Internet experts say huge chunks of sensitive web traffic have been routinely hijacked by hackers and diverted to foreign computers, compromising the data of victims in at least 150 cities worldwide.
Researchers at New Hampshire-based global internet intelligence company Renesys say that they’ve witnessed a complex type of Man-in-the-Middle attack occur on computer networks no fewer than 60 days this year already, the likes of which they say should never have happened. The method of attack exploits a vulnerability in the Border Gateway Protocol, or BGP, and takes advantage of the fact that much of the information routed through the global system of networks.Read more
WikiLeaks has released a trove of encrypted “insurance” data on Twitter and Facebook. The data can’t be read without an encryption key, but the movement’s supporters say that could be published later in case anything happens to leading WikiLeaks figures.
The whistleblowing organization published links for a massive 400 gigabytes worth of encrypted data it described as “insurance documents” on its Twitter and Facebook accounts. It is possible to download the files but advanced encoding prevents them from being opened. The group described encryption as a necessary measure in light of previous attempts to block its leaking of classified information.Read more
Michele Catalano was looking for information online about pressure cookers. Her husband, in the same time frame, was Googling backpacks. Wednesday morning, six men from a joint terrorism task force showed up at their house to see if they were terrorists. Which begs the question: How'd the government know what they were Googling?
The men identified themselves as members of the "joint terrorism task force." The composition of such task forces depends on the region of the country, but, as we outlined after the Boston bombings, includes a variety of federal agencies. Among them: the FBI and Homeland Security.Read more
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post.
The program, code-named PRISM, has not been made public until now. It may be the first of its kind.
The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers.Read more
Google was sentenced to disclose to the FBI users' data without a court warrant first. The decision on the case of Google, which tried to challenge the demands of the deadly Bureau, was issued by an American federal court. The hearing was held behind the closed doors.Google officials tried to challenge the FBI's demands.
The court considered 19 requests from the FBI which contradict the American constitution. However, the court decided Google must execute 17 demands and demands for additional information on two more users. The court left for Google to challenge individual queries if the company finds formal infringements. The lawsuit does not end there: Google intends to appeal the decision, and the FBI threatened to proceed against the company for failure to cooperate with investigations.Read more