NSA   20908

« earlier     later »

Ex-NSA contractor pleads not guilty to spying charges in federal court - The Washington Post
He was a “trusted insider,” prosecutors said, working at the NSA from 2012 to 2015, where he was an employee of the intelligence contractor Booz Allen Hamilton. Martin was for some time in the NSA’s elite hacker unit, Tailored Access Operations, which makes and deploys software used to penetrate foreign targets’ computer networks for foreign espionage purposes.

At the time of his arrest, Martin was enrolled in a doctorate program in information security management and doing research for his dissertation. He has an extensive background in computer security, including in the areas of encryption and secure communications.
nsa  contractor  spy 
7 weeks ago by bwiese
Revisiting the NSA Suite B Announcement
NSA still recommends ECC, but if natsec vendors can't transition to that in a limited timeframe, they should skip it and move to PQC, if it is available by then.
NSA  cryptography  quantum_computing  elliptic_curves 
7 weeks ago by jcretan
Trump signs bill renewing NSA's internet surveillance program
The law renews for six years and with minimal changes the National Security Agency (NSA) program, which gathers information from foreigners overseas but incidentally collects an unknown amount of communications belonging to Americans.
privacy  surveillance  NSA  US  legislation  dataprotection 
7 weeks ago by corrickwales
TaoSecurity: The Origin of Threat Hunting
My intent was to show a unified model of all of the jobs done in my Group at the time - VAO (Vulnerability Analysis and Operations) - and how they were all evolving in 2 dimensions: Horizontally, from discrete events (e.g., A Red Team exercise), to connecting discrete events to draw conclusions about the state of security across the DoD ("sampling"), to an ongoing ("persistent") search for vulnerabilities and attackers. And Vertically, from the identification of vulnerabilities in lab/products to the operational world, to the observation of them in real-life, to true adversary emulation (context: most penetration test, Red Teams are/were a poor emulation of real Adversaries), to an active and sustained search for Attackers ("Hunting").

For us, "Hunt" meant a very planned and sustained search, taking advantage of the existing infrastructure of Red/Blue Teams and COMSEC Monitoring, as well as intelligence information to guide the search. That mystery phrase on the lower right ("Persistent but not Pervasive") was meant to say a lot - we were aiming for very large reach, but you cannot look everywhere all the time, so you need to guide the hunt. I honestly don't recall the first use of "Hunt" in this context, but I am sure it did not start with me in 2009
threathunting  cybersecurity  nsa  history 
8 weeks ago by bwiese
The NSA’s Spy Hub in New York, Hidden in Plain Sight
The NSA’s Spy Hub in New York, Hidden in Plain Sight via Instapaper
IFTTT  Instapaper  nsa  networking  evilbuildings 
8 weeks ago by wexxy
The NSA’s voice-recognition system raises hard questions for Echo and Google Home | The Verge
NSA could build a profile of your voice from assistants (if it's not already on YouTube or social media).

"NSA could appeal to platforms to scan their own archives, arguing they would be helping to locate a dangerous terrorist. It would be similar to the scans companies already run for child abuse, terrorism or copyright-protected material on their networks, all of which are largely voluntary. If companies complied, the issue could be kept out of conventional courts entirely."
NSA  surveillance  voice  assistant 
8 weeks ago by dandv
Forget About Siri and Alexa — When It Comes to Voice Identification, the “NSA Reigns Supreme”
Today, FBI and NSA agents would have identified Pelton within seconds of his first call to the Soviets. A classified NSA memo from January 2006 describes NSA analysts using a “technology that identifies people by the sound of their voices” to successfully match old audio files of Pelton to one another. “Had such technologies been available twenty years ago,” the memo stated, “early detection and apprehension could have been possible, reducing the considerable damage Pelton did to national security.”
8 weeks ago by craniac
Forget About Siri and Alexa — When It Comes to Voice Identification, the “NSA Reigns Supreme”
Forget About Siri and Alexa — When It Comes to Voice Identification, the “NSA Reigns Supreme”
archive  privacy  voice  nsa 
8 weeks ago by gdw
Forget About Siri and Alexa — When It Comes to Voice Identification, the “NSA Reigns Supreme”
A t the height of the Cold War, during the winter of 1980, FBI agents recorded a phone call in which a man arranged a secret meeting with the Soviet embassy in…
nsa  technology  from instapaper
8 weeks ago by geekzter

« earlier    later »

related tags

2016  2016election  2017  34c3  351  a:david-e-sanger  a:nicole-perlroth  a:scott-shane  airforce  alphabet  america  apple  archive  assistant  audio  australia  avayaengage  awesometalks  backdoor  backups  badtech  bigbrother  bitcoin  blockchain  blog  bnd  breach  bsafe  bugs  bush  ccc  censorship  centralization  chelseamanning  china  cia  cis3360  cis4615  civil_libreties  cloud  congress  contractor  corruption  crypto  cryptography  csc  cybersecurity  cyberwar  d:2017.11.12  dashboard  data-breach  data  dataprotection  defense  democrats  disclosure  dnc  doj  donaldtrump  dossier  dragnet  edu  edward-snowden  edwardsnoden  eff  election2016  elliptic_curves  email  espionage  evilbuildings  facebook  fail  fbi  fisa  forensics  frompocket  fuck-everything  fusiongps  gchq  glenngreenwald  google  gop  gov2.0  government  grants  hack  hacker  hacking  history  hn  human_rights  identity  ifttt  imperialism  indie  information_operations  instapaper  intel  intelligence-gathering  intelligence  intelligence_community  intercept  internet  investigative  jamescomey  journalism  kaspersky  kerryhowley  languages  law  leak  leaker  legislation  longform  mass_surveillance  media  meltdown  metrics  mic  military  mitre  mobile  morale  national_security  net.neutrality  netherlands  networking  new  new_york_times  nro  nsa  nytimes  obama  opensource  p:the-new-york-times★★  panopticon  policy  politics  portrait  printer  printers  prism  privacy  putin  quantum_computing  radar  ragtime  realitywinner  reincepriebus  republican  research  rsa  rsa_inc  russia  scandals  search  section_702  security  shadow_brokers  shadowbrokers  slashdot  snowden  socialengineering  sounds  spectre  spy  spying  ssl  standards  ströbele  surveillance  surviellance  talent  tech  technology  theintercept  threathunting  times  tls  tool  top  tracking  transparency  trumpadministration  university  uno  us  usa  voice  w:4000  wapo  web  whistleblowers  whitehouse  wikileaks  windows  wsj  xijinping  york  παρακολούθηση 

Copy this bookmark: