Archive for the ‘NSA’ Category

Leaked NSA Documents Reveal How To Hide From The NSA

PC Format Magazine via Getty Images New information reported by Der Spiegel suggests staying anonymous online is a more accessible prospect than it seems. (Photo by Simon Lees/PC Format Magazine via Getty Images)

If you want a truly anonymous life, then maybe it's time you learned about Tor, CSpace and ZRTP.

These three technologies could help people hide their activities from the National Security Agency, according to NSA documents newly obtained from the archive of former contractor Edward Snowden by the German magazine Der Spiegel.

The combination of Tor, CSpace and ZRTP (plus another anonymizing technology for good measure) results in levels of protection that the NSA deems "catastrophic" -- meaning the organization has "near-total loss/lack of insight to target communications," according to Der Spiegel.

"Although the documents are around two years old, experts consider it unlikely the agency's digital spies have made much progress in cracking these technologies," Spiegel's staff wrote.

In comparison, accessing somebody's Facebook messages is considered a "minor" task for the agency. Similarly, virtual private networks (or VPNs), which are widely used by companies, are easily accessed by the NSA, according to Der Spiegel's report, as are so-called "HTTPS" connections.

So, what are these services and what do you actually have to do to use them?

Tor is basically a network that offers an easy way for people to mask their location when communicating online. Anyone can download Tor's web browser -- it's available on Mac, Windows, Linux, and smartphones. It's not foolproof: When using Tor, you're advised to sacrifice the convenience of browser plugins, torrent downloads, and websites that don't use "HTTPS encryption" if you truly want to stay off the grid.

And that's just if you want to mask your online habits -- messaging and phone calls require more steps still, meaning you also have to add CSpace and ZRTP if you want to hide those from the NSA, according to Der Spiegel.

CSpace is a program that lets people text chat and transfer files, while ZRTP is a form of encryption that protects mobile phone calls and texting -- it's used in apps like RedPhone and Signal.

See the original post:
Leaked NSA Documents Reveal How To Hide From The NSA

Secret code indicates NSA tracks users of privacy tools, report says

A NSA spying tool is configured to snoop on an array of privacy programs used by journalists and dissidents, according to an analysis of never-before-seen code leaked by an unknown source.

The code, published as part of investigation by two German broadcasters on Thursday, contains tracking specifications for XKeyScore, a powerful NSA program that collects and sorts intercepted data.

XKeyScore came to light in documents leaked by former NSA contractor Edward Snowden, but some observers believe the latest information -- which adds greater detail on how the agency monitors people trying to protect their privacy online -- may have not come from the documents he passed to journalists.

The broadcasters, Norddeutscher Rundfunk and Westdeutscher Rundfunk, did not reveal their source for the code but claimed in a report that former NSA employees and experts "are convinced that the same code or similar code is still in use today,"

The report describes how the code enables XKeyScore to track users connected to The Onion Router, known as TOR, a network that encrypts data traffic through random servers in order to obscure identification of a web surfer.

TOR, a project initially started by the U.S. Navy, is considered a critical privacy enhancing tool and one that has hampered NSA surveillance in the past.

The report contends the NSA is monitoring two TOR servers in Germany. One is run by Sebastian Hahn, a 28-year-old computer science student at the University of Erlangen. The server, known as a Directory Authority, a critical part of TOR's infrastructure, supplies a list of relays in the network to computers connecting to the network.

The NSA's collection of metadata about people connecting to the server puts those people at risk, the report quoted Hahn as saying.

The NSA also tracks the use of non-public TOR relays, which are supplied to users upon request in countries known to actively block TOR relays, such as in China and Iran, the report said.

Other rules in the code indicate the agency is tracking people who visit public websites for privacy-related projects including the TOR Project; Tails, a privacy-focused portable operating system; and the Linux Journal website, the report alleged.

Read the original post:
Secret code indicates NSA tracks users of privacy tools, report says

An Open Message to The NSA – Video


An Open Message to The NSA
Dear NSA (and all you other alphabet soup agencies), If you #39;re listening, listen carefully, cause we have something to say to you. ------- Follow us on Faceb. This is an open message to...

By: Patricia Higgins

See the rest here:
An Open Message to The NSA - Video

NSA whistleblower – Video


NSA whistleblower
Thomas Drake, a former top NSA official, says he is emblematic of the problems with the whistleblower system for defense and intelligence employees. He says he was retaliated against by the...

By: McClatchyDC

See the original post:
NSA whistleblower - Video

NSA Surveillance, Ferguson, Eric Garner | 2014 Review with Dave Rubin & Ana Kasparian – Video


NSA Surveillance, Ferguson, Eric Garner | 2014 Review with Dave Rubin Ana Kasparian
Dave and Ana sit down to talk about their coverage of some of the biggest news stories of the year. Watch part 1 here: ...

By: Rubin Report

Go here to read the rest:
NSA Surveillance, Ferguson, Eric Garner | 2014 Review with Dave Rubin & Ana Kasparian - Video