If you happen to have an old Android device lying around and a reason to worry about people messing with your business, Edward Snowden has an app for that.
Haven is an open-source project that Snowden developed in conjunction with Freedom of the Press Foundation and Guardian Project. You can find directions and links for downloading and installing it on the latter organization's Github page. This isn't your typical security app. Haven doesn't lock down a single device or prevent tampering; instead, it repurposes an Android device — an old, unused one, preferably — and, using an assortment of built-in sensors, turns it into a multi-functional security gadget.Read more
A short drive south of Alice Springs, the second largest population center in Australia’s Northern Territory, there is a high-security compound, code-named “RAINFALL.”
The remote base is one of the most important covert surveillance sites in the eastern hemisphere. Hundreds of Australian and American employees come and go every day from Joint Defence Facility Pine Gap, as the base is formally known. The official “cover story,” as outlined in a secret U.S. intelligence document, is to “support the national security of both the U.S. and Australia. The [facility] contributes to verifying arms control and disarmament agreements and monitoring military developments.”Read more
In the trove of documents provided by former National Security Agency contractor Edward Snowden is a treasure. It begins with a riddle: “What do the President of Pakistan, a cigar smuggler, an arms dealer, a counterterrorism target, and a combatting proliferation target have in common? They all used their everyday GSM phone during a flight.”
This riddle appeared in 2010 in SIDtoday, the internal newsletter of the NSA’s Signals Intelligence Directorate, or SID, and it was classified “top secret.” It announced the emergence of a new field of espionage that had not yet been explored: the interception of data from phone calls made on board civil aircraft.Read more
A House intelligence committee report condemned Edward Snowden, saying the National Security Agency leaker is not a whistleblower and that the vast majority of the documents he stole were defense secrets that had nothing to do with privacy.
The Republican-led committee released a three-page unclassified summary of its two-year bipartisan examination of how Snowden was able to remove more than 1.5 million classified documents from secure NSA networks, what the documents contained and the damage their removal caused to US national security. Snowden was an NSA contract employee when he leaked the documents to journalists.Read more
A hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA.
Based on documents provided by Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide. The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA’s virtual fingerprints and clearly originates from the agency.Read more
What do spies use to chat online? A terribly ugly Windows programme. At least, that's what the Five Eyes intelligence alliance was using back in 2003, according to a newly released Snowden document.
“The Five-Eyes SIGINT [signals intelligence] Directors will soon be using a new tool to enhance their collaboration on subjects ranging from current intelligence objectives to future collection planning,” reads an issue of SID Today, the NSA's internal newsletter, dating from September 2003. InfoWorkSpace, as the tool is called, allowed text chat, audio conferencing, shared screen views, and virtual whiteboards, the newsletter explains.Read more
Mobile devices have without a doubt brought convenience to the masses, but that benefit comes at a high price for journalists, activists, and human rights workers who work in war-torn regions or other high-risk environments.
Now, NSA whistleblower Edward Snowden has designed an iPhone accessory that could one day be used to prevent the devices from leaking their whereabouts. Working with renowned hardware hacker Andrew “Bunnie” Huang, Snowden has devised the design for what the team is calling the "Introspection Engine." For now, it's aimed only at iPhone 6 models, but eventually the pair hopes to create specifications for a large line of devices.Read more
From the time we began reporting on the archive provided to us in Hong Kong by NSA whistleblower Edward Snowden, we sought to fulfil his two principal requests for how the materials should be handled.
They should be released in conjunction with careful reporting that puts the documents in context and makes them digestible to the public, and that the welfare and reputations of innocent people should be safeguarded. As time has gone on, The Intercept has sought out new ways to get documents from the archive into the hands of the public, consistent with the public interest as originally conceived.Read more
Former Central Intelligence Agency analyst Edward Snowden, known for revealing the extent of surveillance by US intelligence, has said that this form of surveillance is "more aggressive and invasive today than it was before".
Snowden made the statement in Moscow, where he has been granted asylum after being accused of espionage in 2013 for revealing secret surveillance programmes of the US government. Snowden said that not only the US has used these methods of mass surveillance, but also the Spanish, French, German and British governments because "it is cheap, easy and useful".Read more
Despite saying that he “respects” Telegram’s founder, Russian Pavel Durov, NSA whistleblower Edward Snowden said the messenger lacks security at its default settings. “I respect @durov, but Ptacek is right: @telegram's defaults are dangerous. Without a major update, it's unsafe,” former CIA employee tweeted.
Snowden was referring to a specialist in cryptographic and embedded software security, who tweeted that Telegram’s plaintext is stored on the server. Pointing towards the vulnerability of such a setup, Snowden hinted that the plaintext of the messages should not be accessible to a service provider at all for a connection to be truly secure.Read more