spying

Latest

  • (Original) Teksta

    Researchers find another smart toy that's easy to hack

    by 
    Daniel Cooper
    Daniel Cooper
    12.08.2017

    A team of security researchers that has warned of the dangers of smart toys has found another that can be used to spy on your children. Pen Test Partners examined the Teksta Toucan, finding that it's easy to hack the device's microphone and speaker. According to The Register, the device is built by Genesis Industries, makers of the iQue and My Friend Cayla, two devices that are already feeling the heat from regulators. Both are currently being looked at in the US and Europe, while the latter has been withdrawn from sale in Germany.

  • Handout . / Reuters

    White House lets NSA's warrantless surveillance continue until April

    by 
    Jon Fingas
    Jon Fingas
    12.06.2017

    The Foreign Intelligence Surveillance Act's Section 702, which authorizes the NSA's warrantless data gathering, is supposed to expire on New Year's Eve. Don't tell that to the White House, though. Lawyers for the executive branch have determined that FISA Section 702 surveillance can legally continue until April 26th, 2018. The rationale comes down to a technicality. As the FISA Amendments Act says orders issued under 702 can continue for a year, and the last year-long certification was issued on April 26th, 2017... well, you do the math.

  • Alex Wong via Getty Images

    Germany bans children’s smartwatches over privacy concerns

    by 
    Mallory Locklear
    Mallory Locklear
    11.17.2017

    Germany's telecommunications regulator, the Federal Network Agency, announced a ban today on the sale of kids' smartwatches, the BBC reports, and encouraged parents to destroy the ones they already own. The agency appears to be taking particular issue with the devices' abilities to transmit audio from its surroundings. Jochen Homann, the agency's president, said today, "Via an app, parents can use such children's watches to listen unnoticed to the child's environment and they are to be regarded as an unauthorised transmitting system."

  • AOL

    NSA once spied on your *NSYNC downloads from Kazaa

    by 
    Steve Dent
    Steve Dent
    09.14.2017

    A nostalgic new cache of Edward Snowden files shows the National Security Agency (NSA) has been snooping online for a lot longer than you may think. While you were listening to Enya on your state-of-the-art iPod, the agency was looking into peer-to-peer encryption sites like Napster, Limewire and Kazaa, according to a report by The Intercept. Its crowning achievement was to crack the encryption used by at least two sites, Kazaa and eDonkey, exposing search queries and shared files.

  • Thomas Trutschel/Photothek via Getty Images

    'Shadow Brokers' give away more NSA hacking tools

    by 
    Jon Fingas
    Jon Fingas
    04.08.2017

    The elusive Shadow Brokers didn't have much luck selling the NSA's hacking tools, so they're giving more of the software away -- to everyone. In a Medium post, the mysterious team supplied the password for an encrypted file containing many of the Equation Group surveillance tools swiped back in 2016. Supposedly, the group posted the content in "protest" at President Trump turning his back on the people who voted for him. The leaked data appears to check out, according to researchers, but some of it is a couple of decades old and focused on platforms like Linux.

  • Jack Taylor/Getty Images

    London police allegedly used hackers to target activists

    by 
    Jon Fingas
    Jon Fingas
    03.22.2017

    If it wasn't already clear why it's a problem when police surveillance goes wrong, it is now. An independent investigator is looking into claims that London's Metropolitan Police used an illegal, roundabout way to access the emails of activists and journalists. An anonymous former worker alleges that a Met intelligence unit took advantage of India "counterparts" that used hackers to obtain email logins for innocent people ranging from Greenpeace protesters to Guardian reporters. The snooping had been going on for a "number of years," according to the insider, and there was reportedly widespread document shredding to cover up the monitoring.

  • Saul Loeb/AFP/Getty Images

    WikiLeaks won't share CIA exploits unless companies meet terms

    by 
    Jon Fingas
    Jon Fingas
    03.18.2017

    WikiLeaks offered to work with tech companies to patch the CIA's leaked security exploits, but there has been a whole lot of silence ever since. Why? That depends on who you ask. Motherboard sources claim that WikiLeaks "made demands" of the companies before it would hand over necessary details of the vulnerabilities, including a requirement that they promise to issue security patches within 90 days. Potential fixes are reportedly stuck in legal limbo, the tipsters say, as the companies are worried about writing patches based on leaked info, not to mention the origins of the leak. They're worried that Russia might have been responsible for forwarding the info.

  • Andrew Harrer/Bloomberg via Getty Images

    Russian spies indicted in massive Yahoo account breach

    by 
    Jon Fingas
    Jon Fingas
    03.15.2017

    When Yahoo claimed that state-sponsored hackers were behind the 2014 breach that exposed 500 million accounts, it may have been understating the significance of what happened. The Justice Department is indicting four Russians over the intrusion, two of which (Dmitry Dokuchaev and Igor Sushchin) work for the country's FSB intelligence agency -- yes, the US believes two spies were directly involved. This represents the first time that the US has directly charged Russian officials with cybercrimes, rather than targeting professional crooks.

  • Brendan Smialowski/AFP/Getty Images

    Russia used a cybercriminal's botnet for a spying campaign

    by 
    Jon Fingas
    Jon Fingas
    03.12.2017

    It's no secret that the lines between state-sponsored hacking and cybercrime are fuzzy. After all, relying on professional crooks offers plausible deniability if the intruders are ever caught. However, it's now apparent that those lines sometimes disappear altogether. The New York Times reports that Russian intelligence 'piggybacked' on criminal hacker Evgeniy Bogachev's now-defunct botnet, GameOver ZeuS, to conduct spying campaigns in the US and abroad. Between 2011 and 2014, infected computers were asked to search for documents that clearly reflected Russian political interests, including US support for Syrian rebels, Ukrainian operations and English searches for "top secret" and "Department of Defense." Those last queries suggest that there were at least some American government or contractor systems that had been compromised, and they're definitely not what you'd expect from an outfit siphoning bank accounts.

  • Chris Goodney/Bloomberg via Getty Images

    'Many' Android exploits in WikiLeaks CIA files are already fixed

    by 
    Jon Fingas
    Jon Fingas
    03.09.2017

    Apple isn't the only company scrambling to reassure the public that it has fixed most of the CIA exploits revealed in WikiLeaks' latest disclosure. Google tells CNET it's "confident" that security patches and safeguards already protect you against "many" of the exploits in both Android and the Chrome web browser. The internet giant will also "implement any further necessary protections" for flaws that have yet to be patched.

  • Reuters/Larry Downing

    CIA reveals new guidelines for collecting data on Americans

    by 
    Jon Fingas
    Jon Fingas
    01.19.2017

    There's no question that the US government's approach to handling sensitive data could stand an update to acknowledge the online age, and the CIA is taking a stab at it. The agency has published new procedures that govern how it collects, keeps and shares information on Americans under Executive Order 12333. The guidelines acknowledge that it's much, much easier to collect large volumes of data than when the Order surfaced in the 1980s, and that the nature of the internet requires restrictions that hadn't even been considered before.

  • Mike Blake / Reuters; logo by D-Lopa

    The year of Yahoo's undoing

    by 
    Jessica Conditt
    Jessica Conditt
    12.30.2016

    It's not often that we're able to quantify the crappiness of a particular year, but Yahoo's 2016 was so tragic that it ended with a hefty, widely publicized price tag: $1 billion. That's the size of the discount that Verizon requested on its purchase of Yahoo, just three months after the $4.83 billion acquisition went public. That deal (and the discount) is still in the works, and it's expected to close early next year, but Verizon clearly feels it has the upper hand in negotiations. And, after Yahoo's year of hacking disclosures, government spying and security issues, it's easy to see why.

  • Josh Edelson via Getty Images

    Twitter cracks down on developers making surveillance tools

    by 
    Jon Fingas
    Jon Fingas
    11.22.2016

    If it wasn't already clear that Twitter wants to keep police and spies out of your tweets, it is now. Twitter is warning developers that it won't let them use public programming kits or Gnip data for surveillance reasons, whether the clients are law enforcement or anyone else. Just because many tweets are public doesn't mean it's acceptable to harvest them, Twitter says. To that end, it's promising "expanded" efforts to crack down on developers who use the data for surveillance reasons. Get caught and you'll either have limited access or lose it entirely.

  • AP Photo/Patrick Semansky

    FBI using Twitter's raw 'firehose' data to monitor users

    by 
    Steve Dent
    Steve Dent
    11.15.2016

    The FBI is using a Twitter tool called Dataminr to track criminals and terrorist groups, according to documents spotted by The Verge. In a contract document, the agency says Dataminr's Advanced Alerting Tool allows it "to search the complete Twitter firehose, in near real-time, using customizable filters." However, the practice seems to violate Twitter's developer agreement, which prohibits the use of its data feed for surveillance or spying purposes.

  • Getty Images/iStockphoto

    The consequences of the Trump presidency on cybersecurity

    by 
    Violet Blue
    Violet Blue
    11.11.2016

    Hacking and cybersecurity played a huge role in the presidential election. So much so that Donald Trump, America's new president-elect, was helped greatly by the acts of criminal hackers in his journey to the White House, and is now an outspoken WikiLeaks fan.

  • Reuters/Kieran Doherty

    UK spies paid a New Zealand firm to help tap key internet lines

    by 
    Jon Fingas
    Jon Fingas
    10.23.2016

    It's no longer a secret that the UK's GCHQ was expanding its mass surveillance in the years before Edward Snowden's leaks. However, it hasn't really been clear as to who was helping it upgrade its spying campaign... until today. The Intercept and Television New Zealand have obtained documents showing that GCHQ purchased large amounts of "data acquisition" systems and "probes" from Endace, a New Zealand company that specializes in network data recording. The agency wanted to step up its monitoring of high-speed internet cables from 87 10Gbps lines in 2009 to 800 by 2013, and buying loads of Endace technology helped it edge closer to that goal.

  • Christopher Furlong/Getty Images

    UK spies violated privacy laws with bulk data collection

    by 
    Jon Fingas
    Jon Fingas
    10.17.2016

    Ever since Edward Snowden's leaks came to light, UK spy agencies have responded to accusations of surveillance overreach with a common boilerplate statement: that their activities are lawful, necessary and proportionate. However, they can't always use that justification any more. The Investigatory Powers Tribunal has ruled that key GCHQ, MI5 and MI6 bulk data collection programs violated privacy protections in the European Convention on Human Rights. Both a Bulk Communications Data effort (which covers data such as visited websites, email metadata and GPS locations) and a Bulk Personal Datasets initiative (covering biographical details like your communications and financial activities) didn't have proper oversight until 2015, when some safeguards came into place. That's particularly damning when BCD was had been in place since 1998, and BPD since 2006.

  • Meriel Jane Waissman/Getty

    The FBI recommends you cover your laptop's webcam, for good reason

    by 
    Violet Blue
    Violet Blue
    09.23.2016

    FBI director James Comey recently recommended that we all cover our webcams with tape for security reasons. Comey believes that doing so is a simple step for people to "take responsibility for their own safety and security."

  • New Snowden leaks unravel mystery behind NSA's UK base

    by 
    Cherlynn Low
    Cherlynn Low
    09.06.2016

    Just when you thought you couldn't be shocked by the NSA's snooping anymore, new leaked documents show the agency's reach extends far beyond American borders. According to files obtained by The Intercept from NSA whistleblower Edward Snowden, a US base in the UK has been eavesdropping on satellite and other wireless communications around the world.

  • AP Photo/Paul Sakuma

    Here's how the NSA spied on Cisco firewalls for years

    by 
    Jon Fingas
    Jon Fingas
    08.21.2016

    Edward Snowden leaks revealed that the NSA had the ability to spy on Cisco firewall traffic for years, but just how did the agency do it? We now have a clearer idea. An analysis of data from the Equation Group hack shows that the NSA used a specialized tool, BenignCertain, that uses an exploit in Cisco's Internet Key Exchange implementation to extract encryption keys and read otherwise secure virtual private network data. Cisco has confirmed that the attack can compromise multiple versions of its old PIX firewalls, which were last supported in 2009.