Post Reply
Page 4 of 4  •  Prev 1 2 3 4
12 months ago  ::  Jun 20, 2014 - 3:57AM #31
Karma_yeshe_dorje
Posts: 13,209

No such thing as privacy.

It has already been widely reported that the NSA works closely with eavesdropping agencies in the United Kingdom, Canada, New Zealand, and Australia as part of the so-called Five Eyes surveillance alliance. But the latest Snowden documents show that a number of other countries, described by the NSA as "third-party partners," are playing an increasingly important role – by secretly allowing the NSA to install surveillance equipment on their fiber-optic cables. The NSA documents state that under RAMPART-A, foreign partners "provide access to cables and host U.S. equipment." This allows the agency to covertly tap into "congestion points around the world" where it says it can intercept the content of phone calls, faxes, e-mails, internet chats, data from virtual private networks, and calls made using Voice over IP software like Skype.


yro.slashdot.org/story/14/06/19/2149244/...

Quick Reply
Cancel
12 months ago  ::  Jun 20, 2014 - 2:41PM #32
Karma_yeshe_dorje
Posts: 13,209

Yanks snoops a political liability!

The U.S. House of Representatives voted late Thursday night, 293 to 123, to approve an amendment to the NSA's appropriations bill that cuts all funding for warrantless surveillance and for programs that force companies to create backdoors in their products.


yro.slashdot.org/story/14/06/20/1220209/...

Quick Reply
Cancel
3 months ago  ::  Mar 11, 2015 - 11:51AM #33
Karma_yeshe_dorje
Posts: 13,209

Malware malware was written by a major institution in eastern Yankistan.

When researchers from Kaspersky Lab presented the Equation Group espionage malware, many in the security community were convinced it was part of an NSA operation. Now, Kaspersky has released new evidence that only strengthens those suspicions. In a code sample, they found a string named BACKSNARF_AB25, which happens to be the name of a project in the NSA's Tailored Access Operations. Further, when examining the metadata on the malware files, they found the modification timestamps were almost always consistent with an 8-5 workday in the UTC-3 or UTC-4 timezones, consistent with work based in the eastern United States. The authors also tended to work Monday through Friday, and not on the weekends, suggesting a large, organized development team.


it.slashdot.org/story/15/03/11/1325248/n...

Quick Reply
Cancel
Page 4 of 4  •  Prev 1 2 3 4
 
    Viewing this thread :: 0 registered and 1 guest
    No registered users viewing
    Advertisement

    Beliefnet On Facebook