Daily Archives: February 17, 2015

NSA hiding Equation spy program on hard drives

Posted: February 17, 2015 at 6:49 am

Kaspersky Labs

Equation infection: Kaspersky Labs says the highest number of machines infected with Equation programs were in Iran, Russia and Pakistan.

The US National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber researchers and former operatives.

That long-sought and closely guarded ability was part of a cluster of spying programs discovered by Kaspersky Lab, the Moscow-based security software maker that has exposed a series of Western cyberespionage operations.

Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria. The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said.

Kaspersky Labs

The areas of government Equation has been able to infect by nation.

The firm declined to publicly name the country behind the spying campaign, but said it was closely linked to Stuxnet, the NSA-led cyberweapon that was used to attack Iran's uranium enrichment facility. The NSA is the agency responsible for gathering electronic intelligence on behalf of the United States.

A former NSA employee told Reuters that Kaspersky's analysis was correct, and that people still in the intelligence agency valued these spying programs as highly as Stuxnet. Another former intelligence operative confirmed that the NSA had developed the prized technique of concealing spyware in hard drives, but said he did not know which spy efforts relied on it.

NSA spokeswoman Vanee Vines declined to comment.

Go here to see the original:
NSA hiding Equation spy program on hard drives

Posted in NSA | Comments Off on NSA hiding Equation spy program on hard drives

Volokh Conspiracy: No cell phone warrants without search protocols, magistrate judge rules

Posted: at 6:48 am

The Fourth Amendment says that warrants must state where the government will search and what evidence the government will seize. In recent years, some federal magistrate judges, when asked to sign warrants for computer searches, have began imposing a new third requirement: limits on how computers can be searched. As I wrote in this 2010 article, I dont think such limits are permissible. In my view, questions about how a computer is searched must be reviewed after the search in adversarial litigation challenging its reasonableness, rather than guessed at beforehand and written into the warrant by an individual magistrate judge.

At present, however, there isnt much in the way of caselaw on which side is right. Theres a ton of circuit precedent saying that search protocols are not required. But theres only one appellate case on whether they are permitted, a Vermont Supreme Court case which concluded that that some restrictions are permitted but others arent. No Article III court has yet ruled on the question.

In light of that ongoing debate, I thought I would flag a recent opinion by Magistrate Judge David Waxse in Kansas, In the Matter of the Search of Cellular Telephones within Evidence Facility Drug Enforcement Administration, Kansas City District Office. The opinion rejects an application for a warrant to search cell phones in DEA custody because the investigators refused to provide the court with a search protocol. If the government seeks review, it may generate the first Article III precedent that grapples with whether such restrictions are permitted. (The case happens to involve cell phones, but there is no Fourth Amendment difference between a cell phone search and any other computer search.)

Waxses opinion is pretty unusual. It includes a long section titled Applying Constitutional Protections in the Digital Era that offers an interesting theoretical account of the role of precedent. According to Waxse, magistrate judges should not be overly beholden to Supreme Court precedent when technology changes:

With technological developments moving at such a rapid pace, Supreme Court precedent is and will inevitably continue to be absent with regard to many issues district courts encounter. As a result, an observable gap has arisen between the well-established rules lower courts have and the ones they need in the realm of technology. Courts cannot, however, allow the existence of that gap to infiltrate their decisions in a way that compromises the integrity and objectives of the Fourth Amendment. . . . The danger, of course, is that courts will rely on inapt analogical reasoning and outdated precedent to reach their decisions. To avoid this potential pitfall, courts must be aware of the danger and strive to avoid it by resisting the temptation to rationalize the application of ill-fitting precedent to circumstances.

Judge Waxse then concludes, relying heavily on the reasoning of the Vermont Supreme Court, that he has the authority to deny applications for computer warrants unless they detail how the search will be executed. Although the Supreme Court has indicated that the reasonableness of a warrant execution should be reviewed ex post, not ex ante, Waxse concludes that its more efficient to have the review occur ex ante:

The fact of the matter is that a court is attempting to avoid entirely the harm that ex post remedies are meant to assuage. By only deciding reasonableness of the governments actions ex post, the government not only possesses a substantial portion of an individuals private life, but it also fails to prevent a person from having to defend against subsequent unreasonable searches stemming from the initial search and seizure. Requiring search protocol in a warrant allows the court to more effectively fulfill its duty to render, as the Supreme Court put it, a deliberate, impartial judgment as to the constitutionality of the proposed search, thus avoiding the need for ex post remedies resulting from an unconstitutional search.

He concludes:

If the Court were to authorize this warrant, it would be contradicting the manifest purpose of the Fourth Amendment particularity requirement, which is to prevent general searches. Given the substantial amount of data collected by the government upon searching or seizing a cell phone, as discussed in Riley, requesting an unrestricted search is tantamount to requesting disclosure of a vast array of intimate details of an individuals private life. For the reasons discussed in this opinion, to issue this warrant would swing the balance between an individuals right to privacy and the governments ability to effectively investigate and prosecute crimes too far in favor of the government.

Accordingly, the Court again finds that an explanation of the governments search techniques is being required in order to determine whether the government is executing its search in both good faith and in compliance with the Fourth Amendment. The Court does not believe that this request will overburden the government. In fact, in Riley, the government advocated and it can be concluded that the Supreme Court endorsed the implementation of search protocols: Alternatively, the Government proposes that law enforcement agencies develop protocols to address concerns raised by cloud computing. Probably a good idea, but the Founders did not fight a revolution to gain the right to government agency protocols.

More:
Volokh Conspiracy: No cell phone warrants without search protocols, magistrate judge rules

Posted in Fourth Amendment | Comments Off on Volokh Conspiracy: No cell phone warrants without search protocols, magistrate judge rules

Privacy advocates want amendment to protect personal data

Posted: at 6:48 am

Privacy advocates are pushing to allow Minnesota voters to decide whether their electronic communication should be protected from unreasonable search and seizure.

A bipartisan group of lawmakers and political organizations is encouraging the Legislature to put the question on the 2016 ballot.

State Rep. Peggy Scott, R-Andover, worries that law enforcement is overstepping its authority in acquiring data like financial and telecommunications records without getting search warrants.

"If data was what it is today if it would have been that way back when the constitution was being written I believe they would have included a person's technological communications as part of those things that would have been protected by the Fourth Amendment," Scott said.

A committee in the Republican-controlled House has scheduled a hearing on the bill this week. No committee hearing is scheduled in the Senate and DFL Senate Majority Leader Tom Bakk said he's reluctant to put any measures on the ballot next year.

"I think it would be unlikely that we're going to consider something additional for the ballot in 2016," Bakk said. "It's a conversation that I haven't had with the speaker yet if they have any interest to propose something."

Privacy issues are a major theme at the Capitol this year. There are also discussions about the privacy implications of police body cameras and police use of license plate readers.

Go here to read the rest:
Privacy advocates want amendment to protect personal data

Posted in Fourth Amendment | Comments Off on Privacy advocates want amendment to protect personal data

Jeremy Gardner – College Cryptocurrency Network [EN] – Video

Posted: at 6:47 am


Jeremy Gardner - College Cryptocurrency Network [EN]
http://bitcoinet.pl.

By: bitcoinet

Read this article:
Jeremy Gardner - College Cryptocurrency Network [EN] - Video

Posted in Cryptocurrency | Comments Off on Jeremy Gardner – College Cryptocurrency Network [EN] – Video

Silver Gold & Bitcoin Drop as Colecta Cryto-SCAM Expands w/ Davincij15 – Video

Posted: at 6:47 am


Silver Gold Bitcoin Drop as Colecta Cryto-SCAM Expands w/ Davincij15
Free Trading Strategies @ http://www.connectingdots1.com/ "Colecta is almost a Crypto Currency Mutual Fund"..ya right BS! It #39;s rather just another Illuminati...

By: connectingdots3

More here:
Silver Gold & Bitcoin Drop as Colecta Cryto-SCAM Expands w/ Davincij15 - Video

Posted in Bitcoin | Comments Off on Silver Gold & Bitcoin Drop as Colecta Cryto-SCAM Expands w/ Davincij15 – Video

Mining Bitcoin with Excel – Video

Posted: at 6:47 am


Mining Bitcoin with Excel
Learn how to mine Bitcoin with an Excel spreadsheet. We explain the algorithm behind Bitcoin mining and show you how you could (in theory) do it yourself! Download the spreadsheet here: https://w...

By: Knowledge

Originally posted here:
Mining Bitcoin with Excel - Video

Posted in Bitcoin | Comments Off on Mining Bitcoin with Excel – Video

Bitcoin Online Wallet – A Quick Way to Get Started With Bitcoin – Video

Posted: at 6:47 am


Bitcoin Online Wallet - A Quick Way to Get Started With Bitcoin
http://www.bitcoinreport.info - Bitcoin Online Wallet There are four types of Bitcoin wallet - online, mobile, desktop and offline. When using the description "Bitcoin online wallet" we usually...

By: David MacGregor

See the rest here:
Bitcoin Online Wallet - A Quick Way to Get Started With Bitcoin - Video

Posted in Bitcoin | Comments Off on Bitcoin Online Wallet – A Quick Way to Get Started With Bitcoin – Video

Buy Bitcoin With a Credit Card – Video

Posted: at 6:47 am


Buy Bitcoin With a Credit Card
http://www.bitcoinreport.info - Buy Bitcoin With a Credit Card The most common way of buying Bitcoin is to do so using a trading exchange. But this takes a bit of time. So if you #39;re in a hurry...

By: David MacGregor

More here:
Buy Bitcoin With a Credit Card - Video

Posted in Bitcoin | Comments Off on Buy Bitcoin With a Credit Card – Video

Andreas M. Antonopoulos – The Potential of Blockchain Technology 2 – The Bitcoin Address – Video

Posted: at 6:47 am


Andreas M. Antonopoulos - The Potential of Blockchain Technology 2 - The Bitcoin Address
Andreas Antonopoulos talks about Bitcoin, the blockchain and Smart contracts at the Melbourne Bitcoin Technology Center (Full). (coworking.biz) Brought to yo...

By: Technology Videos

Read more from the original source:
Andreas M. Antonopoulos - The Potential of Blockchain Technology 2 - The Bitcoin Address - Video

Posted in Bitcoin | Comments Off on Andreas M. Antonopoulos – The Potential of Blockchain Technology 2 – The Bitcoin Address – Video

Bitcoin Rush 35 w/ NavajoCoin, CryptoTraders, Tim Frost, ShapeShift, BitcoinJobMarket,TheOpenMinute – Video

Posted: at 6:47 am


Bitcoin Rush 35 w/ NavajoCoin, CryptoTraders, Tim Frost, ShapeShift, BitcoinJobMarket,TheOpenMinute
NavajoCoin: http://www.navajocoin.org / http://www.navajocoin.org/about CryptoTraders: http://twitter.com/CryptoTraders / cryptotraders@xs4all.nl Tim Frost: http://twitter.com/coinproz / http://tec...

By: World Crypto Network

See the rest here:
Bitcoin Rush 35 w/ NavajoCoin, CryptoTraders, Tim Frost, ShapeShift, BitcoinJobMarket,TheOpenMinute - Video

Posted in Bitcoin | Comments Off on Bitcoin Rush 35 w/ NavajoCoin, CryptoTraders, Tim Frost, ShapeShift, BitcoinJobMarket,TheOpenMinute – Video