Yahoo secretly scanned its users emails at the behest of a U.S. government agency — and now it wants the government to explain why. In a letter to James Clapper, the Director of National Intelligence, Yahoo carefully avoids admitting that it scanned users’ email or that it received an order to do so, but asks Clapper to “clarify this matter of public interest.” The program …
October 16, 2016
Business, infosec, lawful interception, nsa, Post, rootkits, Security, sic semper idioticus, surveillance, telcoms, Uncategorized, Verizon, yahoo
What do you do if your ailing internet giant has been outed for losing, and then keeping silent about, 500 million user accounts, then letting American spy agencies install a rootkit on its mail service, possibly scuttling its impending, hail-mary acquisition by a risk-averse, old economy phone company? Just cancel your investor call and with it, any chance of awkward, on-the-record questions. (via /.)
5 companies now control 80% of America’s contracted spying / Boing Boing America paid about $16 billion to five companies last year for 80% of our contracted domestic and international surveillance: Leidos Holdings, CSRA Inc., SAIC, CACI International, and Booz Allen Hamilton, recently in the news following an employee arrest on cyberweapons theft charges.
Tim Shorrock at The Nation did the legwork to to …
October 4, 2016
Business, collaborators, FBI, feebs, lawful interception, leaks, nsa, Post, spooks, Uncategorized, yahoo
In 2015, Yahoo CEO Marissa Meyer ordered the company’s engineers to build a tool that scanned Yahoo Mail messages in realtime for “characters” of interest to a US security agency, either the FBI or the NSA.
As far as we know, the move was unprecedented in US tech history, and it triggered the departure of then-CSO Alex Stamos (previously), now CSO for …
August 21, 2016
computer science, cyberweapons, equation group, floss, infosec, nsa, Post, Security, security through obscurity, shadow brokers, spooks, Uncategorized
With the leak of exploits developed by The Equation Group, the long-secret, NSA-adjacent super-elite hacking squad — published by The Shadow Brokers, who have some extremely heterodox theories about auction design — it’s now possible to audit the source code of some of the NSA’s crown-jewel cyberweapons.
Enter Stephen Checkoway from the Computer Science department at the University of Illinois at Chicago (previously, …
August 17, 2016
cyberwar, equation group, hacking, nsa, Post, russia, shadow brokers, spying, surveillance, Uncategorized
As our Cory Doctorow reported previously, a previously unheard of hacker group calling themselves The Shadow Brokers announced this week it had stolen a trove of ready-to-use cyber weapons from The Equation Group (previously), an advanced cyberweapons dealer believed to be operating on behalf of, or within, the NSA.
The Shadow Brokers are auctioning the weaponized malware off to the …
August 16, 2016
arms dealers, infosec, malware, nsa, Post, say cyber again, Security, snowden, spooks, twitter, Uncategorized
The news that a group of anonymous hackers claimed to have stolen some of the NSA’s most secret, valuable weaponized vulnerabilities and were auctioning them off for bitcoin triggered an epic tweetstorm from Edward Snowden, who sets out his hypothesis for how the exploits were captured and what relation that has to the revelations he made when he blew the whistle on illegal NSA …