Jump to content

Rate this topic

Recommended Posts

9373

1] Follow-up to next above: https://www.reuters.com/article/us-usa-security-kaspersky/trump-administration-orders-purge-of-kaspersky-products-from-u-s-government-idUSKCN1BO2CH  of 13Sept17

2] Bradley "Chelsea" Manning 14Sept17 1943hrsEDT  https://www.nbcnews.com/feature/nbc-out/ex-cia-boss-resigns-harvard-after-chelsea-manning-hire-n801341   Former acting DClA M.Morell resigned over the Kennedy School of Gov't hired Manning as a Visiting Fellow.

Share this post


Link to post
Share on other sites

9373

1] Follow-up to next above: https://www.reuters.com/article/us-usa-security-kaspersky/trump-administration-orders-purge-of-kaspersky-products-from-u-s-government-idUSKCN1BO2CH  of 13Sept17

2] Bradley "Chelsea" Manning 14Sept17 1943hrsEDT  https://www.nbcnews.com/feature/nbc-out/ex-cia-boss-resigns-harvard-after-chelsea-manning-hire-n801341   Former acting DClA M.Morell resigned over the Kennedy School of Gov't hired Manning as a Visiting Fellow.

Share this post


Link to post
Share on other sites

9510

From 1973 -A Back to the Future Congressional Hearing- "Telephone monitoring practices by Federal agencies: hearings ..."

https://archive.org/stream/telephonemonitor00unit/telephonemonitor00unit_djvu.txt 

The interesting stuff starts on page 6

"Two-way Television" [using back-emf-reflectivity the picture tube also functioned as a TV camera; like with your smart phone]

Touch-Tone phones with one-button tapping

How the military 'spied' on governors and the VP.

p.30 how medical records were retrieved back then

p.34 A detective that broke a major mafia case testifies that wiretapping provided "no evidence" or "dramatic information" and that other investigative techniques made the cases. Most of what was overheard was "nonsense".

p.37 "conspiracy" as a basis for 'emergency wiretaps'

While a light read, and a very interesting one from a technical viewpoint, it does become repetitive after page 40.

Some Help Notes:

CWA = Communications Workers of America, a union who wanted these hearings

Anderson = "Jack" Anderson, one of Drew Pearson's boys who did investigative reports, muckraking and is one founder of America's "scandal culture".

TouchTone = trademark of an AT&T button phone

 

Edited by hasanhh

Share this post


Link to post
Share on other sites

9590

ln conformance with the OP ...

You cannot hide it from  Electronics Detecting Dogs / Electronics Sniffing Dogs 

http://www.techrepublic.com/article/electronics-sniffing-dogs-how-k9s-became-a-secret-weapon-for-solving-high-tech-crimes/ 

The K9s can find microSDs inside receptacle plates (wall plug outlets), and DVDs, CDs, flashdrives, and whatever else hidden, apparently, anywhere.

As at the end of the article, these dogs will now be made available to companies.

 

Share this post


Link to post
Share on other sites

9628

North Korea-DPRK "hacks" RoK and maybe US power companies.

OPLAN 5015 Total War on DPRK war plan stolen

Dark Web opns

"The Daily 202: Foreign intelligence agencies might be using your anti-virus software against you"

https://www.washingtonpost.com/news/powerpost/paloma/daily-202/2017/10/11/daily-202-foreign-intelligence-agencies-might-be-using-your-anti-virus-software-against-you/59dd6e5a30fb0468cea81e60/?utm_term=.ff35276ec1c1 

:cry: "Thank You Again, NSA & CSS."

Share this post


Link to post
Share on other sites

9798

:dwarf: "Over a TTTrillion Dollars spent and now THIS ?"  :cry:

While Ed Snowden leaked the code names and descriptions of unlawful surveillance programs, Shadow Brokers are leaking lines-of-code.

Kapersky used the codewords to develop information from word searches.

One document showing a Russian company hacked into one company that serves as a "vendor" for election systems in the US is the basis for "Russia hacked the 2016 General Election". [so was it Epson or Diebold ?]

For a detailed article see: https://www.nytimes.com/2017/11/12/us/nsa-shadow-brokers.html  who broke the story.

For short descriptions see: https://www.thedailybeast.com/report-nsa-hunts-for-moles-amid-crippling-information-leaks  &  https://www.fastcompany.com/40495158/mysterious-hackers-theft-of-cyberweapons-from-nsa-exceeds-damage-done-by-snowden-leaks 

OPINE: With "airgaps" in use since the 1990s, procedures, white-hat operations, and so forth ... the problem is geographical :einstein:s.  NSA & CSS  facilities are so widely dispersed -and connected many relationships by cable- that you have a tap problem wherein ajoined analyzers can auto-detect the alternating 'dead-lines' used to detect taps. Similarly for wave-forms such as in GWEN.

N.S.A. = National Security Affliction 

Share this post


Link to post
Share on other sites

9867

Oooops

The Pentagon has snooped at least 1.8 BBillion social media posts.

Who has time to process them all, much less read and understand them all.

http://fortune.com/2017/11/20/pentagon-amazon-web-services-facebook-twitter/ 

Oh, well. Korr-up-ed biG Muther Guv-ern-mint = mint rice (Korr is a brand name)

Mint Rice has wasted time and money again.

Question: How many social media posts and Amazon orders do you think occurs in North Korea (DPRK).

Share this post


Link to post
Share on other sites

9912   Sunday,26Nov17

"Fancy Bear" a Russian military intelligence operation targeted not only the Democratic National Committee but also -and probably a result of(ed. opine)-- targeting former and current NATO/OTAN officials.

In a PBS News Hour interview on Sunday, the author said of the 4,700 individuals so targeted, 500 were in The U.S.

The Associated Press investigation, which Slatter described as "very laborious", is here:

https://www.apnews.com/f1a5570b7ce04d39bab00ae3a9041460/FBI-gave-heads-up-to-fraction-of-Russian-hackers'-US-targets 

and is a quick interesting read.

Share this post


Link to post
Share on other sites

9927

An article from last year by Edward Snowden as told to Matt Giles, "The Internet is Broken"  https://www.popsci.com/edward-snowden-internet-is-broken , had as one theme the lack of encryption as shown by the 2015 hack of the Office of Personnel Management which was not using any. lncluded are his thoughts about how easy "activity records" of individuals are so easily compiled.

QKD:  An article about an new encryption technology, Quantum Key Distribution, http://news.xinhuanet.com/english/2017-11/27/c_136781034.htm , discusses the emergence of myriads of codes with their own breech detection features. Fascinating.

Share this post


Link to post
Share on other sites

10,097

There is i-espionage and now we have had U-espionage.

https://9to5mac.com/2017/12/16/uber-waymo-wiretapping-espionage-more/  The Waymo lawsuit.

Uber is charged with corporate espionage and wiretapping in the suit. Affects customers.

This article refers to TechCrunch which is here: https://techcrunch.com/2017/12/15/uber-accused-of-espionage-bribery-and-hacking-by-former-employee/ 

The document letter delineating the employee history and such is here: https://www.documentcloud.org/documents/4330121-2401-1.html 

lt just isn't Big Mother gov't anymore.

Share this post


Link to post
Share on other sites

10,200

Scary and Freaky :scarerun:      To my little hiding place.

Physically "fries" your phone ?

https://www.rt.com/news/413921-loapi-cryptocurrency-mining-malware/  

Malware mining for cryptocurrencies destroyed a Kaspersky "test phone".

The hardware ?

Search "loapi" then News.   :shock:

:cry:"l wonder what other physical destruction this wreak ?"

Edited by hasanhh

Share this post


Link to post
Share on other sites

10,321

"Every Tweet ever Twitted"

This is a phrase l used many times in the past, including SC, to note that from Tweet #1 the Library of Congress preserved every one of them.

As of 31Dec17, after twelve years, this will now change. As the notice reads it appears that the Twelve Years will now be edited (censored?)

https://blogs.loc.gov/loc/files/2017/12/2017dec_twitter_white-paper.pdf 

CyberSpace -lt's still out there!

Share this post


Link to post
Share on other sites

10,465

MELTDOWN: Chip Flaws assist Hackers

Research Paper:   https://www.documentcloud.org/documents/4343429-Meltdown-paper.html  16pages

An Australian article: http://www.news.com.au/technology/online/security/computer-chip-flaw-dating-back-20-years-could-allow-hackers-to-steal-from-millions-of-devices/news-story/40c6785c63f61f62fa5cb4de2a8143bc 

^^^^Should not that be 'billions' ?  lnteI is the company, here.

Even the password is vulnerable.

Spectre is the name for attacks that "also affect AMD and ARM chips".

Edited by hasanhh

Share this post


Link to post
Share on other sites

10,506

1] ^^^^^post above, supplementary reference 31January16 on page 9  -"wait and see" surveillance

2]Big Mother Gov't searching our phones --again:

Preface: Above posts dated 28Nov16 and 11March16 where the gov't is trying to force Apple,lnc to "open" phones which the gov't could already 'open' (pages 4 & 5) ; and 07Oct16 Yahoo searching emails for "illegal" and "terrorist" activity.

Border Patrol is now randomly searching phones (technically you are 'not in' the US, yet) http://www.zdnet.com/article/warrantless-phone-laptop-searches-at-the-us-border-hit-record-levels/ 

The Gov't response press release is:  https://www.cbp.gov/newsroom/national-mredia-release/cbp-releases-updated-border-search-electronic-device-directive-and 

 

Share this post


Link to post
Share on other sites

10,532

News + Opine

Both Spectre and Meltdown are in the news these days. As the following has much more to do with Cyber-Spying than how we personally response to surveillance [ hence, this is not in Snowden Revelations --Your Brain ].

The prompt is a TV news report -PBS News Hour l believe it was- that said hackers could access our computers without detection.

A basic outline of this is here:  https://krebsonsecurity.com/2018/01/scary-chip-flaws-raise-spectre-of-meltdown/ 

These are not "flaws" per se, but the way these chips were designed in the beginning.

Now consider this: para 11;  https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/  how the "kernel" becomes "invisible" and so on. This is one "without detection" viewing point. Like by the NSA and all. Not just Dark-Web hackers.

Combine the above with Microsoft et alii issuing emergency software "patches"; exempli gratia https://www.theverge.com/2018/01/03/16846784/microsoft-processor-bug-windows-10-fix  and we get the observations: Software works around Hardware, Software circumvents Hardware, Software arcs over Hardware, and so forth.

[Quip: No wonder, in the early Reagan Administration years, the US was so willing to sell computers to the Soviet Union. Even then the US could read anything keyboarded.]

Opine: As long as software can bypass hardware NO security system will be completely effective.

Question: Are "air gaps" enough or essentially pointless. lf there are "kernel interpretation programs", then this is one reason why they are not.

 

Share this post


Link to post
Share on other sites

10,580

Meltdown & Spectre: Patch Problems?

https://www.computerdealernews.com/news/microsoft-warns-patches-for-meltdown-spectre-mat-clash-with-av/58071   dated 09Jan18, a little technical

 

The Meltdown-Spectre crisis hit the news last week. Yet this was what happened in December'17 (Kaspersky issued its patch 29Dec) at "discovery":

http://www.fudzilla.com/news/45161-british-spooks-find-hole-in-microsoft-defender-and-security-essentials -11Dec17

https://www.infosecurity-magazine.com/news/microsoft-patches-two-critical/ 

 

Share this post


Link to post
Share on other sites
On ‎1‎/‎6‎/‎2018 at 3:50 AM, hasanhh said:

10,506

1] ^^^^^post above, supplementary reference 31January16 on page 9  -"wait and see" surveillance

2]Big Mother Gov't searching our phones --again:

Preface: Above posts dated 28Nov16 and 11March16 where the gov't is trying to force Apple,lnc to "open" phones which the gov't could already 'open' (pages 4 & 5) ; and 07Oct16 Yahoo searching emails for "illegal" and "terrorist" activity.

Border Patrol is now randomly searching phones (technically you are 'not in' the US, yet) http://www.zdnet.com/article/warrantless-phone-laptop-searches-at-the-us-border-hit-record-levels/ 

The Gov't response press release is:  https://www.cbp.gov/newsroom/national-mredia-release/cbp-releases-updated-border-search-electronic-device-directive-and 

 

Apple, Inc are "jerks" ?

https://sanvada.com/2018/01/12/fbi-forensic-examiner-apple-full-jerks-evil-geniuses-encrypting-iphones/ 

Share this post


Link to post
Share on other sites
On ‎9‎/‎14‎/‎2017 at 8:32 PM, hasanhh said:

9373

1] Follow-up to next above: https://www.reuters.com/article/us-usa-security-kaspersky/trump-administration-orders-purge-of-kaspersky-products-from-u-s-government-idUSKCN1BO2CH  of 13Sept17

2]  Bradley "Chelsea" Manning 14Sept17 1943hrsEDT  https://www.nbcnews.com/feature/nbc-out/ex-cia-boss-resigns-harvard-after-chelsea-manning-hire-n801341   Former acting DClA M.Morell resigned over the Kennedy School of Gov't hired Manning as a Visiting Fellow.

Chelsey Manning will try for the Democratic nomination for U.S. Senator for Maryland.

http://www.bbc.com/news/world-us-canada-42679005 

No announcement of what campaign themes  'she' will run on.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×