Archive for the ‘NSA’ Category

Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying

The National Security Agency has some of the brightest minds working on its sophisticated surveillance programs, including its metadata collection efforts. But a new chat program designed by a middle-school dropoutin his spare time may turn out to be one of the best solutions to thwart those efforts.

Prompted by Edward Snowdens revelations about the governments intrusive surveillance activities, loosely knit citizen militias of technologists and security professionals have cropped up around the world to develop systems to protect us from government agencies out to identify us online and grab our communications.

John Brooks is now among them.

Brooks, who is just 22 and a self-taught coder who dropped out of school at 13, was always concerned about privacy and civil liberties. Four years ago he began work on a program for encrypted instant messaging that uses Tor hidden services for the protected transmission of communications. The program, which he dubbed Ricochet, began as a hobby. But by the time he finished, he had a full-fledged desktop client that was easy to use, offered anonymity and encryption, and even resolved the issue of metadatathe to and from headers and IP addresses spy agencies use to identify and track communicationslong before the public was aware that the NSA was routinely collecting metadata in bulk for its spy programs. The only problem Brooks had with the program was that few people were interested in using it. Although hed made Ricochets code open source, Brooks never had it formally audited for security and did nothing to promote it, so few people even knew about it.

Ricochet is idiot-proof and anonymous.

Then the Snowden leaks happened and metadata made headlines. Brooks realized he already had a solution that resolved a problem everyone else was suddenly scrambling to fix. Though ordinary encrypted email and instant messaging protect the contents of communications, metadata allows authorities to map relationships between communicants and subpoena service providers for subscriber information that can help unmask whistleblowers, journalistss sources and others. Its not just these kind of people whose privacy is harmed by metadata, however; in 2012 it was telltale email metadata that helped unmask former CIA director and war commander General David Petraeus and unravel his affair with Paula Broadwall.

With metadata suddenly in the spotlight, Brooks decided earlier this year to dust off his Ricochet program and tweak it to make it more eleganthe knew hed still have a problem, however, getting anyone to adopt it. He wasnt a known name in the security world and there was no reason anyone should trust him or his program.

Enter Invisible.im, a group formed by Australian security journalist Patrick Gray. Last July, Gray announced that he was working with HD Moore, developer of the Metasploit Framework tool used by security researchers to pen-test systems, and with another respected security professional who goes by his hacker handle The Grugq, to craft a secure, open-source encrypted chat program cobbled together from parts of existing anonymity and messaging systemssuch as Prosody, Pidgin and Tor. They wanted a system that was highly secure, user friendly and metadata-free. Gray says his primary motivation was to protect the anonymity of sources who contact journalists.

At the moment, when sources contact a journalist, theyre going to leave a metadata trail, whether its a phone call record or instant message or email record [regardless of whether or not the content of their communication is encrypted], he says. And that data is currently accessible to authorities without a warrant.

When Brooks wrote to say hed already designed a chat program that eliminated metadata, Gray and his group took a look at the code and quickly dropped their plan to develop their own tool, in favor of working with Brooks to develop his.

See the original post here:

Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying

Federal court authorizes NSA to continue collecting phone records – Video


Federal court authorizes NSA to continue collecting phone records
The Foreign Intelligence Surveillance Court, which oversees spy agencies, has allowed the NSA to continue to warrantlessly collect metadata about people #39;s ph...

By: PressTV News Videos

See original here:

Federal court authorizes NSA to continue collecting phone records - Video

New Zealand: Snowden exposes NSA facilities during ‘Moment of Truth’ – Video


New Zealand: Snowden exposes NSA facilities during #39;Moment of Truth #39;
Video ID: 20140915-026 W/S People arriving on stage for the panel discussion M/S Kim Dotcom blows kisses to the crowd, cheering SOT, Julian Assange, Wikileak...

By: RuptlyTV

See the rest here:

New Zealand: Snowden exposes NSA facilities during 'Moment of Truth' - Video

NSA – Documentary on the Secret Intelligence Agency – Video


NSA - Documentary on the Secret Intelligence Agency
NSA : Documentary on the Secret Intelligence Agency NSA . 2013 2014 This documentary as well as all of the rest of these documentaries shown here are about important times and figures in...

By: SpecialForces

Read the original post:

NSA - Documentary on the Secret Intelligence Agency - Video

NSA snooping furor continues

The logo of Deutsche Telekom is pictured on the TV tower in the German city of Cologne.(REUTERS/Wolfgang Rattay)

The National Security Agency is facing more allegations of cyber-snooping after reportedly targeting German telecom networks Deutsche Telekom and Netcologne as part of a sophisticated program to map the Internet.

Citing top-secret documents provided by NSA whistle-blower Edward Snowden, German newspaper Der Spiegel reports that the NSA and its British counterpart, GCHQ, have targeted the firms as part of a program dubbed "Treasure Map." Described by Der Spiegel as the mandate for a massive raid on the digital world, Treasure Map aims to make every single device connected to the Internet visible to the agencies, including computers, smartphones and tablets.

The report notes that employees of the so-called FiveEyes intelligence agencies -- Americas NSA and its counterparts in the U.K., Canada, Australia and New Zealand, can install the Treasure Map program for monitoring purposes. The program can also help with Computer Attack/Exploit Planning, according to the report.

Der Spiegel cites red markings on the documents denoting networks that agents claim to have accessed. Global telecom powerhouse Deutsche Telekom and German regional provider Netcologne are both reportedly marked in red.

With German Chancellor Angela Merkel at the center of a controversy over an alleged NSA phone tap, Der Spiegels report comes at a time of heightened sensitivity in Germany over the agencys operations.

Michela Menting, cybersecurity practice director at the tech analyst firm ABI Research, told FoxNews.com that targeting telecom firms could offer intelligence agencies an easier path to information than targeting individuals and groups. Deutsche Telekom is a Tier One operator, which means that both its scale and customer base is huge global, of course a goldmine for any national security agency, she said. Since Germany is clearly not part of the five eyes, they are a target, despite being allies.

Deutsche Telekom provides a range of network, TV and mobile services to more than 60 million customers in Germany. Globally, the company has nearly 130 million customers.

However, Deutsche Telekom told FoxNews.com that it could not find any evidence that its networks were manipulated, even after weeks of investigation with experts from Der Spiegel.

Right now, there is nothing more than a circle around a part of our network in a document provided by Edward Snowden, explained Deutsche Telekom spokesman Philipp Blank, in a statement emailed to FoxNews.com. Nevertheless, we take every hint very seriously and we have informed German security authorities. Any access by foreign intelligence services to our networks would be totally unacceptable.

Follow this link:

NSA snooping furor continues