Schneier on NSA surveillance: A guide to staying secure

"Now that we have enough details about how the NSA eavesdrops on theinternet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves. The NSA has turned the fabric of the internet into a vast surveillance platform, but they are not magical. They're limited by the same economic realities as the rest of us, and our best defense is to make surveillance of us as expensive as possible. Trust the math. Encryption is your friend. Use it well, and do your best to ensure that nothing can compromise it. That's how you can remain secure even in the face of the NSA." Continue reading

Continue ReadingSchneier on NSA surveillance: A guide to staying secure

Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security

"The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world. The agency, according to the documents and interviews with industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated." Continue reading

Continue ReadingRevealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security

‘More profitable than cocaine’: Peru is top source of counterfeit US cash

"Peru has in the past two years overtaken Colombia as the No. 1 source of counterfeit U.S. dollars, says the U.S. Secret Service, protector of the world's most widely traded currency. Over the past decade, $103 million in fake U.S. dollars 'made in Peru' have been seized — nearly half since 2010, Peruvian and U.S. officials say. The phony money heads mostly to the United States but is also goes smuggled to nearby countries including Argentina, Venezuela and Ecuador. Counterfeiters earn up to $20,000 in real currency for every $100,000 in false bills they produce after expenses, the investigator said." Continue reading

Continue Reading‘More profitable than cocaine’: Peru is top source of counterfeit US cash

Mapping the Bitcoin Economy Could Reveal Users’ Identities

"The new research comes at a time when investment in the bitcoin economy is booming (see “Bitcoin Hits the Big Time”), and as it is being scrutinized by U.S. authorities. In 2013, the U.S. Department of Homeland Security has seized a total of $5 million from Mt Gox, the largest exchange where people go to convert between bitcoins and conventional currencies. Last month, New York’s financial regulator subpoenaed 22 companies to gather information about their dealings with Bitcoin. 'The Bitcoin protocol still has huge potential for anonymity,' says Sarah Meiklejohn, who led the research project, 'but the way that people are using it is not achieving anonymity at all.'" Continue reading

Continue ReadingMapping the Bitcoin Economy Could Reveal Users’ Identities

FTC Begins Sanctions Against Insecure Internet-Connected Device Companies

"The FTC is steadily hacking the law to make itself the country’s de facto privacy regulator. In this case, it’s using its right to punish a company for being 'unfair' to consumers. But its power is limited: it can’t fine TRENDnet; it can only require it to notify customers, establish 'a comprehensive security program' — that includes pen testing its products — and agree to 20 years of privacy audits (just like Facebook and Google). If TRENDnet messes up again after this, the FTC can then fine it up to $16,000 per violation (a power it used to fine Google $22.5 million). There may well be more FTC orders to come." Continue reading

Continue ReadingFTC Begins Sanctions Against Insecure Internet-Connected Device Companies

Search Engine Finds Internet-Connected Cameras, Medical Devices, Power Plants

"Shodan crawls the Internet looking for devices, many of which are programmed to answer. It has found cars, fetal heart monitors, office building heating-control systems, water treatment facilities, power plant controls, traffic lights and glucose meters. It’s become a crucial tool for security researchers, academics, law enforcement and hackers looking for devices that shouldn’t be on the Internet or devices that are vulnerable to being hacked. An industry report from Swedish tech company Ericsson estimates that 50 billion devices will be networked by 2020 into an 'Internet of Things.'" Continue reading

Continue ReadingSearch Engine Finds Internet-Connected Cameras, Medical Devices, Power Plants

Syracuse’s ‘most prolific sex offender’ lied to acquire government job

"Despite having hired the man Syracuse police call the ‘most prolific sex offender’ in the area, Syracuse city officials confirmed to CNY NY that they don’t plan on changing their hiring practices or checking into the background of current employee. On the application, obtained via a Freedom of Information Act request, Carrigan was twice asked and twice lied about whether he had ever been convicted of a crime, felony or misdemeanor. When he was fired from his DPW job after a 2012 arrest for having oral sex with a 15-year-old boy, the city refused to amend its policy on background checks. Carrigan was a level three sex-offender when he applied for the job in 2009." Continue reading

Continue ReadingSyracuse’s ‘most prolific sex offender’ lied to acquire government job

Does the U.S. Government Have A Right to Bomb Syria?

"An argument is being made that the credibility of the U.S. government is at stake, and that it needs to follow through on the red line threats issued by the government. But if the U.S. has been so foolish as to make threats that might diminish its credibility and harm its capacity for self-defense, it does not follow that it has now gained the privilege or right of making good on its threats. One’s mistakes or threats do not generate rights and privileges. Obama began by making the preceding credibility argument about the U.S. and his own red line threats. He has since extended that invalid argument to the 'international community'." Continue reading

Continue ReadingDoes the U.S. Government Have A Right to Bomb Syria?

‘Nerve gas’ chemicals exported to Syria: potassium and sodium fluoride

"The Business Secretary, Vince Cable, will today be asked by MPs to explain why a British company was granted export licences for the dual-use substances for six months in 2012 while Syria’s civil war was raging and concern was rife that the regime could use chemical weapons on its own people. Chemical weapons experts said that although the two substances have a variety of uses such as the fluoridation of drinking water, sodium and potassium fluoride are also key to producing the chemical effect which makes a nerve agent such as sarin so toxic." Continue reading

Continue Reading‘Nerve gas’ chemicals exported to Syria: potassium and sodium fluoride

A New Yorker’s view of gun control

"'In New York,' he said, 'the gun laws are so strict, the majority of people who have them are the criminals. Maybe if you're a small-business owner or have some other valid reason for protecting yourself, you might get a permit to carry. But if you're a regular guy like me, forget about it. But I live on the Brooklyn-Queens border, and in that part of town there's only one way to protect yourself — you got to let the punks know you're packing heat. So I bought myself a street gun that I carry with me everywhere. Lots of the decent people in my neighborhood are carrying illegal guns. It's the only thing we can do.'" Continue reading

Continue ReadingA New Yorker’s view of gun control