NSA cant crack common encryption software top hacker concludes

Etihad passenger stranded in Thailand for several days to fly home on Friday

The National - Wednesday 7th January, 2015

ABU DHABI // A British tourist stranded in Thailand since Saturday because of fog at Abu Dhabi International Airport is finally flying home tomorrow with an upgrade to business class.Wayne ...

The Nation - Wednesday 7th January, 2015

Prime Minister Prayut Chan-o-cha has received more than 1,000 greeting cards from children, youths and adults, which him happy on the New Year ...

The Nation - Wednesday 7th January, 2015

The United Front of Democracy against Dictatorship and other red-shirt groups will not hold a rally at Parliament on Thursday and Friday, former Pheu Thai MP and red-shirt leader Worachai Hema said ...

The Nation - Wednesday 7th January, 2015

Prime Minister Prayut Chan-o-cha has instructed officials to put up his life-sized photo at the Government House on National Children's Day this Saturday for children to post for photos with if ...

The Nation - Wednesday 7th January, 2015

Read more here:

NSA cant crack common encryption software top hacker concludes

Posted in NSA

Edward Snowden Robot promises more NSA spying revelations

Edward Snowden appears by robot at a TED conference in Vancouver. Photo: AFP

Former intelligence contractor Edward Snowden has emerged from his Russian exile in the form of a remotely-controlled robot to promise more sensational revelations about US spying programs.

The fugitive's face appeared on a screen as he manoeuvred the wheeled android around a stage at the TED gathering, addressing an audience in Vancouver without ever leaving his secret hideaway.

"There are absolutely more revelations to come," he said. "Some of the most important reporting to be done is yet to come."

Advertisement

Snowden, a former National Security Agency (NSA) contractor who has been charged in the United States with espionage, dismissed the public debate about whether he is a heroic whistleblower or traitor.

Instead, he used the conference organised by educational non-profit organisation TED, or Technology Entertainment Design, to call for people worldwide to fight for privacy and internet freedom.

Internet creator Tim Berners-Lee briefly joined Snowden's interview with TED curator Chris Anderson, and came down in the hero camp.

When Anderson posed the question to the TED audience known for famous, innovative, and influential attendees the idea that Snowden was a force for good met with applause.

Hero or traitor?

Go here to see the original:

Edward Snowden Robot promises more NSA spying revelations

Posted in NSA

NSA: China has ability to shut down U.S. power grid (Second Coming Watch Update #538) – Video


NSA: China has ability to shut down U.S. power grid (Second Coming Watch Update #538)
NSA says China, 1 or 2 other countries have capacity to shut down U.S. power grid... Russia warns U.S. against supplying arms to Ukrainian forces... U.N. say...

By: Gospel Light Society International

Read the original:

NSA: China has ability to shut down U.S. power grid (Second Coming Watch Update #538) - Video

Posted in NSA

DEF CON 22 – Joe FitzPatrick and Miles Crabill – NSA Playset: PCIe – Video


DEF CON 22 - Joe FitzPatrick and Miles Crabill - NSA Playset: PCIe
Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Fitzpatrick-Crabill/DEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe.pdf NSA Playset: PCIe Joe FitzPatrick...

By: DEFCONConference

Continue reading here:

DEF CON 22 - Joe FitzPatrick and Miles Crabill - NSA Playset: PCIe - Video

Posted in NSA

Secret code indicates NSA tracks users of privacy tools, report says

A NSA spying tool is configured to snoop on an array of privacy programs used by journalists and dissidents, according to an analysis of never-before-seen code leaked by an unknown source.

The code, published as part of investigation by two German broadcasters on Thursday, contains tracking specifications for XKeyScore, a powerful NSA program that collects and sorts intercepted data.

XKeyScore came to light in documents leaked by former NSA contractor Edward Snowden, but some observers believe the latest information -- which adds greater detail on how the agency monitors people trying to protect their privacy online -- may have not come from the documents he passed to journalists.

The broadcasters, Norddeutscher Rundfunk and Westdeutscher Rundfunk, did not reveal their source for the code but claimed in a report that former NSA employees and experts "are convinced that the same code or similar code is still in use today,"

The report describes how the code enables XKeyScore to track users connected to The Onion Router, known as TOR, a network that encrypts data traffic through random servers in order to obscure identification of a web surfer.

TOR, a project initially started by the U.S. Navy, is considered a critical privacy enhancing tool and one that has hampered NSA surveillance in the past.

The report contends the NSA is monitoring two TOR servers in Germany. One is run by Sebastian Hahn, a 28-year-old computer science student at the University of Erlangen. The server, known as a Directory Authority, a critical part of TOR's infrastructure, supplies a list of relays in the network to computers connecting to the network.

The NSA's collection of metadata about people connecting to the server puts those people at risk, the report quoted Hahn as saying.

The NSA also tracks the use of non-public TOR relays, which are supplied to users upon request in countries known to actively block TOR relays, such as in China and Iran, the report said.

Other rules in the code indicate the agency is tracking people who visit public websites for privacy-related projects including the TOR Project; Tails, a privacy-focused portable operating system; and the Linux Journal website, the report alleged.

View original post here:

Secret code indicates NSA tracks users of privacy tools, report says

Posted in NSA

CIA NSA Stalls Torture Report Until Friendly GOP Senator Becomes Chair – Video


CIA NSA Stalls Torture Report Until Friendly GOP Senator Becomes Chair
More videos at : http://www.youtube.com/user/THEINFOSWARRIORS topic in the chain : Bolshevism Gaza Genocide Iran Iraq Israel Jew World Order Jews Libya Max Igan middle east Neocons ...

By: Alex Jones Best Off

Read the original:

CIA NSA Stalls Torture Report Until Friendly GOP Senator Becomes Chair - Video

Posted in NSA

NSA overhaul may require phone carriers to store more data

Barack Obama: Spying reforms could force US telcos to collect more data. Photo: Reuters

US President Barack Obama's plan for overhauling the National Security Agency's phone surveillance program could force American telcos to collect and store customer data that they are not currently legally obliged to keep, officials say.

One complication arises from the popularity of flat-rate or unlimited calling plans, which are used by the vast majority of Americans.

While the US Federal Communications Commission requires phone companies to retain records on "toll" or long-distance calls for 18 months, the rule's application is vague for subscribers of unlimited phone plans because they do not get billed for individual calls.

Advertisement

That could change if the Obama administration pushes through with a proposal to require carriers instead of the NSA to collect and store phone metadata, which includes dialled numbers and call lengths but not the content of conversations. Under the proposal, phone companies would be required to turn over the data to the NSA in response to a court-approved government request.

US officials said the carriers might be forced to create new mechanisms to ensure metadata from flat-rate subscribers could be monitored. They said these issues will require further discussion between the White House, Congress and industry.

"These are very complex systems," said one industry source familiar with data storage policies. "I doubt there are companies out there that have a nice, neat, single database that can tell you how long records are kept universally."

To great fanfare last month, the Obama administration unveiled a proposal to end the NSA's bulk collection of millions of records of phone calls. But the announcement glossed over key practical issues in implementing the new procedures.

The potential gap in records for flat-rate subscribers, as well as the telcos' strong opposition to onerous data retention requirements, underscores the still-fluid nature of the NSA reforms.

Read this article:

NSA overhaul may require phone carriers to store more data

Posted in NSA

NSA's penetration of RSA security was two-pronged: researchers

Infiltrated: Two NSA tools exacerbated the RSA software's vulnerability. Photo: Reuters

Security industry pioneer RSA adopted not just one but two encryption tools developed by the US National Security Agency (NSA), greatly increasing the spy agency's ability to eavesdrop on some internet communications, according to researchers.

In December it was reported the NSA had paid RSA $US10 million ($10,800,000) to make a now-discredited cryptography system the default in software used by a wide range of internet and computer security programs. The system, called Dual Elliptic Curve, was a random-number generator, but it had a deliberate flaw or "back door" that allowed the NSA to crack the encryption.

A group of professors from Johns Hopkins, the University of Wisconsin, the University of Illinois and elsewhere now say they have discovered that a second NSA tool exacerbated the RSA software's vulnerability.

The professors found that the tool, known as the Extended Random extension for secure websites, could help crack a version of RSA's Dual Elliptic Curve software tens of thousands of times faster, according to an advance copy of their research shared with Reuters.

Advertisement

While Extended Random was not widely adopted, the new research sheds light on how the NSA extended the reach of its surveillance under cover of advising companies on protection.

RSA, now owned by EMC, did not dispute the research when contacted by Reuters for comment. The company said it had not intentionally weakened security on any product and noted that Extended Random did not prove popular and had been removed from RSA's protection software in the past six months.

"We could have been more sceptical of NSA's intentions," RSA chief technologist Sam Curry said. "We trusted them because they are charged with security for the US government and US critical infrastructure."

Mr Curry declined to say if the government had paid RSA to incorporate Extended Random in its BSafe security kit, which also housed Dual Elliptic Curve.

Read this article:

NSA's penetration of RSA security was two-pronged: researchers

Posted in NSA