nsa   20843

« earlier    

Captives of the Cloud: Part I - Journal #37 September 2012 - e-flux
We are the voluntary prisoners of the cloud; we are being watched over by governments we did not elect.
government  privacy  NSA  surveillance  centralization  censorship  internet  cloud  facebook 
yesterday by rachaelsullivan
Worth the Weight – BLDGBLOG
In the midst of a long New York Times article about the serial theft of offensive cyberweapons from the National Security Agency, there’s a brief but interesting image. “Much of [a core N.S.A. group’s] work is labeled E.C.I., for ‘exceptionally controlled information,’ material so sensitive it was initially stored only in safes,” the article explains. “When the cumulative weight of the safes threatened the integrity of N.S.A.’s engineering building a few years ago, one agency veteran said, the rules were changed to allow locked file cabinets.”
security  overhead  metaphor  safes  nsa 
2 days ago by bezthomas
Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core - NYTimes.com
NSA is bleeding talent as they turn on their own people trying to find the Shadow Brokers leaker
NSA  Shadow_Brokers  intelligence  malware  exploits 
3 days ago by jcretan
Using Metadata to find Paul Revere
I have been asked by my superiors to give a brief demonstration of the surprising effectiveness of even the simplest techniques of the new-fangled Social Networke Analysis in the pursuit of those who would seek to undermine the liberty enjoyed by His Majesty’s subjects. This is in connection with the discussion of the role of “metadata” in certain recent events and the assurances of various respectable parties that the government was merely “sifting through this so-called metadata” and that the “information acquired does not include the content of any communications”. I will show how we can use this “metadata” to find key persons involved in terrorist groups operating within the Colonies at the present time. I shall also endeavour to show how these methods work in what might be called a relational manner.
Technology  Society  NSA 
5 days ago by crbassett
Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core - The New York Times
A serial leak of the agency’s cyberweapons has damaged morale, slowed intelligence operations and resulted in hacking attacks on businesses and civilians worldwide.
nsa  longread  article  hacking 
5 days ago by longfried
Church Committee - Wikipedia
United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities
frank_church  wiki  wikipedia  church  committee  senator  corruption  government  cia  nsa  fbi  irs  investigation  1975  1976  1970s  william_colby  america  assassination 
9 days ago by cluebucket
Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core - NYTimes.com
Mr. Williams had written on his company blog about the Shadow Brokers, a mysterious group that had somehow obtained many of the hacking tools the United States used to spy on other countries. Now the group had replied in an angry screed on Twitter. It identified him — correctly — as a former member of the National Security Agency’s hacking group, Tailored Access Operations, or T.A.O., a job he had not publicly disclosed. Then the Shadow Brokers astonished him by dropping technical details that made clear they knew about highly classified hacking operations that he had conducted.
hacking  NSA 
10 days ago by Jswindle
Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core
NOV. 12, 2017 | The New York Times | By SCOTT SHANE, NICOLE PERLROTH and DAVID E. SANGER.

“These leaks have been incredibly damaging to our intelligence and cyber capabilities,” said Leon E. Panetta, the former defense secretary and director of the Central Intelligence Agency. “The fundamental purpose of intelligence is to be able to effectively penetrate our adversaries in order to gather vital intelligence. By its very nature, that only works if secrecy is maintained and our codes are protected.”
data_breaches  hacking  vulnerabilities  counterintelligence  counterespionage  moles  malware  ransomware  Fedex  Mondelez  Edward_Snowden  security_&_intelligence  Russia  Leon_Panetta  NSA  cyber_security  cyber_warfare  cyberweapons  tools  David_Sanger 
10 days ago by jerryking
Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core - The New York Times
A serial leak of the agency’s cyberweapons has damaged morale, slowed intelligence
operations and resulted in hacking attacks on businesses and civilians worldwide.
nsa  security  hacking  politics  spying 
11 days ago by SimonHurtz

« earlier    

related tags

1970s  1975  1976  2013  2015  2016  2017-10-11  2017-10-13  2017-10-15  2017-10-17  2017-10-19  2017  351  3gpp  5g  644  9/11  activism  algorithm  algorithms  alpr  america  ansi  anti-virus  antivirus  apple  archive  article  assassination  assurance  author  badtech  bangladesch  banken  bgp  bigdata  binney  biometrics  bitcoin  borderlessness  borders  breach  bruce_schneier  bug  cdu  censorship  centralization  chilling  china  church  cia  citizenship  clinton_hillary  cloud  codemettle  committee  concordance  core  corruption  counterespionage  counterintelligence  crime  crypto  cryptochallenge  cyber_security  cyber_warfare  cyberattacks  cybersecurity  cybersecurity_policy  cyberwar  cyberwarfare  cyberweapons  data-mining  data  data_breaches  datacenter  david_sanger  demoracy  design  digital  digitalcitizenship  disbale  disclosure  dual-ec  edward_snowden  email  encryption  engine  eo12333  espionage  espionageact  estonia  ethiopia  eugene  exploits  facebook  fbi  fedex  fincen  fisa  foia  foreign-policy  frank_church  germany  google  gov2.0  government  grassmarlin  hack  hacker  hackerangriffe  hackers  hacking  high  history  ics  identification  identity  infosec  intel  intelligence  internet  internets  investigation  irs  iso  israel  jamesbamford  jamesbridle  japan  josephmenn  journalism  jusalgoritmi  kapsersky  kaspersky  kremlin  law  leak  leaks  leon_panetta  longread  malware  management  metadata  metaphor  migration  mmm  mobility  moles  mondelez  national_security  nationalism  nordkorea  north_korea  oops  opinion  opsec  ouch  overhead  ovum  panopticon  physical  politics  politics_software  prism  privacy  program  ransomware  read  refugees  research  reuters  rights  russia  russland  safes  satoshinakamoto  scada  security  security_&_intelligence  senator  sentiment  shadow_brokers  shaken  shaping  snowden  snowden_edward  society  software  software_politics  spd  spies  spooks  spying  standard  standardization  standards  standort_d_land  style  stylometry  surveillance  surveys  swift  technology  text  theshadowbrokers  tools  toread  tracking  travel  trust  u2  usa  uspolitics  via.nytimes  violence  vulnerabilities  vulnerability  wahl  wannacry  what-even?  whistleblowers  wifi  wiki  wikileaks  wikipedia  william_colby  windows  wpa2  writing  wtc  wurm  Überwachungsstaat 

Copy this bookmark:



description:


tags: