background preloader

NSA Spying

NSA Spying
The US government, with assistance from major telecommunications carriers including AT&T, has engaged in massive, illegal dragnet surveillance of the domestic communications and communications records of millions of ordinary Americans since at least 2001. Since this was first reported on by the press and discovered by the public in late 2005, EFF has been at the forefront of the effort to stop it and bring government surveillance programs back within the law and the Constitution. History of NSA Spying Information since 2005 (See EFF’s full timeline of events here) News reports in December 2005 first revealed that the National Security Agency (NSA) has been intercepting Americans’ phone calls and Internet communications. Those news reports, combined with a USA Today story in May 2006 and the statements of several members of Congress, revealed that the NSA is also receiving wholesale copies of American's telephone and other communications records. EFF Fights Back in the Courts Jewel v.

Are We Moving To A World With More Online Surveillance? : Parallels Brazilian President Dilma Rousseff was angered by reports that the National Security Agency was spying on her. She has called for giving individual countries greater control over the Internet. Getty Images Many governments around the world have expressed outrage over the National Security Agency's use of the Internet as a spying platform. Some governments, led most recently by Brazil, have reacted to recent disclosures about NSA surveillance by proposing a redesign of Internet architecture. But privacy advocates warn that some of the changes under consideration could actually undermine Internet freedom, not strengthen it. "Unfortunately, there is enormous blowback," says Bruce Schneier, a cybersecurity expert who has worked closely with Britain's Guardian newspaper in reporting on NSA surveillance activities. "The NSA's actions embolden these people to say, 'We need more sovereign control,' " Schneier says. An Absence Of Government Control Suspicion Of American Surveillance

Central Authentication Service What is CAS? VCU Central Authentication Service provides a centralized, easy-to-use, easy-to-recognize login system for Web applications at Virginia Commonwealth University. Users can log into the system knowing that their VCU login information is encrypted and secure. Protect your privacy For security reasons, please be sure to close all browser windows when you are done accessing services that require authentication. Need help logging in? VCU Central Authentication Service uses your VCU eID and password as authentication. Still need help?

US Cyber Offense is "The Best in the World" The subject of offensive cyber action by the U.S. government was classified for many years and was hardly discussed in public at all. Then several years ago the possibility of U.S. cyber offense was formally acknowledged, though it was mostly discussed in the conditional mood, as a capability that might be developed and employed under certain hypothetical circumstances. Today, however, U.S. offensive cyber warfare is treated as an established fact. Not only that but, officials say, the U.S. military is pretty good at it. “We believe our [cyber] offense is the best in the world,” said Gen. “Cyber offense requires a deep, persistent and pervasive presence on adversary networks in order to precisely deliver effects,” Gen. “Potential adversaries are demonstrating a rapidly increasing level of sophistication in their offensive cyber capabilities and tactics. In response to another question for the record from Rep. This seems to have been an incomplete response. Gen.

The Enemies of Internet - Special Edition : Surveillance Central Authentication Service What is CAS? VCU Central Authentication Service provides a centralized, easy-to-use, easy-to-recognize login system for Web applications at Virginia Commonwealth University. Users can log into the system knowing that their VCU login information is encrypted and secure. Protect your privacy For security reasons, please be sure to close all browser windows when you are done accessing services that require authentication. Need help logging in? VCU Central Authentication Service uses your VCU eID and password as authentication. Still need help? lulzcart & the fedz - part 1 PASTEBIN | #1 paste tool since 2002 create new paste trending pastes Pastebin launched a little side project called HostCabi.net, check it out ;-)Pastebin is 300% more awesome when you are logged in. Sign Up, it's FREE! Public Pastes Untitled2 sec agoUntitled6 sec agoUntitled11 sec agoUntitled15 sec agoUntitled20 sec agomedia21 sec agoUntitled24 sec agoser_139823061950226 sec ago lulzcart & the fedz - part 1 By: a guest on Sep 15th, 2012 | syntax: None | size: 8.09 KB | hits: 12,818 | expires: Never download | raw | embed | report abuse | print Text below is selected. Ohai everybody :) As you probably know, we got raided and arrested for our actions against Romanian Government, wich is, in fact, a bunch of tard and gay ppl...and fedz :) I won`t start telling you all the story here, again, cuz I`m sure you know it, but instead I'll write here my full experience I got with the fedz and the prosecuttors...so here we go: I. create a new version of this paste RAW Paste Data iPhone/iPad Windows Firefox

Online surveillance becomes a priority for the Human Rights Council, as Pakistan joins the wrong side of the debate Below is a joint statement from Privacy International and Bytes for All. This Friday, 27 September, marks the conclusion of the 24th session of the UN Human Rights Council, a session which has, for the first time, seen issues of internet surveillance in the spotlight. Privacy International and Bytes for All welcome the attention given at the Human Rights Council to this issue. However, we are concerned about developments which took place that threaten privacy rights and freedom of expression, especially because these alarming suggestions are masked as solutions to address the increase in State surveillance. We agree with the High Commissioner for Human Rights, Navi Pillay, who urged States “to ensure that adequate safeguards are in place against security agency overreach and to protect the right to privacy and other human rights.” Privacy International and Bytes for All reject this call for more regulation of the internet, which should remain free, independent and open for all to use.

Central Authentication Service What is CAS? VCU Central Authentication Service provides a centralized, easy-to-use, easy-to-recognize login system for Web applications at Virginia Commonwealth University. Users can log into the system knowing that their VCU login information is encrypted and secure. By logging in through VCU Central Authentication Service, users will be able to access any application using this service. Protect your privacy For security reasons, please be sure to close all browser windows when you are done accessing services that require authentication. Need help logging in? VCU Central Authentication Service uses your VCU eID and password as authentication. Still need help?

The Fourth Amendment Implications of the Government's Use of Cell Tower Dumps in its Electronic Surveillance by Brian Owsley Privacy concerns resonate with the American people. Although the right to privacy is not explicitly protected in the United States Constitution, the Supreme Court has found the right to privacy rooted within the Constitution based on various amendments. In the modern era, with rapid advances in technology, threats to privacy abound including new surveillance methods by law enforcement. There is a growing tension between an individual’s right to privacy and our collective right to public safety. This latter right is often protected by law enforcement’s use of electronic surveillance as an investigative tool, but may be done at times inconsistent with constitutional rights. Recently, the American Civil Liberties Union brought to light the popular use of government surveillance of cell phones, including the gathering of all cell phone numbers utilizing a specific cell site location. This article provides a brief description of cellular telephone and cell-site technology in Part I.

Central Authentication Service What is CAS? VCU Central Authentication Service provides a centralized, easy-to-use, easy-to-recognize login system for Web applications at Virginia Commonwealth University. Users can log into the system knowing that their VCU login information is encrypted and secure. By logging in through VCU Central Authentication Service, users will be able to access any application using this service. Protect your privacy For security reasons, please be sure to close all browser windows when you are done accessing services that require authentication. Need help logging in? VCU Central Authentication Service uses your VCU eID and password as authentication. Still need help?

How Snowden did it The Guardian via AFP-Getty Images file When Edward Snowden stole the crown jewels of the National Security Agency, he didn’t need to use any sophisticated devices or software or go around any computer firewall. All he needed, said multiple intelligence community sources, was a few thumb drives and the willingness to exploit a gaping hole in an antiquated security system to rummage at will through the NSA’s servers and take 20,000 documents without leaving a trace. “It’s 2013 and the NSA is stuck in 2003 technology,” said an intelligence official. Jason Healey, a former cyber-security official in the Bush Administration, said the Defense Department and the NSA have “frittered away years” trying to catch up to the security technology and practices used in private industry. As a Honolulu-based employee of Booz Allen Hamilton doing contract work for the NSA, Snowden had access to the NSA servers via "thin client" computer. But Snowden was not most users. More from NBC News Investigations:

Central Authentication Service What is CAS? VCU Central Authentication Service provides a centralized, easy-to-use, easy-to-recognize login system for Web applications at Virginia Commonwealth University. Users can log into the system knowing that their VCU login information is encrypted and secure. By logging in through VCU Central Authentication Service, users will be able to access any application using this service. Protect your privacy For security reasons, please be sure to close all browser windows when you are done accessing services that require authentication. Need help logging in? VCU Central Authentication Service uses your VCU eID and password as authentication. Still need help?

An interview with LulzCart, Romania's most notorious hacker It's Judgment Day for the hacker cognoscenti known as LulzSec. First, the "teen queen" of Anonymous pleaded guilty to one count of computer crime—outing herself as a 26-year-old man in the process. Then Jake Davis, known as topiary, a 20-year-old from Scotland, had his guilty plea on multiple DDoS attacks accepted. We'll call it LulzDay. When not causing individuals, governments and corporations to erupt with frustration (I know a man whose credit card, hacked by LulzSec, was used to purchase him a horse, just for the lulz), LulzCart is an enthusiastic member of the car-racing community and a Web designer. This is him now: We took the occasion of the launch of the Free Anons store to ask him about the project, his work, and what would happen if Sabu requested help from the Free Anons organization. Blasted Rat is an independent vendor that has existed, in some form or another, for several years. Image via MyAnonStore.com DD: Did you build the original Blasted Rat site? I’m glad you asked.

Related: