TOR. Metadata. Metadata is "data about data". There are two "metadata types;" structural metadata, about the design and specification of data structures or "data about the containers of data"; and descriptive metadata about individual instances of application data or the data content.
The main purpose of metadata is to facilitate in the discovery of relevant information, more often classified as resource discovery. Metadata also helps organize electronic resources, provide digital identification, and helps support archiving and preservation of the resource. Metadata assists in resource discovery by "allowing resources to be found by relevant criteria, identifying resources, bringing similar resources together, distinguishing dissimilar resources, and giving location information. "  Definition Web Photo Geotags Can Reveal More Than You Wish. PRISM (surveillance program) PRISM logo used in the slides PRISM is a clandestine mass electronic surveillance data mining program launched in 2007 by the National Security Agency (NSA), with participation from an unknown date by the British equivalent agency, GCHQ. PRISM is a government code name for a data-collection effort known officially by the SIGAD US-984XN. The Prism program collects stored Internet communications based on demands made to Internet companies such as Google Inc. and Apple Inc. under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms. The NSA can use these Prism requests to target communications that were encrypted when they traveled across the Internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle, among other things.
ECHELON. ECHELON[needs IPA], originally a code-name, is now used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory nations to the UKUSA Security Agreement — Australia, Canada, New Zealand, the United Kingdom, and the United States.
Referred to by a number of other abbreviations, including AUSCANNZUKUS and Five Eyes, it has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications. It was created in the early 1960s to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War, and was formally established in the year of 1971. §Name Room 641A. Coordinates: Room 641A is a telecommunication interception facility operated by AT&T for the U.S.
National Security Agency that commenced operations in 2003 and was exposed in 2006. §Description The existence of the room was revealed by former AT&T technician Mark Klein and was the subject of a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T. Klein claims he was told that similar black rooms are operated at other facilities around the country. §Lawsuit The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in a massive, illegal program to wiretap and data-mine Americans' communications. §Gallery Utah Data Center. The Utah Data Center area layout.
The Utah Data Center, also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, is a data storage facility for the United States Intelligence Community that is designed to store data estimated to be on the order of exabytes or larger. Its purpose is to support the Comprehensive National Cybersecurity Initiative (CNCI), though its precise mission is classified. The National Security Agency (NSA) leads operations at the facility as the executive agent for the Director of National Intelligence. It is located at Camp Williams near Bluffdale, Utah, between Utah Lake and Great Salt Lake and was completed in May 2014 at a cost of $1.5 billion.
A Close Look at the NSA’s Most Powerful Internet Attack Tool. N.S.A. Devises Radio Pathway Into Computers. GCHQ has tools to manipulate online information, leaked documents show. The UK intelligence agency GCHQ has developed sophisticated tools to manipulate online polls, spam targets with SMS messages, track people by impersonating spammers and monitor social media postings, according to newly-published documents leaked by NSA whistleblower Edward Snowden.
The documents – which were published on First Look Media with accompanying analysis from Glenn Greenwald – disclose a range of GCHQ "effects" programs aimed at tracking targets, spreading information, and manipulating online debates and statistics. The disclosure comes the day before the UK parliament is due to begin up to three days' debate on emergency legislation governing British surveillance capabilities. With cross-party support the bill is expected to be voted through this week. Among the programs revealed in the document are: • GATEWAY: the "ability to artificially increase traffic to a website". • CLEAN SWEEP which "masquerade[s] Facebook wall posts for individuals or entire countries". Gait analysis. Gait analysis laboratory equipped with infrared cameras and floor mounted force platforms.
MIT researchers measure your pulse, detect heart abnormalities with smartphone camera. Last year, a group of researchers from MIT’s Computer Science and Artificial Intelligence Lab (CSAIL) showed us just how easy it is to “see” a human heartbeat in ordinary video footage.
Getting the Message? Police Track Phones with Silent SMS. In June 2011, Colette Giudicelli, a senator representing the Maritime Alps region of France, wrote to Claude Gueant, the French Interior Minister: Many foreign police and intelligence services use clandestine “Silent” SMS to locate suspects or missing persons.
This method involves sending an SMS text message to the mobile phone of a suspect, an SMS that goes unnoticed and sends back a signal to the sender of the message. FBI lets suspects go to protect 'Stingray' secrets - Mar. 18, 2015. The device, called a "Stingray," tricks cell phones into revealing their locations.
A judge's court order this week threatens to reveal closely guarded details about how police use Stingrays. Judge Patrick H. How Your Phone Camera Can Be Used to Spy on You. In his recent television interview with NBC's Brian Williams, former NSA analyst Edward Snowden outlined the kind of spying techniques government agencies are capable of. U.S. Spies on Millions of Cars. A New Underclass: The People Who Big Data Leaves Behind. Many people are becoming concerned about the myriad ways their lives are monitored, tracked, and reduced to mere data points for some shady government agency or corporation to crunch with an algorithm. BitTorrent Opens Alpha For Maelstrom, Its New, Distributed, Torrent-Based Web Browser. Federal agents fly planes that spy on American cell phones - Nov. 13, 2014.
NEW YORK (CNNMoney) On Thursday the Wall Street Journal cited unnamed sources who said the planes carry a box that serves as a dummy cell phone site. That device mimics actual towers, duping nearby cell phones into connecting to it instead of a real phone company tower. According to the report, the federal government gathers the data from Cessna airplanes and can cover most of the U.S. population. These devices typically trick phones into sharing its location data and revealing the phone's identity. Unmanned aerial vehicle. A group photo of aerial demonstrators at the 2005 Naval Unmanned Aerial Vehicle Air Demo. Printer steganography. Seeing Yellow. CD Burners Leave “Fingerprints” Hacking Exposed Computer Forensics Blog. How the NSA can 'turn on' your cell phone remotely - Jun. 6, 2014. I don't think I'll ever understand the point of non-removable batteries.
Paranoid or Prudent: Should You Tape Over Your Webcam? - Reviewed.com Cameras. Hacked from China: Is your kettle spying on you? Any iPhone can be hacked with a modified charger in under a minute. Proof That Military Chips From China Are Infected? For years, everyone has warned that counterfeit microchips made in China and installed on American military hardware could contain viruses or secret backdoors granting the Chinese military cyber access to U.S. weapons systems. How to bypass an Android smartphone’s encryption and security: Put it in the freezer.
Security researchers at the University of Erlangen-Nuremberg in Germany have shown that they can extract photos, surfing history, and contact lists from Android smartphones, even if the phone is locked and the disk is encrypted. New Research Result: Cold Boot Attacks on Disk Encryption. Microchips in our passports and credit cards: Are they safe? Hacker's Demo Shows How Easily Credit Cards Can Be Read Through Clothes And Wallets. The Rise of Thin, Mini and Insert Skimmers. Bluesnarfing. Foreign Intelligence Surveillance Act. Why the FISA Amendments Act Is Unconstitutional. An Evil USB Drive Could Take Over Your PC Undetectably. Air gap (networking) Acoustic Snooping on Typed Information. Scientist-developed malware covertly jumps air gaps using inaudible sound. Acoustic cryptanalysis. Extracting audio from visual information. Tempest (codename) When Should You Use Shielded vs. Unshielded Ethernet Cable? Satellite Hacking. How to Hack WIFI Password in 2 Minutes. 5 Wi-Fi security myths you must abandon now.
Wired networks may leak, but they don't broadcast. Local shared object. HTTP cookie. Block websites from storing site preferences or login status in Firefox. Pop-up ad. Temporary folder. Browser Fingerprinting - Panopticlick. Certificate authority - Is there anything preventing the NSA from becoming a root CA? Federal Public Key Infrastructure.