Monthly Archives: February 2015

Bulgaria: ‘NATO out!’ Protesters denounce ‘barbaric US bases’ – Video

Posted: February 17, 2015 at 6:49 am


Bulgaria: #39;NATO out! #39; Protesters denounce #39;barbaric US bases #39;
Protesters hit the streets of Sofia, Sunday to denounce NATO #39;s presence on Bulgarian soil and show solidarity with the self-proclaimed Donetsk People #39;s Republic. ---------------------------------...

By: RuptlyTV

Read the original:
Bulgaria: 'NATO out!' Protesters denounce 'barbaric US bases' - Video

Posted in NATO | Comments Off on Bulgaria: ‘NATO out!’ Protesters denounce ‘barbaric US bases’ – Video

NATO: posture and developments in 2014 – Video

Posted: at 6:49 am


NATO: posture and developments in 2014
The Military Balance has its origins in the Cold War standoff between NATO and the former Soviet Union, and as the 2015 edition discusses, the past year has seen NATO in some senses return...

By: The IISS

Read the original:
NATO: posture and developments in 2014 - Video

Posted in NATO | Comments Off on NATO: posture and developments in 2014 – Video

NSA MCW 2015 Fashion Show – Video

Posted: at 6:49 am


NSA MCW 2015 Fashion Show
Here #39;s our creative fashion show performance that won us 1st place at this year #39;s YFS Multicultural Week.

By: NSA York U

Continued here:
NSA MCW 2015 Fashion Show - Video

Posted in NSA | Comments Off on NSA MCW 2015 Fashion Show – Video

RecentR TV (09.02.15) Die Verschwrung hinter NSA, Snowden und den Koch-Brdern – Video

Posted: at 6:49 am


RecentR TV (09.02.15) Die Verschwrung hinter NSA, Snowden und den Koch-Brdern
Bereits vor der Entstehung der amerikanischen Behrde fr Fernmeldeaufklrung NSA lieferten westliche Konzerne alle ntige Technologie in den Osten um die Sowjets zu einer ansehnlichen...

By: Alexander Benesch

Read more:
RecentR TV (09.02.15) Die Verschwrung hinter NSA, Snowden und den Koch-Brdern - Video

Posted in NSA | Comments Off on RecentR TV (09.02.15) Die Verschwrung hinter NSA, Snowden und den Koch-Brdern – Video

Fighting Back! New Bill Takes On NSA Code-Breaking Facility – Video

Posted: at 6:49 am


Fighting Back! New Bill Takes On NSA Code-Breaking Facility
http://www.undergroundworldnews.com On Wednesday, Tennessee legislators filed legislation to directly take on NSA spying by withholding vital state resources and material support from any...

By: Dahboo777

Visit link:
Fighting Back! New Bill Takes On NSA Code-Breaking Facility - Video

Posted in NSA | Comments Off on Fighting Back! New Bill Takes On NSA Code-Breaking Facility – Video

NSA Has Planted Surveillance Software Deep Within Hard Drives Since 2001: Kaspersky

Posted: at 6:49 am

The U.S. National Security Agency(NSA) has been planting surveillance software deep within hard drives made by top manufacturers, allowing it to eavesdrop on almost every computer in the world, according to Kaspersky Lab, aMoscow-based software security company that announced its findings Monday.

Kaspersky did not explicitly name from which country or intelligence agency the spying software was found, but former operatives from the NSA confirmed that the findings correlated with NSA activity, Reuters reported.

The NSAs spyware lies within drives manufactured by Western Digital and Seagate, who deny that they had any knowledge of such programs. Samsung and Toshiba drives also contained the code, but both declined to comment.

Kaspersky said that PCs in 30 different countries were infected by the most advanced hacking operation ever uncovered, with the most in Iran, Russia, Pakistan, Afghanistan and China. The NSA has a number of ways in which it can obtain the drives source code, which it requires to embed the spyware. The NSAs methods include posing as software companies or asking for it directly, Reuters reported. The government can also request it for a security audit from manufacturers who wish to sell hard drives to the Department of Defense, and then use it to infect the manufacturers products.

The NSA also would intercept mailed items, such as CDs or USB drives, to infect them, according to a report from Ars Technica. The infections also affect iPhones and other Apple products.

The NSA is targeting a number of organizations, including government and military offices, telecommunication, energy and media companies as well as nuclear research facilities and Islamic activists. Institutions with infected hard drives should be able to detect the NSA spyware using technical details that Kaspersky published Monday.

Those details could impair the NSAs surveillance programs, which were already affected by the revelations made by former NSA contractor Edward Snowden. The disclosures have already slowed sales of U.S. technology products internationally, especially in China.

Originally posted here:
NSA Has Planted Surveillance Software Deep Within Hard Drives Since 2001: Kaspersky

Posted in NSA | Comments Off on NSA Has Planted Surveillance Software Deep Within Hard Drives Since 2001: Kaspersky

Suite of Sophisticated Nation-State Attack Tools Found With Connection to Stuxnet

Posted: at 6:49 am

CANCUN, MexicoThe last two years have been filled with revelations about NSA surveillance activities and the sophisticated spy tools the agency uses to take control of everything from individual systems to entire networks. Now it looks like researchers at Kaspersky Lab may have uncovered some of these NSA tools in the wild on customer machines, providing an extensive new look at the spy agencys technical capabilities. Among the tools uncovered is a worm that appears to have direct connections to Stuxnet, the digital weapon that was launched repeatedly against centrifuges in Iran beginning in late 2007 in order to sabotage them. In fact, researchers say the newly uncovered worm may have served as a kind of test run for Stuxnet, allowing the attackers to map a way to targeted machines in Iran that were air-gapped from the internet.

For nearly a year, the researchers have been gradually collecting components that belong to several highly sophisticated digital spy platforms that they say have been in use and development since 2001, possibly even as early as 1996, based on when some command servers for the malware were registered. They say the suite of surveillance platforms, which they call EquationLaser, EquationDrug and GrayFish, make this the most complex and sophisticated spy system uncovered to date, surpassing even the recently exposed Regin platform believed to have been created by Britains GCHQ spy agency and used to infiltrate computers belonging to the European Union and a Belgian telecom called Belgacom, among others.

The new platforms, which appear to have been developed in succession with each one surpassing the previous in sophistication, can give the attackers complete and persistent control of infected systems for years, allowing them to siphon data and monitor activities while using complex encryption schemes and other sophisticated methods to avoid detection. The platforms also include an innovative module, the likes of which Kaspersky has never seen before, that re-flashes or reprograms a hard drives firmware with malicious code to turn the computer into a slave of the attackers. The researchers, who gave WIRED an advance look at their findings and spoke about them today at the Kaspersky Security Analyst Summit in Mexico, have dubbed the attackers the Equation Group and consider them the most advanced threat actor theyve seen to date.

The researchers have published an initial paper on their findings and plan to publish more technical details over the next few days, but theres still a lot they dont know about the Equation Groups activities.

As we uncover more of these cyber espionage operations we realize how little we understand about the true capabilities of these threat actors, Costin Raiu, head of Kasperskys Global Research and Analysis Team told WIRED.

Although the researchers have no solid evidence that the NSA is behind the tools and decline to make any attribution to that effect, there is circumstantial evidence that points to this conclusion. A keywordGROKfound in a keylogger component appears in an NSA spy tool catalog leaked to journalists in 2013. The 53-page document detailswith pictures, diagrams and secret codenamesan array of complex devices and capabilities available to intelligence operatives. The capabilities of several tools in the catalog identified by the codenames UNITEDRAKE, STRAITBAZZARE, VALIDATOR and SLICKERVICAR appear to match the tools Kaspersky found. These codenames dont appear in the components from the Equation Group, but Kaspersky did find UR in EquationDrug, suggesting a possible connection to UNITEDRAKE (United Rake). Kaspersky also found other codenames in the components that arent in the NSA catalog but share the same naming conventionsthey include SKYHOOKCHOW, STEALTHFIGHTER, DRINKPARSLEY, STRAITACID, LUTEUSOBSTOS, STRAITSHOOTER, and DESERTWINTER.

Other evidence possibly pointing to the NSA is the fact that five victims in Iran who were infected with Equation Group components were also key victims of Stuxnet, which was reportedly created and launched by the U.S. and Israel.

Kaspersky wouldnt identify the Iranian victims hit by the Equation tools, but the five key Stuxnet victims have been previously identified as five companies in Iran, all contractors in the business of building and installing industrial control systems for various clients. Stuxnet targeted industrial control systems used to control centrifuges at a uranium-enrichment plant near Natanz, Iran. The companiesNeda Industrial Group, Kala Electric, Behpajooh, CGJ (believed to be Control Gostar Jahed) and Foolad Technicwere infected with Stuxnet in the hope that contractors would carry it into the enrichment plant on an infected USB stick. This link between the Equation Group and Stuxnet raises the possibility that the Equation tools were part of the Stuxnet attack, perhaps to gather intelligence for it.

But the newly uncovered worm created by the Equation Group, which the researchers are calling Fanny after the name of one of its files, has an equally intriguing connection to Stuxnet.

It uses two of the same zero-day exploits that Stuxnet used, including the infamous .LNK zero-day exploit that helped Stuxnet spread to air-gapped machines at Natanzmachines that arent connected to the internet. The .LNK exploit in Fanny has a dual purposeit allows attackers to send code to air-gapped machines via an infected USB stick but also lets them surreptitiously collect intelligence about these systems and transmit it back to the attackers. Fanny does this by storing the intelligence in a hidden file on the USB stick; when the stick is then inserted into a machine connected to the internet, the data intelligence gets transferred to the attackers. EquationDrug also makes use of the .LNK exploit. A component called SF loads it onto USB sticks along with a trojan to infect machines.

See the rest here:
Suite of Sophisticated Nation-State Attack Tools Found With Connection to Stuxnet

Posted in NSA | Comments Off on Suite of Sophisticated Nation-State Attack Tools Found With Connection to Stuxnet

NSA hiding Equation spy program on hard drives

Posted: at 6:49 am

Kaspersky Labs

Equation infection: Kaspersky Labs says the highest number of machines infected with Equation programs were in Iran, Russia and Pakistan.

The US National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber researchers and former operatives.

That long-sought and closely guarded ability was part of a cluster of spying programs discovered by Kaspersky Lab, the Moscow-based security software maker that has exposed a series of Western cyberespionage operations.

Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria. The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said.

Kaspersky Labs

The areas of government Equation has been able to infect by nation.

The firm declined to publicly name the country behind the spying campaign, but said it was closely linked to Stuxnet, the NSA-led cyberweapon that was used to attack Iran's uranium enrichment facility. The NSA is the agency responsible for gathering electronic intelligence on behalf of the United States.

A former NSA employee told Reuters that Kaspersky's analysis was correct, and that people still in the intelligence agency valued these spying programs as highly as Stuxnet. Another former intelligence operative confirmed that the NSA had developed the prized technique of concealing spyware in hard drives, but said he did not know which spy efforts relied on it.

NSA spokeswoman Vanee Vines declined to comment.

Go here to see the original:
NSA hiding Equation spy program on hard drives

Posted in NSA | Comments Off on NSA hiding Equation spy program on hard drives

Volokh Conspiracy: No cell phone warrants without search protocols, magistrate judge rules

Posted: at 6:48 am

The Fourth Amendment says that warrants must state where the government will search and what evidence the government will seize. In recent years, some federal magistrate judges, when asked to sign warrants for computer searches, have began imposing a new third requirement: limits on how computers can be searched. As I wrote in this 2010 article, I dont think such limits are permissible. In my view, questions about how a computer is searched must be reviewed after the search in adversarial litigation challenging its reasonableness, rather than guessed at beforehand and written into the warrant by an individual magistrate judge.

At present, however, there isnt much in the way of caselaw on which side is right. Theres a ton of circuit precedent saying that search protocols are not required. But theres only one appellate case on whether they are permitted, a Vermont Supreme Court case which concluded that that some restrictions are permitted but others arent. No Article III court has yet ruled on the question.

In light of that ongoing debate, I thought I would flag a recent opinion by Magistrate Judge David Waxse in Kansas, In the Matter of the Search of Cellular Telephones within Evidence Facility Drug Enforcement Administration, Kansas City District Office. The opinion rejects an application for a warrant to search cell phones in DEA custody because the investigators refused to provide the court with a search protocol. If the government seeks review, it may generate the first Article III precedent that grapples with whether such restrictions are permitted. (The case happens to involve cell phones, but there is no Fourth Amendment difference between a cell phone search and any other computer search.)

Waxses opinion is pretty unusual. It includes a long section titled Applying Constitutional Protections in the Digital Era that offers an interesting theoretical account of the role of precedent. According to Waxse, magistrate judges should not be overly beholden to Supreme Court precedent when technology changes:

With technological developments moving at such a rapid pace, Supreme Court precedent is and will inevitably continue to be absent with regard to many issues district courts encounter. As a result, an observable gap has arisen between the well-established rules lower courts have and the ones they need in the realm of technology. Courts cannot, however, allow the existence of that gap to infiltrate their decisions in a way that compromises the integrity and objectives of the Fourth Amendment. . . . The danger, of course, is that courts will rely on inapt analogical reasoning and outdated precedent to reach their decisions. To avoid this potential pitfall, courts must be aware of the danger and strive to avoid it by resisting the temptation to rationalize the application of ill-fitting precedent to circumstances.

Judge Waxse then concludes, relying heavily on the reasoning of the Vermont Supreme Court, that he has the authority to deny applications for computer warrants unless they detail how the search will be executed. Although the Supreme Court has indicated that the reasonableness of a warrant execution should be reviewed ex post, not ex ante, Waxse concludes that its more efficient to have the review occur ex ante:

The fact of the matter is that a court is attempting to avoid entirely the harm that ex post remedies are meant to assuage. By only deciding reasonableness of the governments actions ex post, the government not only possesses a substantial portion of an individuals private life, but it also fails to prevent a person from having to defend against subsequent unreasonable searches stemming from the initial search and seizure. Requiring search protocol in a warrant allows the court to more effectively fulfill its duty to render, as the Supreme Court put it, a deliberate, impartial judgment as to the constitutionality of the proposed search, thus avoiding the need for ex post remedies resulting from an unconstitutional search.

He concludes:

If the Court were to authorize this warrant, it would be contradicting the manifest purpose of the Fourth Amendment particularity requirement, which is to prevent general searches. Given the substantial amount of data collected by the government upon searching or seizing a cell phone, as discussed in Riley, requesting an unrestricted search is tantamount to requesting disclosure of a vast array of intimate details of an individuals private life. For the reasons discussed in this opinion, to issue this warrant would swing the balance between an individuals right to privacy and the governments ability to effectively investigate and prosecute crimes too far in favor of the government.

Accordingly, the Court again finds that an explanation of the governments search techniques is being required in order to determine whether the government is executing its search in both good faith and in compliance with the Fourth Amendment. The Court does not believe that this request will overburden the government. In fact, in Riley, the government advocated and it can be concluded that the Supreme Court endorsed the implementation of search protocols: Alternatively, the Government proposes that law enforcement agencies develop protocols to address concerns raised by cloud computing. Probably a good idea, but the Founders did not fight a revolution to gain the right to government agency protocols.

More:
Volokh Conspiracy: No cell phone warrants without search protocols, magistrate judge rules

Posted in Fourth Amendment | Comments Off on Volokh Conspiracy: No cell phone warrants without search protocols, magistrate judge rules

Privacy advocates want amendment to protect personal data

Posted: at 6:48 am

Privacy advocates are pushing to allow Minnesota voters to decide whether their electronic communication should be protected from unreasonable search and seizure.

A bipartisan group of lawmakers and political organizations is encouraging the Legislature to put the question on the 2016 ballot.

State Rep. Peggy Scott, R-Andover, worries that law enforcement is overstepping its authority in acquiring data like financial and telecommunications records without getting search warrants.

"If data was what it is today if it would have been that way back when the constitution was being written I believe they would have included a person's technological communications as part of those things that would have been protected by the Fourth Amendment," Scott said.

A committee in the Republican-controlled House has scheduled a hearing on the bill this week. No committee hearing is scheduled in the Senate and DFL Senate Majority Leader Tom Bakk said he's reluctant to put any measures on the ballot next year.

"I think it would be unlikely that we're going to consider something additional for the ballot in 2016," Bakk said. "It's a conversation that I haven't had with the speaker yet if they have any interest to propose something."

Privacy issues are a major theme at the Capitol this year. There are also discussions about the privacy implications of police body cameras and police use of license plate readers.

Go here to read the rest:
Privacy advocates want amendment to protect personal data

Posted in Fourth Amendment | Comments Off on Privacy advocates want amendment to protect personal data