Articles about nsa

Snowden 'more helpful than dangerous' says ex-Colin Powell aide

The leaks from NSA whistleblower Edward Snowden about US worldwide surveillance have helped rather than harmed America, and the leaks haven't endangered lives. Lawrence "Larry" Wilkerson, the former chief of staff to Secretary of State Colin Powell in the last Bush administration, said that he believed Snowden's assertions …
Iain Thomson, 25 Mar 2016

Censor-happy China, battling Brazilians ... just what's left in the wake of ICANN's now ex-CEO?

Analysis Everyone wants to leave their job on a high, but so few manage it. One of those who tried so hard is Fadi Chehade, CEO of domain-name system overseer ICANN, who vacated the top role earlier this month. He has left a bit of a stink behind, thanks to his courting of the repressive Chinese government and disgraced Brazilian …
Kieren McCarthy, 22 Mar 2016
Airship over NSA datacenter

Speaking in Tech: Did the FBI not ask the NSA to take a crack at breaking iOS?

Podcast speaking_in_tech Greg Knieriemen podcast enterprise Hosted by Greg Knieriemen, Ed Saipetch and Sarah Vela. This week, Greg is out while Sarah and Eddie drive the car talking Uber, Apple and data centre pay. Our special guest is Vaughn Stewart of Pure Storage. The details: (1:00) Ed does Southern Europe (4:10) Coming up: …
Team Register, 22 Mar 2016

FBI backs down against Apple: Feds may be able to crack killer's iPhone without iGiant's help

The FBI has come to a sudden and surprising all-stop in its legal war with Apple. Rather than compel the Cupertino giant to help it unlock an iPhone belonging to one of the San Bernardino killers, the Feds say they may be able to break into the handset without the company's assistance after all. In a filing [PDF] submitted …
Shaun Nichols, 21 Mar 2016
Apple's new Cupertino campus - rendering

Apple engineers rebel, refuse to work on iOS amid FBI iPhone battle

Apple's refusal to build a crippled iOS that will help the FBI unlock a killer's iPhone goes far beyond the executive suite. Some of Cupertino's own engineers are refusing to work on the operating system in case they are forced to aid the US government. Register sources familiar with the matter told us that, since the start of …
Shaun Nichols, 18 Mar 2016
Monty Python sketch: Nobody expects the Spanish Inquisition

Microsoft's Linux Inquisitor Grand Master is off to Spotify

Linux and Android device makers can breath a little easier: their IP bête noir has left Microsoft. The lawyer running Microsoft’s intellectual property inquisition, Horacio Gutierrez, has left after 18 years. He’s jumped to streaming service Spotify. Gutierrez joined Microsoft in 1998 but ran the company’s LCA innovation and …
Gavin Clarke, 18 Mar 2016

Labour: We want the Snoopers' Charter because of Snowden

IPB Labour supports the UK government's Investigatory Powers Bill – and it's because NSA whistleblower Edward Snowden revealed GCHQ's mass surveillance, according to the party's Keir Starmer. Starmer, MP for Holborn and St Pancras, said the left-wing party will ask Blighty's Conservative government to conduct an independent review …

Snowden WAS the Feds' quarry in Lavabit case, redaction blunder reveals

It was Edward Snowden's email account the FBI was targeting in its extraordinary legal case against Lavabit, we can now confirm. Lavabit ran an encrypted email service that Edward Snowden was thought to have used in 2013 to contact journalists about the top-secret NSA files he had in his possession. In documents published …
Kieren McCarthy, 17 Mar 2016
Secretary of State for the Home Department Theresa May. Photo by Twocoms/Shutterstock.com

Lessons from history for UK Home Sec Theresa May's Investigatory Powers Bill

IPB “Let me be clear,” Theresa May said on the introduction of the Investigatory Powers Bill in Blighty, “the draft Bill we are publishing today is not a return to the draft Communications Data Bill of 2012.” She was referring to the previous, the UK's previous coalition government's attempt at a Snoopers' Charter. This was true …

Apple tells iPhone court 'the Founders would be appalled' by Feds

Apple's latest response to US Department of Justice (DoJ) demands that it alter its operating system to allow access to a terrorist's iPhone using the 1789 All Writs Act is typically blunt. "According to the government, short of kidnapping or breaking an express law, the courts can order private parties to do virtually …
Iain Thomson, 16 Mar 2016

Former US anti-terror chief tears into FBI over iPhone unlocking case

A former counter-terrorism chief has laid into the Feds over its ongoing Apple iPhone battle – saying FBI director Jim Comey is exaggerating the need for access and that if agents really wanted into the phone, they would just send it to the NSA. Richard Clarke was national security advisor and head of counter-terrorism to …
Kieren McCarthy, 14 Mar 2016

FBI channels Kafka with new rules on slurping Americans' private data

Comment The murky world of surveillance turned a little more Kafkaesque this week. The FBI has quietly changed the rules on how it uses data collected by the NSA under Section 702 of the Foreign Intelligence Surveillance Act. Section 702 has been used by the NSA to justify its PRISM program, which collects personal information and the …
Iain Thomson, 11 Mar 2016
Woman reads book, sips tea on couch. Photo by Shutterstock

Data protection: Don't be an emotional knee jerk. When it comes to the law, RTFM

How many times have you spoken to someone in a call centre who refused to give you information on the basis that the "Data Protection Act" prevents them? Any potential customers in Germany who told you they can’t buy your IT or cloud service because their law prohibits data transfers outside Germany? Has anyone told you that a …
Frank Jennings, 10 Mar 2016

What are you doing to spot a breach?

Technology moves quickly, not just in legitimate business, but in the cybercriminal world too. Advanced attack tools are now available on the black market, lowering the barrier to entry for the average online lowlife. They are happy to target large and small organizations alike, and they only have to be lucky once. Security …
Robin Birtstone, 08 Mar 2016

Norman Conquest, King Edward, cyber pathogen and illegal gambling all emerge in Apple v FBI

Analysis OK, we got it: Apple good, FBI bad. But seeing as the court case between these two powerful institutions is taking on ever-increasing importance, we figured it was time to actually listen to what law enforcement has to say about the case of the locked phone. And the truth is, it makes a lot of sense. Certainly enough sense …
Kieren McCarthy, 05 Mar 2016

Snowden is a hero to the security biz – but not for the reason you'd expect

RSA 2016 This year's RSA conference was the busiest on record, with over 40,000 people cramming the halls (and later, bars) of San Francisco, and more than a few of them were raising glasses to NSA whistleblower Edward Snowden. "The Snowden effect has had an undeniable effect on the business," Pravin Kothari, CEO of cloud encryption …
Iain Thomson, 04 Mar 2016
Uncle Sam, photo via Shutterstock

How the FBI will lose its iPhone fight, thanks to 'West Coast Law'

Analysis Apple versus the FBI has generated much discussion and conjecture lately. The vast majority of it has centered on the rights and the wrongs, about the loss of privacy, and of the precedent that breaking one iPhone would create. Many are hanging on the blow-by-blow developments for an outcome, to see which side trumps: Apple …
(c) Rama, Cc-by-sa-2.0-fr

Q&A: Bruce Schneier on joining IBM, IoT woes, and Apple v the FBI

RSA 2016 Security guru Bruce Schneier is a regular at shows like RSA and his talks are usually standing-room-only affairs. Schneier has written some of the definitive texts for modern cryptography teaching and his current book, Data and Goliath, examines the perils and solutions to government and corporate surveillance of internet …
Iain Thomson, 04 Mar 2016

Forget data thieves, data sabotage will be your next IT nightmare

RSA 2016 For years, the security industry has been primarily focused on stopping information theft. Now more and more people in the trade are worried that the next wave of attacks won't steal data – they'll alter it instead. On Tuesday, the head of the NSA named data manipulation as one of his top three nightmares, and other vendors …
Iain Thomson, 03 Mar 2016
Mike Rogers

NSA boss reveals top 3 security nightmares that keep him awake at night

RSA 2016 Admiral Michael Rogers, head of the NSA and the US Cyber Command, has told delegates during his keynote address at RSA 2016 the three things that keep him awake at night. His first fear is an online attack against US critical infrastructure, which he said was a matter of when it will happen, not if. Citing the recent Ukrainian …
Iain Thomson, 01 Mar 2016

Security real talk time: So what exactly do we mean by 'backdoor'?

Analysis If there's one thing we've learned from the Snowden revelations it's that when you're dealing with law enforcement and national security, words matter. Section 215 of the US Patriot Act, for example, noted that the NSA was allowed to seize any "tangible thing" that is "relevant" to an investigation. It decided that definition …
Kieren McCarthy, 01 Mar 2016

Safe Harbour v2.0 greenlights six bulk data collection excuses

The final text of the EU's patchwork replacement for the Safe Harbour agreement, “Privacy Shield”, has been sent to data protection authorities. Privacy campaigners aren’t impressed. Safe Harbour established a self-certification regime that allowed US companies to process EU citizens' personal data. But a European Court of …
Andrew Orlowski, 01 Mar 2016
Blackhat

Operation Blockbuster security biz: We'll get you, Sony hackers

A newly created cross-industry initiative aims to pool resources in order to bring down – or, at least, disrupt – the hackers behind the infamous attack against Sony Pictures back in 2014. The Lazarus Group, which may in reality consist of several associated groups of attackers or hacking crews, started around seven years …
John Leyden, 24 Feb 2016
lottery

Randomness is a lottery, so why not use a lottery for randomness?

A group of French cryptographers reckons public lotteries are the perfect seed for elliptic curve cryptography. The group from company CryptoExperts and boffins from the Laboratoire de Mathematiques de Versailles in the University of Paris-Saclay playfully calls the scheme the “Million Dollar Curve” (modest in a world where …

NSA data centre brings 300 million daily security scares to its Utah home

Utah is being hit with up to 300 million security incidents a day, the state's public safety commissioner says. He complains that the undefined "incidents", the bulk of which are likely automated scans, have skyrocketed since 2010 when the number of incidents peaked at 80,000 a day. Commissioner Keith Squires told local …
Darren Pauli, 23 Feb 2016

GCHQ intel used to develop Stuxnet, claims new documentary

The super worm known as Stuxnet was but a cog in an active US war program in which hundreds of thousands of network implants and backdoors in Iran networks were actively maintained to facilitate a devastating barrage of hacking attacks, a documentary claims. Zero Days, due to screen at the Berlin Film Festival today, claims …
Darren Pauli, 17 Feb 2016

Apple must help Feds unlock San Bernardino killer's iPhone – judge

Apple must assist the FBI in unlocking the passcode-protected encrypted iPhone belonging to one of the San Bernardino shooters in California. US magistrate Sheri Pym says Cupertino has to find a way to supply software that prevents the phone from automatically annihilating its user data when too many password attempts have …
Darren Pauli, 17 Feb 2016
GCHQ Benhall doughnut aerial view

Brit spies can legally hack PCs and phones, say Brit spies' overseers

Blighty's spying nerve center GCHQ has a licence to hack computers and devices at will, a UK intelligence oversight court has ruled. The judgment was handed down on Friday after Privacy International and seven ISPs launched a legal challenge against the agency's hacking operations – operations that were laid bare by documents …
Iain Thomson, 12 Feb 2016
Money falling, image via Shutterstock

Insight Enterprises CEO: our EMEA ops are firing... no not staff

Managed and cloud services picked up some momentum for Insight Enterprises’ EMEA ops in 2015 but not at the pace to offset declines in the traditional hardware and software reselling lines. Locally, the firm reported a 13 per cent rise in year-on-year sales for calendar Q4 to $342m but in constant currency the decrease was …
Paul Kunert, 11 Feb 2016
Phone cables, photo via Shutterstock

No, HMG, bulk data surveillance is NOT inevitable

It is the topic that they don’t want us to discuss. When it came up in the Joint Committee on the Investigatory Powers Bill there was a desperate attempt to shoot the messenger, William Binney, as an alternative to the debating his message. The Joint Committee on which I served heard compelling evidence that collecting …

US Congress locks and loads three anti-encryption bullets

US Congress is preparing no fewer than three new bills over the ongoing encryption debate: one banning end-to-end encryption, one setting up a commission to review the issue, and a third to make sure that it is Congress that gets to decide what happens next. Leading member of the Senate Intelligence Committee Dianne Feinstein …
Kieren McCarthy, 10 Feb 2016

Let Europeans sue America for slurping their data – US Senate

European citizens will soon win the right to sue the US government for snatching their personal and private data. On Tuesday, the US Senate passed the Judicial Redress Act, which is a critical jigsaw piece for the new Privacy Shield agreement that governs the exchange of people's personal information over the Atlantic. The …
Kieren McCarthy, 10 Feb 2016
id4_white_house_648

Obama govt proposes 33% hike in cyber-security spending

The outgoing Obama administration has proposed increasing federal cyber-security spending by $5bn, or around a third, in the hope of reaching $19bn in 2017. Reuters reports that the Democrat president's proposals, due to be unveiled later on Tuesday, will earmark $3.1bn for technology modernisation at various federal agencies …
John Leyden, 09 Feb 2016
Merlin Data Center Interior

Private clouds kinda suck, you know?

Sysadmin Blog Are enterprises really starting to act like service providers? If you ask vendors, social media and "thought influencers" hired to speak at conferences, the answer is yes. I'm not so sure. On the one hand, we're asked to believe that enterprises are almost universally adopting private and hybrid cloud solutions in order to …
Trevor Pott, 09 Feb 2016

Brit spies want rights to wiretap and snoop on US companies' servers

The US and UK authorities are holding secret negotiations that would allow British domestic spies to tap into servers in the Land of the FreeTM when investigating Her Majesty's citizens. A draft proposal, seen by the Washington Post, would allow MI5 to get access to data stored on overseas computers run by American firms, and …
Iain Thomson, 05 Feb 2016
Ethernet cable rises up like a snake (artist's impression). Image via shutterstock

While we weren't looking, the WAN changed

Sysadmin Blog: Wide Area Networking (WAN) solutions are not discussed enough in the tech press. We babble incessantly about consumer broadband, or some new top end fibre speed achieved in a lab, but this is merely a fraction of the story. There is a very real revolution in WAN connectivity that is occurring right now, today. It goes largely …
Trevor Pott, 05 Feb 2016

UC Berkeley profs blast secret IT monitoring kit on campus

Academics at the University of California Berkeley have protested after it emerged that management had put a secret data slurping device into the campus that was mapping and storing all network traffic. "The intrusive device is capable of capturing and analyzing all network traffic to and from the Berkeley campus and has …
Iain Thomson, 05 Feb 2016
Sparta

Safe Harbor ripped and replaced with Privacy Shield in last-minute US-Europe deal

European and US legislators have hammered out a last-minute deal to allow data flows across the Atlantic to continue without breaking the law. "For the first time ever, the United States has given the EU binding assurances that the access of public authorities for national security purposes will be subject to clear limitations …
Iain Thomson, 02 Feb 2016

Microsoft vs US.gov, Internet of Stuff, etc: What's up with 2015's legal cloudy issues?

Last year, I highlighted five legal issues for cloud firms and consumers to watch out for in 2015. Here’s a quick recap of how those topics developed during the year. 1. Microsoft and the US government go back to court Microsoft is taking a stand against the ability of US law to reach into its Dublin data centres and, against …
Frank Jennings, 02 Feb 2016
networking plugs

Safe Harbor crunch time: Today's the day to hammer out privacy deal

US and EC (European Commission) officials have until the end of the day today to reach a new Safe Harbor agreement or risk a breakdown of transatlantic e-commerce. Despite furious efforts over three months and, for the past few weeks, daily meetings between officials, the two sides are still reportedly at loggerheads over two …
Kieren McCarthy, 01 Feb 2016
Israeli Heron drone

Israeli drones and jet signals slurped by UK and US SIGINT teams

The NSA and Britain’s GCHQ have access to the video feeds of Israel’s fleet of drones and aircraft, according to new documents. The spy agencies have intercepted data streams containing videos, pictures and GPS data from Israeli jets and drones since at least 2008, according to Snowden-supplied documents seen by The Intercept …
Iain Thomson, 29 Jan 2016

VirusTotal bashes bad BIOSes with forensic firmware fossicker

VirusTotal can now analyse firmware for known malware, prying inside almost-hard-coded code for hidden executables. The service allows users to search for low-level infections in embedded devices and BIOS which could represent the handiwork of sophisticated malware or well-resourced or dedicated attackers. Security engineer …
Darren Pauli, 29 Jan 2016
Rob Joyce

NSA’s top hacking boss explains how to protect your network from his attack squads

Usenix Enigma The United States National Security Agency (NSA) is a notoriously secretive organization, but the head of its elite Tailored Access Operations (TAO) hacking team has appeared at Usenix’s Enigma conference to tell the assembled security experts how to make his life difficult. Rob Joyce has spent over a quarter of a century at …
Iain Thomson, 28 Jan 2016

GitHub falls offline, devs worldwide declare today a snow day

Updated Popular and widely used source-code hosting service GitHub is, for the moment, no longer a widely used source-code hosting service. It has fallen offline. Since 1632 PT (0032 UTC, 1132 AEDT), the website has been down. Right now, the San Francisco-headquartered upstart reports: "We're investigating a significant network …
Chris Williams, 28 Jan 2016
Nick Weaver

Cops hate encryption but the NSA loves it when you use PGP

Usenix Enigma Although the cops and Feds wont stop banging on and on about encryption – the spies have a different take on the use of crypto. To be brutally blunt, they love it. Why? Because using detectable encryption technology like PGP, Tor, VPNs and so on, lights you up on the intelligence agencies' dashboards. Agents and analysts don't …
Iain Thomson, 27 Jan 2016
Alex Stamos

Facebook CSO slams RSA Conf for repping 'the worst parts of the security industry'

Usenix Enigma Facebook's chief security officer Alex Stamos is not a man to mince words. Today, he delivered a stinging rebuke to the RSA Conference, due to be held in San Francisco next month. "In my opinion, RSA represents some of the worse parts of the security industry in its direction and it's not very helpful," he told attendees at …
Iain Thomson, 27 Jan 2016
Doomsday clock

Safe Harbor 2.0: US-Europe talks on privacy go down to the wire

United States and European Commission officials have promised they are doing everything possible to reach agreement over transatlantic data-sharing before a critical deadline at the end of this week. After the Safe Harbor agreement – put in place in 2000 – was struck down by Europe's highest court back in October due to NSA …
Kieren McCarthy, 25 Jan 2016

Japanese chief TPP negotiator accused of taking $100,000 bribe

Japan's chief negotiator in the controversial Trans-Pacific Partnership (TPP) trade deal has been accused of taking bribes worth $100,000 from a construction company. Economy minister Akira Amari and his staff accepted 12 million yen ($101,000) in payments from an unnamed company from the Chiba province just outside Tokyo, …
Kieren McCarthy, 22 Jan 2016
Qualcomm

Qualcomm forms JV with Chinese province to design server chipsets

Qualcomm has struck a US$280 million joint venture with the government of China's Guizhou Province that will see the two organisations design server chips in China. Qualcomm took the wraps off an ARM-powered server CPU last October. On Sunday it advanced its plans by revealing “a strategic cooperation agreement and joint …
Simon Sharwood, 18 Jan 2016
Birthday Cake

Happy 30th birthday, IETF: The engineers who made the 'net happen

Special report Thirty years ago today, 16 January 1986, the Internet Engineering Task Force – IETF – was born at a meeting in San Diego. It was humble beginnings and the organization that is more responsible than any other for turning a research project into a viable global communications network boasted an initial attendance of just 21 …
Kieren McCarthy, 16 Jan 2016