Join 3,523 readers in helping fund MetaFilter (Hide)

196 posts tagged with nsa. (View popular tags)
Displaying 1 through 50 of 196. Subscribe:

Related tags:
+ (64)
+ (42)
+ (35)
+ (34)
+ (25)
+ (25)
+ (20)
+ (19)
+ (17)
+ (16)
+ (16)
+ (16)
+ (14)
+ (14)
+ (14)
+ (13)
+ (13)
+ (13)
+ (13)
+ (12)
+ (11)
+ (11)
+ (9)
+ (9)
+ (8)
+ (8)
+ (8)
+ (8)
+ (7)
+ (7)
+ (7)
+ (7)
+ (7)
+ (7)
+ (6)
+ (6)
+ (6)
+ (6)
+ (6)
+ (6)
+ (6)
+ (6)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)


Users that often use this tag:
anemone of the state (13)
Postroad (13)
homunculus (12)
digaman (9)
jeffburdges (5)
Sleeper (4)
zarq (3)
paleyellowwithorange (3)
the man of twists ... (3)
i_am_a_Jedi (3)
bukharin (3)
Noisy Pink Bubbles (3)
feckless fecal fea... (2)
TheLittlePrince (2)
scalefree (2)
whyareyouatriangle (2)
stoneweaver (2)
dunkadunc (2)
Naberius (2)
Pope Guilty (2)
lattiboy (2)
orthogonality (2)
amberglow (2)
Steven Den Beste (2)

HJ! BI....BI....BI...Hotshot!

Crypto machines.
posted by pjern on Aug 31, 2014 - 9 comments

What's the matter with PGP?

If your cryptography predates The Fresh Prince, you need better cryptography. With recognition of the need for secure communication standards finally going mainstream, crypto researcher and Johns Hopkins University professor Matthew Green takes a hard look at the de facto standard everyone is jumping on, and suggests that we can and should do a lot better. [more inside]
posted by George_Spiggott on Aug 25, 2014 - 22 comments

The most wanted man in the world

Edward Snowden - The Untold Story, from Wired's Threat Level.
posted by nevercalm on Aug 13, 2014 - 96 comments

From "Not The Onion"

NSA Tried To Delete Court Transcript In Lawsuit Over Deleting Evidence On three separate occasions in the Jewel V. NSA case, the NSA sought to delete evidence. Then it sought to redact the transcript.
posted by Sleeper on Aug 9, 2014 - 41 comments

Fashion Solutions for Hiding from SkyNet

In Anti-Surveillance Camouflage for Your Face, technology reporter Robinson Meyer details an experiment in which he tried actually going about his day to day life in downtown Washington DC while wearing CV Dazzle, (previously on MeFi) makeup and hairstyles to confuse facial recognition software. The technique is inspired by the old naval technique of dazzle camouflage, which sought not to conceal a ship, but to confuse viewers as to its size and heading. Similarly, CV Dazzle aims to confuse software by making your face look less like a face and more like a confusing collection of shapes. This proves to have unanticipated effects on how Robinson is perceived by humans as well, leading to insights about how our appearance signals our privilege and place in the social hierarchy, and how that can overlap or conflict with the digital wakes we leave.
posted by Naberius on Jul 24, 2014 - 78 comments

NSA spies on mainstream muslim US citizens

In one of the most damning Snowden leaks yet revealed, Glenn Greenwald and Murtaza Hussain show that the NSA targets prominent Muslim-Americans under the FISA secret court program. The Office of the Director of National Intelligence has in response issued a denial that any Americans were targeted for exercising their constitutional rights via its tumblr.
posted by p3on on Jul 9, 2014 - 93 comments

NSA gathers more data from non-targeted people than we thought.

In Snowden’s view, the PRISM and Upstream programs have “crossed the line of proportionality.” [SLWAPO] [more inside]
posted by feckless fecal fear mongering on Jul 6, 2014 - 58 comments

NSA: Linux Journal an 'extremist forum'

Use Linux or Tor? Search for information about online privacy? The NSA is keeping an eye on you [more inside]
posted by ryanshepard on Jul 3, 2014 - 56 comments

Don't Leak National Secrets Unless It's For Wall Street

"What could he possibly have that's worth $1 million a month other than classified information?" Former NSA head Keith Alexander goes directly into consulting for large financial associations, with a potential Congressional investigation to follow.
posted by blankdawn on Jul 2, 2014 - 44 comments

Hong Kong, on the ocean. Snowden and Greenwald, in Hong Kong.

In what early press reports call a "surprise vote" in a "late night session," the US House of Representatives voted to defund controversial NSA surveillance activities. [more inside]
posted by grobstein on Jun 20, 2014 - 57 comments

The Secret to Getting Top-Secret Secrets

How a journalist with a dark past learned to pry info from the government—and redeemed himself in the process.
posted by valkane on Jun 19, 2014 - 12 comments

spiegel has opened fire on the NSA

New NSA Revelations: Inside Snowden's Germany File [more inside]
posted by bukvich on Jun 19, 2014 - 48 comments

How difficult is it for the NSA to spy on your Internet use?

On a bright April morning in Menlo Park, California, I became an Internet spy. This was easier than it sounds because I had a willing target. I had partnered with National Public Radio (NPR) tech correspondent Steve Henn for an experiment in Internet surveillance. For one week, while Henn researched a story, he allowed himself to be watched—acting as a stand-in, in effect, for everyone who uses Internet-connected devices. How much of our lives do we really reveal simply by going online? Ars tests Internet surveillance—by spying on an NPR reporter.
posted by Johnny Wallflower on Jun 16, 2014 - 15 comments

I am the eye in the sky, looking at you, I can read your mind

Google just bought out skybox for $500MN. Skybox is a startup with grand amibitions: create cheap satellites which can be used to provide almost real time-time, sub one meter resolution imagery of earth. Even with six small satellites orbiting Earth, Skybox could provide practically real-time images of the same spot twice a day at a fraction of the current cost. The startup sent up its first satellite SkySat-1 last November. The satellite can provide HD images and videos (90 sec clips at 30 frames/second) The start-up hopes to combine its satellites with software which can analyze the visual data to collect information. It hopes that it can use its combination of hardware and software capabilities to gather real time information to estimate oil reserves in saudi Arabia, track fuel tankers in China's 3 main economic zones, rate of increase of electricity usage in India, number of cars in all wallmart parking lots. [more inside]
posted by TheLittlePrince on Jun 12, 2014 - 100 comments

NSA's SOMALGET recording every phone call in the Bahamas

The NSA is recording the audio of every phone call in the Bahamas and in another country which the article does not name "in response to specific, credible concerns that doing so could lead to increased violence." Previously
posted by Noisy Pink Bubbles on May 19, 2014 - 86 comments

Real title: I Am Infallible; You Are Lucky To Receive My Wisdom

James Mickens (previously) gives a talk at Monitorama 2014 about distributed computing and security.
posted by A dead Quaker on May 13, 2014 - 10 comments

Be it resolved state surveillance is a legitimate defence of our freedom

Alan Dershowitz and Michael Hayden (for); Glenn Greenwald and Alexis Ohanian against. Tonight. “I consider him and Alan Dershowitz” – the two men Mr. Greenwald, 47, will face at Friday’s Munk Debates – “two of the most pernicious human beings on the planet. I find them morally offensive. There’s an element of hypocrisy to being in the same room with them, treating them as if I have outward respect, because I don’t.” [more inside]
posted by whyareyouatriangle on May 2, 2014 - 282 comments

"An argument that has the characterizing flavor of bullshit."

The entire first episode of John Oliver's new current-events comedy show on HBO, Last Week Tonight, is viewable on its official YouTube Channel. [more inside]
posted by JHarris on Apr 28, 2014 - 99 comments

Pulitzer Prize Winners Announced.

The Washington Post and The Guardian won the Pulitzer Prize in public service for their reporting on the widespread domestic spying by the US National Security Agency. A full list of the mentioned articles can be found here for the Washington Post, and here for the Guardian. Edward Snowden, who supplied the journalists with the leaked information, today said: "Today's decision is a vindication for everyone who believes that the public has a role in government. We owe it to the efforts of the brave reporters and their colleagues who kept working in the face of extraordinary intimidation, including the forced destruction of journalistic materials, the inappropriate use of terrorism laws, and so many other means of pressure to get them to stop what the world now recognises was work of vital public importance." [more inside]
posted by MisantropicPainforest on Apr 14, 2014 - 36 comments

What if Google was a guy? The questions continue.

More visualizations of the personification of our favorite search engine - now with added competitors! [more inside]
posted by paleyellowwithorange on Mar 30, 2014 - 17 comments

NSA's MYSTIC and RETRO

New Snowden disclosures: "The National Security Agency has built a surveillance system capable of recording '100 percent' of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place." [more inside]
posted by Noisy Pink Bubbles on Mar 18, 2014 - 60 comments

Codename: TURBINE. Your computer may already be owned.

Top-secret documents reveal that an elite unit at the National Security Agency has developed technology allowing it to automatically install malware on millions of computers worldwide in what it calls 'industrial-scale exploitation'. TURBINE, developed by the NSA's Tailored Access Operations unit (mentioned previusly here), is a command-and-control suite automating tasks that previously had to be performed manually: Using 'internet chokepoints' and a capability called SECONDDATE, the NSA can perform man-in-the-middle attacks to quietly redirect web browsers to FOXACID malware servers en masse.
posted by anemone of the state on Mar 12, 2014 - 115 comments

RSA Conference security breach! View the evidence!

Stephen Colbert, as "Stephen Colbert" gave the closing keynote speech at the 2014 RSA Conference in San Francisco. While this speech has not been made officially available, it has been posted in its entirety to YouTube. Part 1, Part 2 [total length <20m] [warning - audience video of conference hall video screens -- content overcomes video shortcomings]
posted by hippybear on Mar 10, 2014 - 27 comments

Codename: ANTICRISIS GIRL

Top-secret documents published by The Intercept reveal how GCHQ and the National Security Agency have targeted Wikileaks and "the human network that supports Wikileaks", with tactics ranging from covert surveillance to prosecution, targeting The Pirate Bay and Anonymous, urging countries to file criminal charges against Julian Assange, and secretly logging visitors to the Wikileaks website. [more inside]
posted by anemone of the state on Feb 18, 2014 - 178 comments

The disillusionment of Edward Snowden

Edward Snowden was politically conservative, a gun owner, a geek - and the man behind the biggest intelligence leak in history. In an exclusive extract from Luke Harding's new book, The Snowden Files, Harding looks at Edward Snowden's journey from patriot to America's most wanted. In the second exclusive extract, Harding looks at the role of Russia's intelligence agency (the FSB) in securing Snowden's exile - and whether they have been able to access his secret files.
posted by paleyellowwithorange on Feb 12, 2014 - 84 comments

NSA operation ORCHESTRA: Annual Status Report (FOSDEM Keynote)

(TOP SECRET/COMINT) NSAs operation ORCHESTRA has been a resounding success again this year. This year's status report will update decision makers and programme liasons on the goals, achievements and means of ORCHESTRA. This is the NATO headquarters, right? Cool! No, no, I was just surprised that nobody was in uniform today, but I guess it's the weekend, eh? That's so cool -- I wish we were allowed to do that too. It's quite a crowd isn't it? I had no idea you had so many people with COMINT clearance over here... Amazing really. Anyway, lets get started, shall we? [more inside]
posted by Obscure Reference on Feb 12, 2014 - 21 comments

The Day We Fight Back

The Day We Fight Back is a protest against mass surveillance. "The SOPA and PIPA protests were successful because we all took part, as a community. As Aaron Swartz put it, everybody "made themselves the hero of their own story." We can set a date, but we need all of you, the users of the Internet, to make it a movement. [more inside]
posted by aniola on Feb 11, 2014 - 32 comments

Geo Cell: ‘We Track ’Em, You Whack ’Em.’

"The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people." - Scahill and Greenwald @ The Intercept [more inside]
posted by jeffburdges on Feb 10, 2014 - 77 comments

"Nothing. You're screwed."

During their Freedom Hosting investigation and malware attack last year, the FBI unintentionally obtained the entire e-mail database of popular anonymous webmail service Tor Mail. And now, they've used it in an unrelated investigation to bust a Florida man accused of stealing credit card numbers. [more inside]
posted by zarq on Jan 27, 2014 - 39 comments

Peekaboo--I see you!

In an interview with German television station ARD TV, Edward Snowden has alleged that the NSA is actively engaged in industrial espionage on behalf of US economic interests, targeting German engineering firm, Siemens and other international industrial concerns in its data collection activities, with no legitimate intelligence aims in mind. While the international response to the new allegations is still developing, back home in the US, Snowden has already been accused of disloyalty by US officials on both sides of the aisle, and at least one NSA analyst is on record stating he would personally "love to put a bullet in his head." (Previously)
posted by saulgoodman on Jan 27, 2014 - 90 comments

Alan Rusbridger reveals his personal secret to survival

"I take no exercise, drink and listen to the radio all night, and I play the piano." [more inside]
posted by rhombus on Jan 26, 2014 - 4 comments

Pond, et al.

Pond provides end-to-end encrypted forward-secure asynchronous messaging that uses Tor to resist traffic analysis, i.e. metadata collection (threat model, technical, github). [more inside]
posted by jeffburdges on Jan 21, 2014 - 24 comments

Plus ca change?

President Obama unveils new policy directives for the NSA. Full text of the speech. And for lols, here are some photos also from Slate.
posted by feckless fecal fear mongering on Jan 17, 2014 - 142 comments

Could Unlimited Phone Surveillance Have Prevented 9/11?

The FBI could have stopped 9/11. There was no need for a metadata-collection program. What was needed was cooperation with other federal agencies.
posted by paleyellowwithorange on Jan 12, 2014 - 57 comments

30c3

While Jacob Appelbaum grabbed headlines with his NSA revelations at this year's Chaos Communication Congress, other presentations provided equally fascinating insight into how the world works. Learn how data mining is bringing perpetrators of genocide to justice (alt), how an artist uses different concepts of secrecy landscapes (alt) to keep tabs on clandestine activities, and how India's surveillance state continues to grow (alt). previously [more inside]
posted by antonymous on Jan 4, 2014 - 23 comments

m01$tRoACh31!4

Passweird - Passwords too gross to steal. This website will create for you a password that is not only secure*, but is also so utterly repulsive that not even the most hardened criminal, identity thief, NSA agent, or jealous boyfriend would ever want to use it. *ish, but probably not. Don't use these for real.
posted by Rock Steady on Dec 30, 2013 - 28 comments

Digital Black-Bag Ops:

Der Spiegel reports on the NSA's "plumbers" at the Office of Tailored Access Operations, who collect and deploy exploits to infiltrate computers and even redirect shipments so they can install malware and hardware backdoors on electronics ordered by those they are targeting. Jacob Appelbaum [AKA ioerror] reports on the NSA's 'catalog', which ranges from $30 monitor cables that send back screenshots, to exploits for network security hardware from Cisco and Huawei, to backdoored BIOS code and firmware for all major hard drive manucfacturers. While some of the NSA's malware requires physical access or proximity, much of it is remotely installable over the Internet.

At the 30c3 conference in Hamburg, Appelbaum gives an in-depth talk about the NSA's Tailored Access Operations hacking activities and its 'interdiction' process, whereby computers are tampered with during shipping or as part of a 'black-bag' operation. Appelbaum, a Wikileaks affiliate who has reported on documents leaked by Edward Snowden, has been personally targeted by such operations, as have his family members.
posted by anemone of the state on Dec 30, 2013 - 201 comments

For everyone out there listening

Edward Snowden has delivered the UK Channel 4's Alternative Christmas Message (alternative links, transcript):
Together, we can find a better balance. End mass surveillance. And remind the government that if it really wants to know how we feel, asking is always cheaper than spying.
This address follows Monday's interview with the Washington Post in which he explains his motives for releasing information he collected while working for the NSA.
posted by Joe in Australia on Dec 24, 2013 - 93 comments

RSA Paid by the NSA to screw the USA

"Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show." Previous
posted by stoneweaver on Dec 20, 2013 - 74 comments

Historic ruling: NSA Mass Phone Surveillance Likely Unconstitutional

A federal judge in Washington, DC ruled today that the mass phone records surveillance revealed by whistleblower Edward Snowden is likely unconstitutional. [previously on Metafilter] Judge Leon wrote: “The question before me is not the same question that the Supreme Court confronted in Smith” and is “a far cry from the issue in this case.” [annotated by Spencer Ackerman, original PDF here.]
Journalist Glenn Greenwald, who broke the story, responds on MSNBC.
posted by anemone of the state on Dec 16, 2013 - 87 comments

The NSA Raven

Once upon a database query, while I pondered weak security,
And many avenues of access via backdoor,
While I nodded, nearly napping, suddenly there came a wiretapping,
As of some one gently sniffing, sniffing at our server's door.
“‘Tis some hacker,” I muttered, “tapping at our server door
Or just a virus, nothing more.” -- The NSA Raven
posted by Chocolate Pickle on Dec 11, 2013 - 9 comments

"People in power ... will routinely lie to their population,"

The Men Who Leaked The Secrets
To the likes of Brooks, Snowden was a disconcerting mystery; Glenn Greenwald, though, got him right away. "He had no power, no prestige, he grew up in a lower-middle-class family, totally obscure, totally ordinary," Greenwald says. "He didn't even have a high school diploma. But he was going to change the world – and I knew that." And, Greenwald also believed, so would he. "In all kinds of ways, my whole life has been in preparation for this moment," he says.
[more inside]
posted by the man of twists and turns on Dec 10, 2013 - 46 comments

It's coming just that much closer to reality

Curious as to what various legal and intelligence agencies can do with the data they are now currently collecting? They are collecting cell phone locations, there are currently license plate scanning vehicles in many larger cities, and Google Maps will gladly integrate with your location mapping systems to show you what type of business is at your coordinates. All state criminal databases are now nationally available. So the ACLU would like you to know what is going to happen in the possible near future.
posted by Purposeful Grimace on Dec 9, 2013 - 68 comments

Tech rivals unite against surveillance

Facebook, Google, Yahoo, Microsoft, Apple, LinkedIn and Aol have all teamed up to oppose widespread government surveillance. In an open letter to the US president and members of congress, the companies urge the government to reform its digital spy apparatus. Live reactions at the Guardian.
posted by brina on Dec 9, 2013 - 126 comments

Games are an opportunity!

CIA, FBI and Pentagon spies have infiltrated online games including World of Warcraft, Second Life and Xbox Live games.
posted by xowie on Dec 9, 2013 - 67 comments

Cell Phones: Tracking Devices That Make Phone Calls

The NSA is gathering nearly 5 billion cell phone location records a day, allowing the agency to track the movement of individuals and map their relationships in ways that would have been previously unimaginable. The bulk collection feeds CO-TRAVELER, an analytic tool that lets analysts identify relationships by tracking people whose movements intersect, and look back in time to see where people have been. TL:DR? The WaPo has a quick video explaining CO-TRAVELER here. [more inside]
posted by anemone of the state on Dec 4, 2013 - 134 comments

NSA SEXINT

NSA SEXINT is the Abuse You’ve All Been Waiting For. According to documents revealed by whistleblower Edward Snowden, the NSA has been gathering records of online sexual activity and logging visits to pornographic websites as part of a proposed plan to blackmail and silence those advocating "radical" beliefs.
posted by anemone of the state on Nov 29, 2013 - 156 comments

Chilling Effects: NSA Surveillance Drives U.S. Writers to Self-Censor

“I have dropped stories in the past and avoided research on the company telephone due to concerns over wiretapping or eavesdropping.”
“I have made a conscious, deliberate choice to avoid certain conversation topics in electronic emails out of concern that those communications may be surveilled.”
[PDF]
A survey by the literary organization PEN America shows the chilling effects NSA surveillance has had on writers in the United States.
posted by anemone of the state on Nov 12, 2013 - 39 comments

Privacy is not an end in itself

"In 1967, The Public Interest, then a leading venue for highbrow policy debate, published a provocative essay by Paul Baran, one of the fathers of the data transmission method known as packet switching [and agent of RAND]. Titled “The Future Computer Utility," the essay speculated that someday a few big, centralized computers would provide 'information processing … the same way one now buys electricity. Highly sensitive personal and important business information will be stored in many of the contemplated systems … At present, nothing more than trust—or, at best, a lack of technical sophistication—stands in the way of a would-be eavesdropper.' To read Baran’s essay (just one of the many on utility computing published at the time) is to realize that our contemporary privacy problem is not contemporary. It’s not just a consequence of Mark Zuckerberg’s selling his soul and our profiles to the NSA. The problem was recognized early on, and little was done about it... It’s not enough for a website to prompt us to decide who should see our data. Instead it should reawaken our own imaginations. Designed right, sites would not nudge citizens to either guard or share their private information but would reveal the hidden political dimensions to various acts of information sharing." -- MIT Technology Review on The Real Privacy Problem
posted by Potomac Avenue on Nov 12, 2013 - 17 comments

‘PRISM: The SIGAD Used *Most* in NSA Reports!’

How would you, as a junior analyst in S2C41, the branch of the Signals Intelligence Directorate, navigate the millions of records logged daily, in order to find the nugget to get you noticed? “EVILOLIVE, MADCAPOCELOT, ORANGECRUSH, COBALTFALCON, DARKTHUNDER: the names are beguiling. But they don’t always tell us much, which is their reason for existing: covernames aren’t classified, and many of them – including the names of the NSA’s main databases for intercepted communications data, MAINWAY, MARINA, PINWALE and NUCLEON – have been seen in public before, in job ads and resumés posted online.” Daniel Soar sorts through the possibilities in the London Review of Books, 24 Oct 2013. (See also William Arkin's blog on codenames) [more inside]
posted by zbsachs on Nov 4, 2013 - 33 comments

Page: 1 2 3 4