Post Reply
Page 3 of 3  •  Prev 1 2 3
4 months ago  ::  Jan 02, 2014 - 7:34PM #21
Karma_yeshe_dorje
Posts: 11,678

Fingerprinting machines for compromise.

The German publication Der Spiegel says the documents indicated the NSA uses its XKeyscore tool to intercept the Windows crash reports. Making matters worse, the reports are sent unencrypted to Microsoft and Windows machines post-XP have this feature turned on by default. Windows admins must change a Group Policy setting in order to force encryption upon the initial transmission.


threatpost.com/unencrypted-windows-error...

Quick Reply
Cancel
3 months ago  ::  Jan 17, 2014 - 1:04AM #22
Karma_yeshe_dorje
Posts: 11,678

Dishfire grabs everything it can!

The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents.


www.theguardian.com/world/2014/jan/16/ns...

Quick Reply
Cancel
3 months ago  ::  Jan 27, 2014 - 10:44AM #23
Karma_yeshe_dorje
Posts: 11,678

Industrial espionage!

"If there's information at Siemens that's beneficial to U.S. national interests — even if it doesn't have anything to do with national security  — then they'll take that information nevertheless," Snowden said, according to ARD, which recorded the interview in Russia where he has claimed asylum.


www.cbc.ca/news/world/edward-snowden-say...

Quick Reply
Cancel
3 months ago  ::  Jan 27, 2014 - 7:27PM #24
Karma_yeshe_dorje
Posts: 11,678

Networked personal data.

The NSA and Britain's Government Communications Headquarters were working together on how to collect and store data from dozens of smartphone apps by 2007, according to the documents, provided by former NSA contractor Edward Snowden. Since then, the agencies have traded recipes for grabbing location and planning data when a target uses Google Maps, and for vacuuming up address books, buddy lists, phone logs and the geographic data embedded in photos when someone sends a post to the mobile versions of Facebook, Flickr, LinkedIn, Twitter and other services.


www.canberratimes.com.au/it-pro/security...

Quick Reply
Cancel
3 months ago  ::  Jan 28, 2014 - 12:54AM #25
Karma_yeshe_dorje
Posts: 11,678

What happens when you install an Android app.

Depending on what profile information a user had supplied, the documents suggested, the agency would be able to collect almost every key detail of a user's life: including home country, current location (through geolocation), age, gender, zip code, martial status – options included "single", "married", "divorced", "swinger" and more – income, ethnicity, sexual orientation, education level, and number of children.


www.theguardian.com/world/2014/jan/27/ns...

Quick Reply
Cancel
3 months ago  ::  Jan 28, 2014 - 10:38AM #26
Karma_yeshe_dorje
Posts: 11,678

Why not to use a smartphone.

Stated simply: any iOS app has complete access to a large amount of data stored on your iPhone, including your address book and calendar. Any iOS app can, without asking for your permission, upload all of the information stored in your address book to its servers.


www.theverge.com/2012/2/14/2798008/ios-a...

Quick Reply
Cancel
3 months ago  ::  Jan 30, 2014 - 5:56PM #27
Karma_yeshe_dorje
Posts: 11,678

It's only money!

Officials at the Consumer Financial Protection Bureau are conducting a massive, NSA-esque data-mining project collecting account information on an estimated 991 million American credit card accounts.


It was also learned at a Congressional hearing Tuesday that CFPB officials are working with the Federal Housing Finance Agency on a second data-mining effort, this one focused on the 53 million residential mortgages taken out by Americans since 1998.


washingtonexaminer.com/consumer-bureau-d...

Quick Reply
Cancel
3 months ago  ::  Feb 07, 2014 - 11:30AM #28
Karma_yeshe_dorje
Posts: 11,678
UK government attacks Internet Relay Chat.

While QuakeNet does not condone or endorse and actively forbids any illegal activity on its servers we encourage discussion on all topics including political and social commentary. It is apparent now that engaging in such topics with an opinion contrary to that of the intelligence agencies is sufficient to make people a target for monitoring, coercion and denial of access to communications platforms. The released documents depict GCHQ operatives engaging in social engineering of IRC users to entrap themselves by encouraging the target to leak details about their location as well as wholesale attacks on the IRC servers hosting the network.


tech.slashdot.org/story/14/02/06/1734255...

Quick Reply
Cancel
Page 3 of 3  •  Prev 1 2 3
 
    Viewing this thread :: 0 registered and 1 guest
    No registered users viewing
    Advertisement

    Beliefnet On Facebook