10 posts tagged with gchq.
Displaying 1 through 10 of 10. Subscribe:

Of course I'd like to sit around and chat... but someone's listening in

Fresh from The Intercept (that fearless vanguard of journalism helmed by Glenn Greenwald and Laura Poitras): disturbing documents exposing the unfathomable reach of the United Kingdom's GCHQ in its quest for total awareness of global internet traffic. A hundred billion user actions logged per day. A "Black Hole" database of 1.1 trillion logs. Frightening programs like KARMA POLICE, MEMORY HOLE, and MUTANT BROTH that correlate the kilo-crore corpus -- IP addresses, cookies, forum posts, search histories, emails, and passwords all compiled and cross-referenced into a real-time "diary" that gives penetrating insight into the relationships, beliefs, and desires of every web user on the planet. Internal documents suggest only widespread encryption can threaten the regime -- a movement the UK is determined to subdue (previously). [more inside]
posted by Rhaomi on Sep 26, 2015 - 104 comments

GCHQ and Me

My Life Unmasking British Eavesdroppers. [more inside]
posted by ellieBOA on Aug 20, 2015 - 14 comments

Ha ha ha “Security to be Free” ha ha ha

The Great SIM Heist
American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys.
In all, Gemalto produces some 2 billion SIM cards a year.
posted by adamvasco on Feb 20, 2015 - 82 comments

MI5, MI6 and GCHQ 'spied on lawyers', breached lawyer-client privilege

British intelligence agencies have policies allowing staff to access confidential communications between lawyers and their clients, official documents have revealed. The guidance was disclosed for the first time at a tribunal which examines complaints against MI5, MI6 and GCHQ.
posted by marienbad on Nov 6, 2014 - 13 comments

The *first* revelation this week, at least

This week's Glenn Greenwald revelation is that Britain's GCHQ JTRIG intelligence organization offers its agents and planners tools with abilities to increase the search ranking of chosen web sites, “change outcome of online polls”, “masquerade Facebook Wall Posts for individuals or entire countries”, and accomplish “amplification of a given message, normally video, on popular multimedia websites (Youtube).” [more inside]
posted by XMLicious on Jul 16, 2014 - 54 comments

Psychology: A New Kind of SIGDEV

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable.
posted by the young rope-rider on Feb 25, 2014 - 137 comments


Top-secret documents published by The Intercept reveal how GCHQ and the National Security Agency have targeted Wikileaks and "the human network that supports Wikileaks", with tactics ranging from covert surveillance to prosecution, targeting The Pirate Bay and Anonymous, urging countries to file criminal charges against Julian Assange, and secretly logging visitors to the Wikileaks website. [more inside]
posted by anemone of the state on Feb 18, 2014 - 178 comments

Alan Rusbridger reveals his personal secret to survival

"I take no exercise, drink and listen to the radio all night, and I play the piano." [more inside]
posted by rhombus on Jan 26, 2014 - 4 comments

Digital Black-Bag Ops:

Der Spiegel reports on the NSA's "plumbers" at the Office of Tailored Access Operations, who collect and deploy exploits to infiltrate computers and even redirect shipments so they can install malware and hardware backdoors on electronics ordered by those they are targeting. Jacob Appelbaum [AKA ioerror] reports on the NSA's 'catalog', which ranges from $30 monitor cables that send back screenshots, to exploits for network security hardware from Cisco and Huawei, to backdoored BIOS code and firmware for all major hard drive manucfacturers. While some of the NSA's malware requires physical access or proximity, much of it is remotely installable over the Internet.

At the 30c3 conference in Hamburg, Appelbaum gives an in-depth talk about the NSA's Tailored Access Operations hacking activities and its 'interdiction' process, whereby computers are tampered with during shipping or as part of a 'black-bag' operation. Appelbaum, a Wikileaks affiliate who has reported on documents leaked by Edward Snowden, has been personally targeted by such operations, as have his family members.
posted by anemone of the state on Dec 30, 2013 - 201 comments

To make journalism harder, slower, less secure

"Making journalism harder, slower and less secure, throwing sand in the gears, is fully within the capacity of the surveillance state. It has the means, the will and the latitude to go after journalism the way it went after terrorism... Only if they can turn a mostly passive public into a more active one can journalists come out ahead in this fight. I know they don’t think of mobilization as their job, and there are good reasons for that, but they didn’t think editors would be destroying hard drives under the gaze of the authorities, either! Journalism almost has to be brought closer to activism to stand a chance of prevailing in its current struggle with the state." [more inside]
posted by felch on Aug 27, 2013 - 32 comments

Page: 1