European Parliament Investigation of Echelon 7 September 2001: Link to final version of the European Parliament report on Echelon: (194 pp.; 495KB) Minutes of meeting and Echelon resolution of EuroParl on 5 September 2001: 4 July 2001: Link to EuroParl Motion for Resolution on Echelon dated July 4, 2001. TrueCrypt, the final release, archive Yes . . . TrueCrypt is still safe to use. Google is generating a false-positive alert Recent attempts to download the TrueCrypt files here, using Chrome or Firefox (Mozilla uses Google's technology), have been generating false-positive malware infection warnings. They must be false-positives because no change has been made to the files since this page was put up nearly a year ago (May 29th, 2014) and many people have confirmed that the downloaded binaries have not changed and that their cryptographic hashes still match. Also, the well-known and respected “VirusTotal” site, which scans files through all virus scanners reports ZERO hits out of 57 separate virus scan tests: VirusTotal scan results.
NSA leak reveal plans to subvert mobile network security around the world The NSA's AURORAGOLD program -- revealed in newly released Snowden docs -- used plundered internal emails to compromise nearly every mobile carrier in the world, and show that the agency had planned to introduce vulnerabilities into future improvements into mobile security. One major target of the NSA's infiltration and sabotage program is the London-based GSM Association, the trade body that American, European and other tech companies and carriers use to set and maintain mobile networking standards. Undermining security is the most controversial type of NSA dirty tricks, the thing that frustrates industry players and friendly governments alike. The revelations about the Bullrun/Edgehill sabotage programs have opened rifts between the NSA and the security community (including the US government's National Institute for Standards and Technology, NIST, which was targeted by the program). Operation Auroragold How the NSA Hacks Cellphone Networks Worldwide [Ryan Gallagher/The Intercept]
NSA Nicknames and Codewords (Updated: January 18, 2014) Below is a listing of nicknames and codewords related to US Signals Intelligence (SIGINT) and Communications Security (COMSEC). Most of them are from the NSA, some are from other government or military agencies. Some of them also have an abbreviation which is shown in brackets. NICKNAMES are generally unclassified. NSA uses single word nicknames, outside NSA they usually consist of two separate words, with the first word selected from alphabetical blocks that are assigned to different agencies by the Joint Staff. President Obama Forgets To Thank Edward Snowden For Surveillance Reform No matter what you think of the passage of the USA Freedom Act, you should be able to agree that it wouldn't have been possible without Edward Snowden's contributions. Even many of the Senators who were against reform are grudgingly admitting this. On the floor of the Senate, Majority Leader Mitch McConnell spat out that the USA Freedom Act was a "resounding victory" for Snowden as if it were some sort of insult. The only guy who seemed really confused by all of this was Rep.
On the Internet, nobody knows you're a dog Peter Steiner's cartoon, as published in The New Yorker History Peter Steiner, a cartoonist and contributor to The New Yorker since 1979, said the cartoon initially did not get a lot of attention. Later it took on a life of its own, and that he felt similar to the person who created the "smiley face". In fact, Steiner was not that interested in the Internet when he drew the cartoon, and although he did have an online account, he recalled attaching no "profound" meaning to the cartoon; it was just something he drew in the manner of a "make-up-a-caption" cartoon. In response to the comic's popularity, he stated, "I can't quite fathom that it's that widely known and recognized. Crytopan Crypto-PAn is a cyrptography-based sanitization tool for network trace owners to anonymize the IP addresses in their traces in a prefix-preserving manner. Crypto-PAn has the following properties: One-to-one The mapping from original IP addresses to anonymized IP addresses is one-to-one. Prefix-preserving In Cyrpto-PAn, the IP address anonymization is prefix-preserving.
N.S.A. Collecting Millions of Faces From Web Images The is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents. The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications, the N.S.A. documents reveal. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world, the documents show. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed. Photo One N.S.A.
Echelon's SpookWords Generator For instance, Simon Davies, director of Privacy International, warns that the list of 1,700 suspicious "trigger words" will not outsmart the global surveillance system : "The Echelon system works on a very sophisticated system of word relationships, rather than strictly on keywords. Powerful artificial intelligence software is used to judge the relationship between words, and analyse strings of words." Davies advises protestors to send a whole series of original keyword transmissions through email, rather than relying on someone else's template. (in ZDNet) Using encryption is the best way to bypass Echelon, although more and more governments try to control its use.
Black Hat USA 2013 Armitage - A Scriptable Red Team Collaboration Tool Armitage is a scriptable red team collaboration tool built on top of the Metasploit Framework. Through its programming language, Cortana, it's possible to integrate outside tools into Armitage's workflow and make them available in a team friendly way. This demonstration will introduce Armitage's collaboration features and highlight Cortana's improved abilities to integrate tools into Armitage's collaboration architecture.
Yahoo webcam images from millions of users intercepted by GCHQ Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal. GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not. In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally.
NSA-O-Matic Recently released NSA documents revealed the existence of BLACKINK, a cryptanalytic technique that bugs computers at European telecom companies. James Clapper, the Director of National Intelligence, assured the public that the program only collects information on foreign citizens. Truth is scarier than fiction. Read up on the NSA's actual programs from Glenn Greenwald, Bruce Schneier, or elsewhere across the web. Help change the system.