Items tagged with spying

There are steps you can take to reclaim your privacy, such as putting a piece of black tape over your laptop's webcam, but unless you're willing to disconnect completely, total privacy might be a myth. Case in point, researchers at Israel's Ben Gurion University recently demonstrated how easy it is to hack a system so that the headphones record sound like a microphone. The proof-of-concept computer code at work is called "Speake(a)r" and what it does is repurpose the speakers inside headphones to record audio. It does this by capturing vibrations in the air and converting them into electromagnetic... Read more...
If you follow WikiLeaks on Twitter, you may have noticed a series of cryptic tweets consisting of strings of numbers and letters. These are hashes or keys of sorts, some of which are calling "dead man's keys." Regardless, they appear to be related to another WikiLeak post on Twitter claiming its co-founder, Julian Assange, is without Internet access after his connection was "intentionally severed by a state party." That action has reportedly activated WikiLeaks' "appropriate contingency plans" in response. Julian Assange's internet link has been intentionally severed by a state party. We have activated... Read more...
You know a story is going to be good when it involves Facebook, its creator Mark Zuckerberg, and the word "privacy". It used to be that Google was considered the biggest, baddest people data-fetcher, but over time, that crown has been passed to Facebook, a service that doesn't even need to try to get information from people, as those people willingly cough it up themselves. For a multitude of reasons, the lack of privacy on Facebook should be concerning to many, especially when you consider that Mark Zuckerberg can't seem to get enough privacy for himself. As we reported just the other day, Facebook-owned... Read more...
Last week, we learned about the company teaming up with others, such as Microsoft and Yahoo, to make SMTP 'Strict Transport Security' a reality, a protocol that would make it even harder for malicious users to gain access to our email. In a new blog post, the company draws our attention to SMTP STS as well as a couple of other recent (and not so recent) ways the company has improved our security. On Safer Internet Day, which happened a month-and-a-half ago, the company introduced a new Gmail feature that highlights when email is received or being sent to a domain... Read more...
Could your smartphone be listening in on your life? If you download mobile apps without much care for their permissions requests, you might not ever know. The privacy threat is so significant though, that the Federal Trade Commission has stepped in and warned us to be aware of it. On Thursday, the FTC sent a letter to a dozen app developers warning them against their use of "audio beacons", which listen in on the environment and pick up hidden noise signals from TV shows. This is made possible with technology from an Indian company named Silverpush, and in effect it lets the app figure out what... Read more...
If you thought that United States intelligence and law enforcement agencies around the country were incredibly adamant about spying on its citizens (going to extreme lengths to do so), you haven’t seen anything yet. Across the pond, the Campaigners Privacy International filed a formal complaint against the UK’s GCHQ, levying claims that the agency’s efforts to hack the devices of ordinary citizens was unlawful. However, not only did the GCHQ acknowledge that it was involved in a widespread hacking campaign (reversing previous denials on the matter), but the Investigatory Powers Tribunal (IPT) actually... Read more...
The term "IoT" has been floating around for a while and many who care about privacy have been put on high alert. "Internet of Things" devices can help make our lives better. They can allow us to change the temperature with our smartphones or even unlock doors. They could help us track vital stats during a workout. They can optimize the use of our solar power. All great things... but... they can also act as a proxy that allows governments to peer into our lives. Again, this threat is nothing new, but what makes its reality just a bit clearer is that someone in power in the spying... Read more...
The NSA’s practice of collecting the phone records of Americans is illegal, a Federal appeals court ruled today. The new decision in the case brought by the American Civil Liberties Union (ACLU) effectively kills the NSA’s position that its data collection practice was authorized by section 215 of the Patriot Act. Overturning an earlier opinion, the Federal appeals court wrote that “the bulk telephone metadata program is not authorized by section 215 (of the Patriot Act).” The decision doesn’t necessarily mean an end to the government’s data collection program, however. In its opinion, the Federal... Read more...
It was revealed several months ago that the U.S. Marshal Service secretly uses spy planes equipped with devices that mimic cell towers to scan for and harvest cellphone information on a mass scale. Now it's being reported that the Central Intelligence Agency (CIA) played a key role in helping the Justice Department develop the technology that's capable of scanning data from thousands of cellphones at a time.Let's back up a moment. As originally reported by a number of news outlets, the Federal Communications Commission (FCC) was clueless of the spy program that the Department of Justice (DoJ) won't... Read more...
Symantec made the unsettling announcement today that it has discovered sophisticated malware that has been operating successfully on and off since 2008. Named Regin, the malware launches in a series of stages and is designed to avoid detection at each stage. Symantec hasn’t identified the organization that created Regin, but says that its sophistication, its targets, and the amount of time that would be needed to create it suggest that a nation state is responsible. Image Credit: SymantecRegin’s first stage is a Trojan. Once launched, the malware goes through several stages, each of which is encrypted.... Read more...
We already know that Uncle Sam is keeping tabs on us, or at least those of us who might trigger a red flag for one reason or another. The question is, to what degree? We might never know the full answer to that, though we can parse together bits and pieces to get an idea. For example, Google's latest transparency report reveals that government requests for user data have risen 150 percent over the past five years. This is the tenth time Google has updated its transparency report, and in the latest version, Google shares the number of government demands for user information in criminal investigations... Read more...
The Edward Snowden revelations have faded a bit from public view in light of other, more recent political activities, but a new report regarding the NSA and Yahoo has people talking about it once more. Reportedly, the United States government threatened to fine Yahoo a quarter of a million dollars <i>per day</i> in 2008 "if it failed to comply with a broad demand to hand over user communications." Yahoo's stance was that doing so would violate the U.S. constitution, but that didn't stop the feds from pressuring with such staggering fines to comply with its PRISM program. Unsealed documents... Read more...
Big trouble in China? We're not sure, though reports are surfacing that Chinese government officials have been making unannounced visits to Microsoft's offices in China. Microsoft is keeping mum on the visits, and so is China's State Administration for Industry & Commerce, which Chinese media reports had made visits to Microsoft offices in Beijing, Shanghai, Guangzhou, and Chengdu. According to Reuters, China has been keeping a close eye on Microsoft and its technologies every since former U.S. National Security Agency (NSA) contractor Edward Snowden blew the whistle on a massive and ongoing... Read more...
So it’s not just us then. While we seethe over NSA spying allegations here in the U.S., ISPs across the pond who believe they were spied upon by the UK’s intelligence agency GCHQ in the wake of Edward Snowden’s leaks are taking action. According to BBC News, seven Internet providers, in conjunction with Privacy International, have filed a lawsuit against GCHQ. "These widespread attacks on providers and collectives undermine the trust we all place on the internet and greatly endangers the world's most powerful tool for democracy and free expression," Eric King, deputy director... Read more...
1 2 3 Next