Glenn Greenwald: Inside the mind of NSA chief Gen Keith Alexander

"Now, on the website of DBI Architects, Inc. of Washington and Reston, Virginia, there are what purports to be photographs of the actual Star-Trek-like headquarters commissioned by Gen. Alexander that so impressed his Congressional overseers. It's a 10,740 square foot labyrinth in Fort Belvoir, Virginia. The brochure touts how 'the prominently positioned chair provides the commanding officer an uninterrupted field of vision to a 22'-0' wide projection screen'. Its "primary function is to enable 24-hour worldwide visualization, planning, and execution of coordinated information operations for the US Army and other federal agencies.'" Continue reading

Continue ReadingGlenn Greenwald: Inside the mind of NSA chief Gen Keith Alexander

How the US government inadvertently created Wikileaks

"So here you have a non-US citizen at a foreign university doing graduate work studies, and the United States government came barreling in and not only snuffed out the funding and killed his studies, it also barred him from knowing what it was he had been funded to research. It was at that moment, Julian told me, that he decided he would devote himself to exposing organizations that attempted to keep secrets and withhold information in an effort keep the masses ignorant and disadvantaged. So you see, depending on who you ask, the US government actually helped create of Wikileaks. And the rest, as they say, is history." Continue reading

Continue ReadingHow the US government inadvertently created Wikileaks

Gov. Standards Agency Suggests Dropping NSA-Influenced Algorithm

"Documents provided by Edward Snowden suggest that the NSA has heavily influenced the standard, which has been used around the world. In its statement Tuesday, NIST acknowledged that the NSA participates in creating cryptography standards 'because of its recognized expertise' and because NIST is required by law to consult with the spy agency. Various versions of Microsoft Windows, including those used in tablets and smartphones, contain implementations of the standard, though the NSA-influenced portion isn’t enabled by default." Continue reading

Continue ReadingGov. Standards Agency Suggests Dropping NSA-Influenced Algorithm

How the NSA Spies on Smartphones Including the BlackBerry

"For an agency like the NSA, the data storage units are a goldmine, combining in a single device almost all the information that would interest an intelligence agency: social contacts, details about the user's behavior and location, interests (through search terms, for example), photos and sometimes credit card numbers and passwords. According to the documents, it set up task forces for the leading smartphone manufacturers and operating systems. Specialized teams began intensively studying Apple's iPhone and its iOS operating system, as well as Google's Android mobile operating system. Another team worked on ways to attack BlackBerry." Continue reading

Continue ReadingHow the NSA Spies on Smartphones Including the BlackBerry

Why Do They Need FATCA When They Have SWIFT?

"Given the growing ease with which people conduct transactions that don’t involve physical cash, or even leaving your house, one should wonder just how much financial data Uncle Sam’s spy network has, and why it feels entitled to it. What does this all mean? Hard to say. These days the American government is fairly cagey about its reasons for anything, but on the surface it appears as though the United States government will happily steal whatever information on the finances of ordinary people and financial institutions of other countries that it can’t coerce out of them through extra territorial law making schemes like FATCA. Whatever is going on, it’s not about taxes." Continue reading

Continue ReadingWhy Do They Need FATCA When They Have SWIFT?

With “Follow The Money”, NSA Knows All About Your Spending Habits

"While collecting credit card data was to be expected, what is even worse is that the NSA has also secretly planted itself in the nexus of the entire global USD-intermediated financial transactions system courtesy of SWIFT. In other words, America's unsupervised uber spies, when not checking in on their former significant others, spend the bulk of their time tracking who is buying what, where, and with whose money. They also know how much anyone in the world has spent on credit card-based purchases, what the source of that money is, and what the purchase was. In other words: absolute monetary and financial surveillance." Continue reading

Continue ReadingWith “Follow The Money”, NSA Knows All About Your Spending Habits

‘Follow the Money’: NSA Spies on International Payments, Banking, Cards

"The National Security Agency (NSA) widely monitors international payments, banking and credit card transactions. The spying is conducted by a branch called 'Follow the Money' (FTM). The collected information then flows into the NSA's own financial databank, called 'Tracfin,' which in 2011 contained 180 million records. Some 84 percent of the data is from credit card transactions. Further NSA documents from 2010 show that the NSA also targets the transactions of customers of large credit card companies like VISA for surveillance. The NSA's Tracfin data bank also contained data from SWIFT, a network used by thousands of banks to send transaction information securely." Continue reading

Continue Reading‘Follow the Money’: NSA Spies on International Payments, Banking, Cards

Apple: iPhone Fingerprint Reader Means Government Business

"In October 2012, U.S. Immigration and Customs Enforcement - ICE, announced a major iPhone win for a high security government agency. The contract was for iPhone services sourced through various carriers with a total award value of $2.1 million, covering 17,676 users. I expect to see more and more government iPhone contracts, especially if the new phone launch focuses on security. In February of this year Apple landed a major contract with the New Zealand police, for an estimated $159M over the next 10 years. The contract provides 6,000 users with an iPhone, and 3,900 with an iPad as well. The TSA in May 2012 also released a contract for purchasing up to 1,000 handheld Apple devices." Continue reading

Continue ReadingApple: iPhone Fingerprint Reader Means Government Business

Bruce Schneier: iPhone Fingerprint Authentication

"Fingerprint readers have a long history of vulnerabilities as well. Some are better than others. The simplest ones just check the ridges of a finger; some of those can be fooled with a good photocopy. Others check for pores as well. The better ones verify pulse, or finger temperature. Fooling them with rubber fingers is harder, but often possible. [..] Apple's move is likely to bring fingerprint readers into the mainstream. But all applications are not equal. It's fine if your fingers unlock your phone. It's a different matter entirely if your fingerprint is used to authenticate your iCloud account. The centralized database required for that application would create an enormous security risk." Continue reading

Continue ReadingBruce Schneier: iPhone Fingerprint Authentication

Huge Solar Drone Could Fly, Conduct Surveillance For Five Years

"A solar-powered high-altitude drone made by Titan Aerospace is intended to be able to remain in flight for about five years. When manufactured, it would have 3,000 solar panels producing about 7 kW of electricity and would be above the clouds, so it would be exposed to sunlight constantly during daylight hours. One is scheduled for completion next year. The point of having such a plane would be to keep a payload in flight long-term, presumably in a manner similar to communications satellites. They could be used for surveillance applications such as environmental monitoring, fire monitoring and disaster response, among other things." Continue reading

Continue ReadingHuge Solar Drone Could Fly, Conduct Surveillance For Five Years