- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Posts Tagged spying
Possible Backdoor in iPhone OS
From The Daily Mail:
A security expert has warned Apple’s iOS software contains potentially sinister tools that could be used by governments to spy on iPhone and iPad users.
Speaking at the ‘Hackers on planet Earth’ conference in New York, Jonathan Zdziarski said that most users are unaware of the lack of protection for iPhone data.
He added files found hidden within the firm’s software contain a file-relay service that can be used to access the user’s address book, photos, voicemail and any accounts configured on the device.
However, Apple has denied the claims the backdoor was created deliberately for government or surveillance purposes.
apple, apple computer, COMSEC, internet, ios, iPhone, OPSEC, smartphone, software, spying, surveillance
Chinese Hack Government Networks
Posted by Brian in News, Threat Watch on 19/Jul/2014 07:38
From ZDNet:
According to the New York Times, senior American officials said hackers gained access to the system in March before the infiltration was detected and blocked.
The hackers appeared to be targeting files “on tens of thousands of employees who have applied for top-secret security clearances,” and data including employment records, personal information — such as drug use — and the foreign contacts of security applicants may have been placed at risk.
Smartphones Track Your Movements
From KOMONews:
Students at the University of Washington volunteered their phones to see how easy it can be to see where the device has been. The frequent locations setting creates a map, and tapping on a specific locations reveals the dates and times of a particular visit and even how long you were there.
The students were taken aback that it was so easy to track their history.
“That’s kind of crazy,” Sebastian Aste said. “It’s interesting how accessible your life can be.”Â
apple, iPhone, location services, Smartphones, spying, surveillance, technology
How Governments Spy On You
Posted by Brian in News, Threat Watch on 7/Jul/2014 07:08
From Wired:
Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement and intelligence agencies use the tool to surreptitiously record and steal data from mobile phones.
android, blackberry, domestic surveillance, internet, ios, mobile phones, smart phones, spying, windows phone
What The Snowden Leaks Have Revealed
From the EFF:
It’s been one year since the Guardian first published the Foreign Intelligence Surveillance Court order, leaked by former NSA contractor Edward Snowden, that demonstrated that the NSA was conducting dragnet surveillance on millions of innocent people. Since then, the onslaught of disturbing revelations, from disclosures, admissions from government officials, Freedom of Information Act requests, and lawsuits, has been nonstop. On the anniversary of that first leak, here are 65 things we know about NSA spying that we did not know a year ago:
1. We saw an example of the court orders that authorize the NSA to collect virtually every phone call record in the United States—that’s who you call, who calls you, when, for how long, and sometimes where.
2. We saw NSA Powerpoint slides documenting how the NSA conducts “upstream†collection, gathering intelligence information directly from the infrastructure of telecommunications providers.
communications, domestic surveillance, eff, internet, national security administration, NSA, spying, surveillance
Keeping the NSA in Perspective
“Keeping the NSA in Perspective is republished with permission of Stratfor.”
Editor’s Note: The following Geopolitical Weekly originally ran in July 2013. We repost it today in light of the April 21 awarding of the 2014 Pulitzer Prize for public service to The Washington Post and The Guardian US for their reporting on the National Security Agency’s large-scale surveillance programs.
By George Friedman
In June 1942, the bulk of the Japanese fleet sailed to seize the Island of Midway. Had Midway fallen, Pearl Harbor would have been at risk and U.S. submarines, unable to refuel at Midway, would have been much less effective. Most of all, the Japanese wanted to surprise the Americans and draw them into a naval battle they couldn’t win.
The Japanese fleet was vast. The Americans had two carriers intact in addition to one that was badly damaged. The United States had only one advantage: It had broken Japan’s naval code and thus knew a great deal of the country’s battle plan. In large part because of this cryptologic advantage, a handful of American ships devastated the Japanese fleet and changed the balance of power in the Pacific permanently. Read the rest of this entry »
communications, domestic surveillance, intelligence, NSA, spying, Stratfor, the guardian, the washington post
Dirigibles Making A Comeback As Spies
Posted by Brian in News, Threat Watch on 27/Mar/2014 08:08
From Wired.com:
Without a launcher, StratoBus floats to the lower stratosphere at an altitude of about 13 miles where developers say it will be in a perfect position to carry out a range of functions, including surveillance, border security monitoring, communications reinforcement and facilitating navigation — all from a stationary position with the help of two self-adjusting electric motors. The StratoBus will be able to endure missions of up to a year with a total lifetime of five years.
Secure Mobile Phone: Blackphone
Posted by Brian in Law, News, Threat Watch on 17/Jan/2014 11:50
The company Silent Circle which makes encrypted communication apps for mobile phones will soon release its own hardware called the Blackphone on Feb. 24. It is designed from the ground up to be a secure and encrypted method of communication. They are designing the hardware and creating their own secure version of the Andriod OS.
Blackphone, powered by a security-oriented Androidâ„¢ build named PrivatOS, is a carrier- and vendor-independent smartphone giving individuals and organizations the ability to make and receive secure phone calls, exchange secure texts, transfer and store files, and video chat without compromising user privacy on the device.
It is the culmination of several careers’ worth of effort from leading figures in the industry, including Phil Zimmermann, creator of PGP; Javier Aguera, co-founder of Geeksphone; Jon Callas, co-founder of PGP Inc. and CTO of Silent Circle; Rodrigo Silva-Ramos, co-founder of Geeksphone; and Mike Janke, CEO of Silent Circle and former US Navy SEAL.
blackphone, encryption, fourth amendment, mobile, mobile phone, NSA, privacy, privatos, secure communication, silent cirlce, spying, technology
NSA “CO-TRAVELER” Program Revealed
From EFF:
With neither public debate nor court authorization, CO-TRAVELER collects billions of records daily of cell phone user location information. It maps the relationships of cell phone users across global mobile network cables, gathering data about who you are physically with and how often your movements intersect with other cell phone users. The program even tracks when your phone is turned on or off.
constitution, domestic surveillance, forth amendment, national security admnistration, NSA, spying
RSA Paid $10 Million By NSA To Keep Backdoor In Crypto
Posted by Brian in Comms, News, Threat Watch on 27/Dec/2013 14:46
From Ars Technica:
Security company RSA was paid $10 million to use the flawed Dual_EC_DRBG pseudorandom number generating algorithm as the default algorithm in its BSafe crypto library, according to sources speaking to Reuters.
NRA and ACLU Team Up Against NSA Surveillance
Posted by Brian in Law, News, Threat Watch on 4/Nov/2013 14:57
From TribLive:
“Under the government’s reading of Section 215, the government could simply demand the periodic submission of all firearms dealers’ transaction records, then centralize them in a database indexed by the buyers’ names for later searching,†the NRA wrote in an amicus brief supporting the ACLU lawsuit against James Clapper, the director of national intelligence.
aclu, fourth amendment, gun registry, gun rights, NRA, NSA, spying, surveillance, War on Guns
Press Release: Dark Mail Alliance
Today at the Inbox Love conference in Mountain View, CA, Silent Circle along with Ladar Levision, Founder of Lavabit officially announced the creation of the Dark Mail Alliance.
Silent Circle and Lavabit, as privacy innovators have partnered to lead the charge to replace email as we know it today – fundamentally broken from a privacy perspective – we have collaborated in developing a private, next-generation, end-to-end encrypted alternative. Read the rest of this entry »
communications, email, fourth amendment, internet, lavabit, privacy, silent circle, spying, surveillance
NSA May Have Impersonated Google
From Cnet.com:
Earlier this week, Techdirt picked up on a passing mention in a Brazilian news story and a Slate article to point out that the US National Security Agency had apparently impersonated Google on at least one occasion to gather data on people. (Mother Jones subsequently pointed out Techdirt’s point-out.)
A technique commonly used by hackers, a MITM attack involves using a fake security certificate to pose as a legitimate Web service, bypass browser security settings, and then intercept data that an unsuspecting person is sending to that service. Hackers could, for example, pose as a banking Web site and steal passwords.
communications, email, google, internet, man in the middle, national security agency, NSA, security, spying
Silent Circle Comments on the NSA
Here is an excerpt of Silent Circle’s editorial from their company blog:
We at Silent Circle believe these revelations and disclosures are some of the best things that could happen to the technology sector. In fact, the battle for your digital soul has turned strongly towards Privacy’s corner because we now know what we are up against. We are beginning to define the capabilities and tactics of the world’s surveillance machine. Before all of this -we speculated, guessed and hypothesized that it was bad –we were all way off. It’s horrendous. It’s Orwell’s 1984 on steroids. It doesn’t matter –we will win the war.
communications, encryption, government, internet, NSA, silent circle, spying, technology, wire tapping
The NSA and the Obama Administration
Posted by Brian in Comms, Law, News, Threat Watch on 11/Sep/2013 13:01
Just after the revelations about the NSA’s encryption-breaking abilities, there is now a story that the Obama administration let the leash off the NSA in 2011. In the encryption story published by The Guardian, New York Times and Pro Publica there was an interesting nugget of information. The programs run by the NSA are named after Civil War battles. Does that mean that the NSA sees the American public as its enemy? I have no problem with the NSA doing what they do and focusing that effort outward but as soon as that capability is turned inward on our own citizens that is when we have a problem. There is that pesky Fourth Amendment to the Constitution that specifically prohibits looking at our “effects”:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
Bruce Schneier, a security technologist, is now calling on engineers who work in the government or for companies that contract with the government to start blowing the whistle on these type of programs. This administration has a history of citing the dangers that certain citizens pose while ignoring the explicit threats from outside. Targeting Americans with these programs is unacceptable.
bruce schneier, communications, eavesdropping, email, intelligence, internet, national security agency, NSA, Obama, spying
-
-
- Comms (127)
- Law (925)
- Medic (87)
- News (6,474)
- Opinion (654)
- Threat Watch (1,283)
- Training (291)
- Warrior Tools (711)
- Accessories (62)
- Ammo (45)
- Body Armor (19)
- Books (4)
- Clothing (12)
- Commo (1)
- Gear (70)
- Handguns (180)
- Beretta (4)
- Bersa (2)
- Bond Arms (2)
- Charter Arms (5)
- Cobra (2)
- Colt (3)
- Glock (19)
- Kahr (9)
- Kel-Tec (5)
- Kimber (3)
- Magnum Research (2)
- North American Arms (3)
- Para (1)
- Rock River Arms (1)
- Ruger (15)
- Sig Sauer (8)
- Smith & Wesson (14)
- STI (1)
- Taurus (12)
- Walther (8)
- Wilson Combat (2)
- Witness (3)
- XD (4)
- Holsters (4)
- Knives (18)
- Long Guns (298)
- ACC (1)
- Accuracy International (2)
- Barrett (14)
- Benelli (2)
- Beretta (1)
- Blaser (2)
- Bushmaster (3)
- Custom (3)
- CZ (3)
- Desert Tactical Arms (2)
- DPMS (2)
- FN (7)
- Forums (1)
- HK (8)
- IWI (1)
- Kel-Tec Long Guns (4)
- LaRue (4)
- LWRC (2)
- McMillan (2)
- Mosin Nagant (8)
- Mossberg (13)
- Para (2)
- Remington (19)
- Rock River Arms (2)
- Ruger Long Guns (5)
- Sabre Defense (2)
- Sako (1)
- SIG Sauer (4)
- SKS (1)
- Smith & Wesson Long Guns (2)
- Springfield (3)
- Styer (1)
- Weatherby (2)
- Wilson Combat (3)
- Winchester (1)
- Magazines (13)
- Maintenance (10)
- Navigation (9)
- Optics (15)
- Sights (15)
- Tech (9)
- Warriors (502)
-
Links
Social Media
-
Archives
- December 2024 (3)
- November 2024 (5)
- October 2024 (12)
- September 2024 (14)
- August 2024 (31)
- July 2024 (26)
- June 2024 (34)
- May 2024 (33)
- April 2024 (41)
- March 2024 (33)
- February 2024 (23)
- January 2024 (31)
- December 2023 (22)
- November 2023 (45)
- October 2023 (33)
- September 2023 (25)
- August 2023 (50)
- July 2023 (36)
- June 2023 (34)
- May 2023 (24)
- April 2023 (11)
- March 2023 (1)
- February 2023 (8)
- January 2023 (28)
- December 2022 (24)
- November 2022 (28)
- October 2022 (19)
- September 2022 (45)
- August 2022 (40)
- July 2022 (17)
- June 2022 (17)
- May 2022 (29)
- April 2022 (37)
- March 2022 (38)
- February 2022 (71)
- January 2022 (35)
- December 2021 (32)
- November 2021 (39)
- October 2021 (49)
- September 2021 (40)
- August 2021 (43)
- July 2021 (26)
- June 2021 (26)
- May 2021 (35)
- April 2021 (42)
- March 2021 (26)
- February 2021 (23)
- January 2021 (38)
- December 2020 (40)
- November 2020 (38)
- October 2020 (19)
- September 2020 (48)
- August 2020 (64)
- July 2020 (48)
- June 2020 (57)
- May 2020 (50)
- April 2020 (46)
- March 2020 (32)
- February 2020 (45)
- January 2020 (47)
- December 2019 (45)
- November 2019 (40)
- October 2019 (48)
- September 2019 (44)
- August 2019 (46)
- July 2019 (45)
- June 2019 (33)
- May 2019 (51)
- April 2019 (37)
- March 2019 (23)
- February 2019 (36)
- January 2019 (33)
- December 2018 (33)
- November 2018 (47)
- October 2018 (50)
- September 2018 (26)
- August 2018 (68)
- July 2018 (62)
- June 2018 (32)
- May 2018 (17)
- April 2018 (10)
- March 2018 (18)
- February 2018 (10)
- January 2018 (4)
- December 2017 (3)
- November 2017 (2)
- October 2017 (6)
- September 2017 (3)
- August 2017 (13)
- July 2017 (5)
- June 2017 (12)
- May 2017 (11)
- April 2017 (5)
- March 2017 (11)
- February 2017 (16)
- January 2017 (18)
- December 2016 (10)
- November 2016 (10)
- October 2016 (24)
- September 2016 (29)
- August 2016 (25)
- July 2016 (23)
- June 2016 (29)
- May 2016 (24)
- April 2016 (24)
- March 2016 (16)
- February 2016 (22)
- January 2016 (22)
- December 2015 (27)
- November 2015 (28)
- October 2015 (33)
- September 2015 (30)
- August 2015 (31)
- July 2015 (35)
- June 2015 (24)
- May 2015 (38)
- April 2015 (39)
- March 2015 (43)
- February 2015 (41)
- January 2015 (44)
- December 2014 (25)
- November 2014 (48)
- October 2014 (45)
- September 2014 (53)
- August 2014 (71)
- July 2014 (45)
- June 2014 (39)
- May 2014 (48)
- April 2014 (54)
- March 2014 (49)
- February 2014 (66)
- January 2014 (32)
- December 2013 (44)
- November 2013 (63)
- October 2013 (53)
- September 2013 (71)
- August 2013 (50)
- July 2013 (52)
- June 2013 (38)
- May 2013 (51)
- April 2013 (47)
- March 2013 (51)
- February 2013 (59)
- January 2013 (80)
- December 2012 (36)
- November 2012 (36)
- October 2012 (96)
- September 2012 (62)
- August 2012 (74)
- July 2012 (60)
- June 2012 (53)
- May 2012 (56)
- April 2012 (47)
- March 2012 (57)
- February 2012 (44)
- January 2012 (28)
- December 2011 (72)
- November 2011 (87)
- October 2011 (31)
- September 2011 (42)
- August 2011 (41)
- July 2011 (51)
- June 2011 (91)
- May 2011 (145)
- April 2011 (73)
- March 2011 (94)
- February 2011 (62)
- January 2011 (97)
- December 2010 (54)
- November 2010 (54)
- October 2010 (174)
- September 2010 (168)
- August 2010 (220)
- July 2010 (156)
- June 2010 (79)
- May 2010 (53)
- April 2010 (47)
- March 2010 (181)
- February 2010 (114)
- January 2010 (88)
-
Meta