National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials.
The spy agency began allowing the analysis of phone call and e-mail logs in November 2010 to examine Americans’ networks of associations for foreign intelligence purposes after N.S.A. officials lifted restrictions on the practice, according to documents provided by Edward J. Snowden, the former N.S.A. contractor.
Read moreLinux supremo Linus Torvalds has jokingly admitted US spooks approached him to put a backdoor in his open-source operating system.
During a question-and-answer session at the LinuxCon gathering in New Orleans this week, Torvalds and his fellow kernel programmers were asked by moderator Ric Wheeler whether America's g-men leaned on the Finn to compromise Linux's security, allowing spies to infiltrate computers. Torvalds replied with a firm "no" while nodding his head to say yes, a response greeted with laughter from the audience. He quickly followed up by repeating "no" while shaking his head in the negative.
Read moreGoogle is developing an anonymous identifier for advertising, or AdID, that would replace third-party cookies as the way advertisers track people's Internet browsing activity for marketing purposes.
Google, the world's largest Internet search company, is considering a major change in how online browsing activity is tracked, a move that could shake up the $120 billion digital advertising industry. Google, which accounts for about a third of worldwide online ad revenue, is developing an anonymous identifier for advertising, or AdID, that would replace third-party cookies as the way advertisers track people's Internet browsing activity for marketing purposes, according to a person familiar with the plan.
Read moreThe NSA used ‘man in the middle’ hack attacks to impersonate Google and fool web users, leaks have revealed. The technique circumvents encryption by redirecting users to a copycat site which relays all the data entered to NSA data banks.
Brazilian television network Globo News released a report based on classified data divulged by former CIA worker Edward Snowden on Sunday. The report itself blew the whistle on US government spying on Brazilian oil giant Petrobras, but hidden in amongst the data was information the NSA had impersonated Google to get its hands on user data.
Read moreGoogle Inc. founders Larry Page and Sergey Brin may have to dig deeper to operate their fleet of private jets, after the U.S.
The agreement between the Google founders and the government, which started in 2007, ended Aug. 31 after officials at the National Aeronautics and Space Administration—which sponsored the arrangement—opted not to renew it, according to a Pentagon spokeswoman. The move followed discussions earlier this year between the Pentagon and NASA over whether the Google founders may have exceeded contract terms by using fuel for non-government flights.
Read moreA former senior British secret intelligence officer on Thursday played down any potential damage done by the leaks to the Guardian of the spying activities of GCHQ and America's National Security Agency, apparently contradicting claims made by UK security chiefs.
The leaks, by former NSA contractor Edward Snowden were "very embarrassing, uncomfortable, and unfortunate", Nigel Inkster, former deputy chief of MI6, said. While Inkster said it was too early to draw any definite conclusions about the impact of the leaks, he added: "I sense that those most interested in the activities of the NSA and GCHQ have not been told very much they didn't know already or could have inferred."
Read moreThe National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.
Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.
Read moreThe U.S. Federal Trade Commission issued a complaint on Wednesday against Internet-connected device maker Trendnet due to a security flaw in one of its webcams – a device marketed for home security and baby monitoring – that let hackers spy on people in their homes.
The complaint is the first issued by the FTC that concerns a device included in the category we know as the “Internet of Things.” But thanks to a specialized search engine for Internet-connected devices called Shodan, the FTC’s Trendnet complaint is likely only the beginning. Countless devices, ranging from webcams to electrical power plants, are insecurely connected to the Internet, making them vulnerable to hacker intrusions and other cyberattacks.
Read moreThe US intelligence agency NSA has been taking advantage of the smartphone boom. It has developed the ability to hack into iPhones, android devices and even the BlackBerry, previously believed to be particularly secure.
Michael Hayden has an interesting story to tell about the iPhone. He and his wife were in an Apple store in Virginia, Hayden, the former head of the NSA, said at a conference in Washington recently. A salesman approached and raved about the iPhone, saying that there were already "400,000 apps" for the device. Hayden, amused, turned to his wife and quietly asked: "This kid doesn't know who I am, does he? Four-hundred-thousand apps means 400,000 possibilities for attacks."
Read moreThe NSA has huge capabilities – and if it wants in to your computer, it's in. With that in mind, here are five ways to stay safe from the leading security expert and cryptographer Bruce Schneier.
Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves. For the past two weeks, I have been working with the Guardian on NSA stories, and have read hundreds of top-secret NSA documents provided by whistleblower Edward Snowden.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland