Posts Tagged spying

NSA Employing 35,000 to Break Encrypted Communications

From Wired.com:

The Post’s article doesn’t detail the “groundbreaking cryptanalytic capabilities” Clapper mentions, and there’s no elaboration in the portion of the document published by the paper. But the document shows that 21 percent of the intelligence budget — around $11 billion — is dedicated to the Consolidated Cryptologic Program that staffs 35,000 employees in the NSA and the armed forces.

, , , , , ,

No Comments

US Government Resorting to Mob Tactics

According to Reason.com the owner of the Lavabit email service has been threatened with arrest for shutting down the service rather than cooperate with the government.

, , , , , ,

No Comments

Danish Double Agent Helped Kill Anwar Al-Awlaki

60 Minutes has a fascinating piece on a man who claims to be the key person who helped the CIA kill the American born terrorist.

, , , , , ,

No Comments

Silent Circle Can’t Guarantee Customers’ Privacy From NSA

From Tech Crunch:

“We knew USG would come after us”. That’s why Silent Circle CEO Michael Janke tells TechCrunch his company shut down its Silent Mail encrypted email service. It hadn’t been told to provide data to the government, but after Lavabit shut down today rather than be “complicit” with NSA spying, Silent Circle told customers it has killed off Silent Mail rather than risk their privacy.

Full press release from Silent Circle.

What Silent Circle does:

, , , , , , , , , ,

No Comments

Keeping the NSA in Perspective

Keeping the NSA in Perspective is republished with permission of Stratfor.”

By George Friedman

In June 1942, the bulk of the Japanese fleet sailed to seize the Island of Midway. Had Midway fallen, Pearl Harbor would have been at risk and U.S. submarines, unable to refuel at Midway, would have been much less effective. Most of all, the Japanese wanted to surprise the Americans and draw them into a naval battle they couldn’t win.

The Japanese fleet was vast. The Americans had two carriers intact in addition to one that was badly damaged. The United States had only one advantage: It had broken Japan’s naval code and thus knew a great deal of the country’s battle plan. In large part because of this cryptologic advantage, a handful of American ships devastated the Japanese fleet and changed the balance of power in the Pacific permanently. Read the rest of this entry »

, , , , , , , ,

No Comments

Concern Increasing Over Skype’s Security

From Electronic Freedom Foundation:

This security limitation has concerned us for a long time. Last year, Chris Soghoian argued that, for this reason, “Skype is in a position to give the government sufficient data to perform a man in the middle attack against Skype users.” Soghoian argued that Skype should change its design to eliminate this ability, or else disclose the risk more prominently. One way of limiting man-in-the-middle attacks would be for Skype to introduce a way for users to do their own encryption key verification, without relying on the Skype service. As Soghoian notes, that’s what many other encrypted communications tools do—but such a verification option is missing from Skype.

, , , , , , ,

No Comments

NSA Admits Spying On More People Than Previously Reported

From The Atlantic:

But Inglis’ statement was new. Analysts look “two or three hops” from terror suspects when evaluating terror activity, Inglis revealed. Previously, the limit of how surveillance was extended had been described as two hops. This meant that if the NSA were following a phone metadata or web trail from a terror suspect, it could also look at the calls from the people that suspect has spoken with—one hop. And then, the calls that second person had also spoken with—two hops. Terror suspect to person two to person three. Two hops. And now: A third hop.

, , , , , ,

No Comments

Navy Sailor Indicted With Espionage

Robert P Hoffman II, a former U.S. Navy sailor has been charged with attempted espionage after he tried to deliver classified documents to what he believed were individuals working for the Russian Federation. Details

, , , , , ,

No Comments

Spy Law Extended For 5 Years

From Threat Level:

The FISA Amendments Act, (.pdf) which is expiring at year’s end, allows the government to electronically eavesdrop on Americans’ phone calls and e-mails without a probable-cause warrant so long as one of the parties to the communication is believed outside the United States. The communications may be intercepted “to acquire foreign intelligence information.”

, , , ,

No Comments

Former U.S. Consulate Guard Pleads Guilty to Attempting to Communicate National Defense Information to China

Former U.S. Consulate Guard Pleads Guilty to Attempting to Communicate National Defense Information to China

Aug. 30, 2012

, , ,

No Comments

The All-Seeing Blimp

The US Army has recently become interested in long term battlefield surveillance. One of the results of this is a blimp called LEMV (Long Endurance Multi-Intelligence Vehicle).

From Defense Industry Daily:

The rise of modern terrorism, sharply increasing costs to recruit and equip professional soldiers, and issues of energy security, are forcing 2 imperatives on modern armies. Modern militaries need to be able to watch wide areas for very long periods of time. Not just minutes, or even hours any more, but days if necessary. The second imperative, beyond the need for that persistent, unblinking stare up high in the air, is the need to field aerial platforms whose operating costs won’t bankrupt the budget.

 

Video from New Jersey test flight Aug 8th, 2012:

, , , , , , , , ,

No Comments

Oppose HR 3523, the Cyber Intelligence Sharing and Protection Act of 2011

From the Electronic Frontier Foundation:

Congress is considering legislation that would give companies a free pass to monitor and collect communications, including huge amounts of personal data like your text messages and emails, and share that data with the government and anyone else. All a company has to do is claim its privacy violations were for “cybersecurity purposes.” Tell Congress that they can’t use vaguely-defined “cybersecurity threats” as a shortcut to bypassing the law.

, , , , , , ,

No Comments

Chinese Espionage and French Trade Secrets

Chinese Espionage and French Trade Secrets is republished with permission of STRATFOR.

By Sean Noonan

Paris prosecutor Jean-Claude Marin on Jan. 14 began an inquiry into allegations of commercial espionage carried out against French carmaker Renault. The allegations first became public when Renault suspended three of its employees on Jan. 3 after an internal investigation that began in August 2010. Within days, citing an anonymous French government source, Reuters reported that French intelligence services were looking into the possibility that China played a role in the Renault espionage case. While the French government refused to officially confirm this accusation, speculation has run wild that Chinese state-sponsored spies were stealing electric-vehicle technology from Renault.

The Chinese are well-known perpetrators of industrial espionage and have been caught before in France, but the details that have emerged so far about the Renault operation differ from the usual Chinese method of operation. And much has been learned about this MO just in the last two years across the Atlantic, where the United States has been increasingly aggressive in investigating and prosecuting cases of Chinese espionage. If Chinese intelligence services were indeed responsible for espionage at Renault it would be one of only a few known cases involving non-Chinese nationals and would have involved the largest amount of money since the case of the legendary Larry Wu-Tai Chin, China’s most successful spy.

STRATFOR has previously detailed the Chinese intelligence services and the workings of espionage with Chinese characteristics. A look back at Chinese espionage activities uncovered in the United States in 2010, since our latest report was compiled, can provide more context and detail about current Chinese intelligence operations.

Chinese Espionage in the U.S.

We chose to focus on operations in the United States for two reasons. First, the United States is a major target for Chinese industrial espionage. This is because it is a leader in technology development, particularly in military hardware desired by China’s expanding military, and a potential adversary at the forefront of Chinese defense thinking. Second, while it is not the only country developing major new technologies in which China would be interested, the United States has been the most aggressive in prosecuting espionage cases against Chinese agents, thereby producing available data for us to work with. Since 2008, at least seven cases have been prosecuted each year in the United States against individuals spying for China. Five were prosecuted in 2007. Going back to about 2000, from one to three cases were prosecuted annually, and before that, less than one was prosecuted per year.

Most of the cases involved charges of violating export restrictions or stealing trade secrets rather than the capital crime of stealing state secrets. As the premier agency leading such investigations, the FBI has clearly made a policy decision to refocus on counterintelligence after an overwhelming focus on counterterrorism following 9/11, and its capability to conduct such investigations has grown. In 2010, 11 Chinese espionage cases were prosecuted in the United States, the highest number yet, and they featured a wide range of espionage targets. Read the rest of this entry »

, , , , , , , ,

No Comments