16/equationgroup-tool-leak-extraba...

Syndicate content