Archive for the ‘NSA’ Category

Technieuws – Week 52-2014 – NSA hackt SSH – Video


Technieuws - Week 52-2014 - NSA hackt SSH
Elke week gaat Jeffrey de belangrijkste nieuwsitems van de afgelopen week in een korte video aan jullie presenteren. Dit is de tweede aflevering!

By: WumboTech

Read more:
Technieuws - Week 52-2014 - NSA hackt SSH - Video

NSA update – Video


NSA update

By: Joey Kershinar

Read this article:
NSA update - Video

NSA-Tvice in Haiti@Karib Hotel – Video


NSA-Tvice in Haiti@Karib Hotel
via YouTube Capture.

By: Club Lougarou

The rest is here:
NSA-Tvice in Haiti@Karib Hotel - Video

NSA surveillance program can retrieve, replay phone calls

Anti-spying protesters outside the US Department of Justice in Washington, DC, earlier this year. Photo: Reuters

The US National Security Agency has built a surveillance system capable of recording ''100 per cent'' of a foreign country's telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.

A senior manager for the program compares it to a time machine one that can replay the voices from any call without requiring that a person be identified in advance for surveillance.

The National Security Agency building in Fort Meade, Maryland. Photo: AP

The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for ''retrospective retrieval'', and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere.

Advertisement

In the initial deployment, collection systems are recording ''every single'' conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary.

The call buffer opens a door ''into the past'', the summary says, enabling users to ''retrieve audio of interest that was not tasked at the time of the original call''. Analysts listen to only a fraction of 1 per cent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or ''cuts'', for processing and long-term storage.

Former NSA contractor Edward Snowden. Photo: Getty Images

At the request of US officials, this article withholdsdetails that could be used to identify the country where the system is being employed or other countries where its use was envisioned.

Continue reading here:
NSA surveillance program can retrieve, replay phone calls

Leaked NSA Documents Reveal How To Hide From The NSA

PC Format Magazine via Getty Images New information reported by Der Spiegel suggests staying anonymous online is a more accessible prospect than it seems. (Photo by Simon Lees/PC Format Magazine via Getty Images)

If you want a truly anonymous life, then maybe it's time you learned about Tor, CSpace and ZRTP.

These three technologies could help people hide their activities from the National Security Agency, according to NSA documents newly obtained from the archive of former contractor Edward Snowden by the German magazine Der Spiegel.

The combination of Tor, CSpace and ZRTP (plus another anonymizing technology for good measure) results in levels of protection that the NSA deems "catastrophic" -- meaning the organization has "near-total loss/lack of insight to target communications," according to Der Spiegel.

"Although the documents are around two years old, experts consider it unlikely the agency's digital spies have made much progress in cracking these technologies," Spiegel's staff wrote.

In comparison, accessing somebody's Facebook messages is considered a "minor" task for the agency. Similarly, virtual private networks (or VPNs), which are widely used by companies, are easily accessed by the NSA, according to Der Spiegel's report, as are so-called "HTTPS" connections.

So, what are these services and what do you actually have to do to use them?

Tor is basically a network that offers an easy way for people to mask their location when communicating online. Anyone can download Tor's web browser -- it's available on Mac, Windows, Linux, and smartphones. It's not foolproof: When using Tor, you're advised to sacrifice the convenience of browser plugins, torrent downloads, and websites that don't use "HTTPS encryption" if you truly want to stay off the grid.

And that's just if you want to mask your online habits -- messaging and phone calls require more steps still, meaning you also have to add CSpace and ZRTP if you want to hide those from the NSA, according to Der Spiegel.

CSpace is a program that lets people text chat and transfer files, while ZRTP is a form of encryption that protects mobile phone calls and texting -- it's used in apps like RedPhone and Signal.

See the original post:
Leaked NSA Documents Reveal How To Hide From The NSA