Exclusive: U.S. directs agents to cover up program used to investigate Americans

Exclusive: U.S. directs agents to cover up program used to investigate Americans

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges.

Schedule 36th Chaos Communication Congress

Schedule 36th Chaos Communication Congress

The AMD Platform Security Processor (PSP) is a dedicated ARM CPU inside your AMD processor and runs undocumented, proprietary firmware provided by AMD.The second part covers the functionality of the PSP and how it interacts with other components of the x86 CPU like the DRAM controller or System Management Unit (SMU).

ACLU sues Homeland Security over ‘stingray’ cell phone surveillance

ACLU sues Homeland Security over ‘stingray’ cell phone surveillance

One of the largest civil liberties groups in the U.S. is suing two Homeland Security agencies for failing to turn over documents it requested as part of a public records request about a controversial cell phone surveillance technology.

Secret Court Rules That the FBI’s “Backdoor Searches” of Americans Violated the Fourth Amendment

Secret Court Rules That the FBI’s “Backdoor Searches” of Americans Violated the Fourth Amendment

After the government appealed, the FISC allowed the FBI to continue to use backdoor searches to invade people’s privacy—even in investigations that may have nothing to do with national security or foreign intelligence—so long as it follows what the appeals court called a “modest ministerial procedure.” Basically, this means requiring FBI agents to document more clearly why they were searching the giant 702 databases for information about Americans.

South African authorities admit to mass surveillance

South African authorities admit to mass surveillance

This was revealed in the former State Security Agency Director General Arthur Fraser's affidavit and other documents filed in 2017 during a court case relating to amaBhungane Centre for Investigative Journalism - a South African non-profit investigative journalism organisation.

Everything Cops Say About Amazon's Ring Is Scripted or Approved by Ring

Everything Cops Say About Amazon's Ring Is Scripted or Approved by Ring

Photo: APAmazon’s home security company Ring has garnered enormous control over the ways in which its law enforcement partners are allowed to portray its products, going as far as to review and even author statements attributed to police in the press, according to emails and documents obtained by Gizmodo.

How U.S. Tech Giants Are Helping to Build China’s Surveillance State

How U.S. Tech Giants Are Helping to Build China’s Surveillance State

Shenzhen-based Semptian is using the devices to enhance the capabilities of internet surveillance and censorship technology it provides to human rights-abusing security agencies in China, according to sources and documents.

NSA improperly collected US phone records in October, new documents show

NSA improperly collected US phone records in October, new documents show

The National Security Agency (NSA) improperly collected records on American phone calls and texts last year, according to new documents obtained and released by the American Civil Liberties Union (ACLU).The error occurred between Oct. 3 and Oct. 12, the documents show, and had not been previously disclosed.

885 Million Records Reportedly Leaked Online: Bank Transactions, Social Security Numbers, and More

885 Million Records Reportedly Leaked Online: Bank Transactions, Social Security Numbers, and More

Shoval told Krebs that the title agency had collected “all kinds of documents from both the buyer and seller, including Social Security numbers, drivers licenses, account statements, and even internal corporate documents if you’re a small business.” The records dated back to at least 2003, he said.

Bloomberg Appears To Flub Another China Story, Insists Telnet Is A Nefarious Huawei Backdoor

Bloomberg Appears To Flub Another China Story, Insists Telnet Is A Nefarious Huawei Backdoor

Europe’s biggest phone company identified hidden backdoors in the software that could have given Huawei unauthorized access to the carrier’s fixed-line network in Italy, a system that provides internet service to millions of homes and businesses, according to Vodafone’s security briefing documents from 2009 and 2011 seen by Bloomberg, as well as people involved in the situation.".

Judge Kills Lawsuit Over Mass Surveillance Programs

Judge Kills Lawsuit Over Mass Surveillance Programs

In his public ruling, White deemed inadequate the evidence plaintiffs submitted to support claims that the National Security Agency violated the Wiretap Act and the Electronic Communications Privacy Act. The public evidence included a 2003 document from a former AT&T technician detailing how the telecom giant routed internet traffic to a secret room at an AT&T facility in San Francisco controlled by the NSA.

Are the kids all right? These school surveillance apps sure want to tell you

Are the kids all right? These school surveillance apps sure want to tell you

Products like Securly and Gaggle, which surveil typically private online spaces like email accounts, documents, private calendars, and search histories and, unlike locker or backpack searches, can involve reaching into the documents and communications that a student creates while at home, sit on the extreme end of the spectrum of ways schools monitor and safeguard students.

Worried about Huawei? Take a closer look at Tencent

Worried about Huawei? Take a closer look at Tencent

International civil society groups can assist users and democratic governments by maintaining up-to-date digital security guides available in Chinese, documenting the extent to which content outside China is censored or monitored on WeChat and exploring legal recourse for those whose rights may have been violated by Tencent’s practices.

Google Chrome zero-day used in the wild to collect user data via PDF files

Google Chrome zero-day used in the wild to collect user data via PDF files

Image: Google A security firm said this week that it discovered malicious PDF documents exploiting a Google Chrome browser zero-day. The company said it spotted two distinct sets of malicious PDF files exploiting this Chrome zero-day, with one series of files being spread around in October 2017, and the second set in September 2018.

Government Hacking Tools Drive Records Demand

Government Hacking Tools Drive Records Demand

“The public has a right to know how and how often the government is exploiting security holes in our personal devices to access intimate information about us or surveil us, often without our knowledge.” Filed Friday in Buffalo, the 32-page complaint points to a Nov. 26 report titled “The FBI Created a Fake FedEx Website to Unmask a Cybercriminal.” Vice reported in the article that the FBI snared a scammer last year with a booby-trapped Word document that revealed the perpetrator’s IP address when opened.

AI-based lie detection system will screen travellers to EU for ‘biomarkers of deceit’

AI-based lie detection system will screen travellers to EU for ‘biomarkers of deceit’

iBorderCtrl provides a unified solution with aim to speed up the border crossing at the EU external borders and at the same time enhance the security and confidence regarding border control checks by bringing together many state of the art technologies (hardware and software) ranging from biometric verification, automated deception detection, document authentication and risk assessment.

Apple says its T2 chip can prevent hackers from eavesdropping through your MacBook mic

Apple says its T2 chip can prevent hackers from eavesdropping through your MacBook mic

In a new security document published today, and reported on first by TechCrunch, Apple is giving us a glimpse at some of the chip’s capabilities, specifically its ability to prevent hackers from eavesdropping through your laptop microphone.

Whonix and Tor Limitations

Whonix and Tor Limitations

For example, it is poor operational security to use the same Whonix-Workstation to check email via Tor, while simultaneously publishing an anonymous document. If a user selects a new entry and exit relay each time the Tor network is used, the attacker can correlate all traffic sent with a probability of (c/n)2.