Big Brother 2.0: 160,000 Facebook pages are hacked a day

WikiLeaks, the National Security Agency, data mining we all know Big Brother is watching. But few of us realize to what extent.

Some things you might not know: Your smart TV is probably watching you watch it. Your office photocopier is recording everything you duplicate. Your smartphone can identify you by the way you walk, the way you hold it, and may also be recording you. The app you downloaded has now siphoned your name, e-mail address and place of residence and reported back to its parent company.

The insecurity of the individual, however, has nothing on the insecurity of nations, diseases, global finance, air and space travel, traffic and power grids, police and fire departments, medical data, news organizations. There are no firewalls that cant be breached.

In his new book, Future Crimes: Everything is Connected, Everyone is Vulnerable and What We Can Do About It (Doubleday), global-security expert Marc Goodman explores our existing and impending vulnerabilities, all while exhorting us to be aware to the point of paranoia.

Four new Apache helicopters were destroyed in 2007 by insurgents after US servicemen posted photos to Facebook unaware that the pictures had been automatically geotagged.

Goodman has far too many examples to back up that assertion. Among them: 160,000 Facebook accounts are compromised per day, and the company loosens up your privacy settings every time they update the terms of service not that theyll tell you.

Google reads your Gmail and sells your personal information to advertisers. Twitter, Facebook and LinkedIn also sell whatever data on you theyve got.

Nordstrom and Home Depot track your movements through their stores using Wi-Fi and your cellphone.

Disneyland tracks visitors via sensor-enabled bracelets that they supply; the company records everything the wearer does, says and buys, and then if that wearer is 13 or over sells that data to others.

Disneyland tracks visitors via sensor-enabled bracelets that they supplyPhoto: Reuters

Read the original:
Big Brother 2.0: 160,000 Facebook pages are hacked a day

FBI’s attack on encryption

WASHINGTON As Googles Android smartphone operating system was coming under attack in fall 2012 from malware with the colorful names of Loozfon and FinFisher, the FBIs Internet Crime Complaint Center issued an alert against the threat.

Depending on the type of phone, the FBI said, the operating system may have encryption available. This can be used to protect the users personal data.

Last fall, when Apple and Google announced they were cleaning up their operating systems to ensure that their users information was encrypted to prevent hacking and potential data loss, FBI Director James Comey attacked both companies. He claimed the encryption would cause the users to place themselves above the law.

The tech community fired back. The only actions that have undermined the rule of law, Ken Gude wrote in Wired, are the governments deceptive and secret mass-surveillance programs.

The battle resumed in February 2015. Michael Steinbach, FBI assistant director for counterterrorism, said it is irresponsible for companies like Google and Apple to use software that denies the FBI lawful means to intercept data.

Yet the FBI does have a lawful means to intercept it: the Foreign Intelligence Surveillance Act. Its scope was expanded by Congress after the 9/11 attacks.

Its worth noting that the FBI never asked Congress to force tech companies to build back doors into their products immediately after the 9/11 attacks. Only after Google and Apple took steps to patch existing security vulnerabilities did the bureau suddenly express concern that terrorists might be exploiting this encryption.

In fact, the bureau has a host of legal authorities and technological capabilities at its disposal to intercept and read communications, or even to penetrate facilities or homes to implant audio and video recording devices. The larger problem confronting the FBI and the entire U.S. intelligence community is their over-reliance on electronic technical collection against terrorist targets.

The best way to disrupt any organized criminal element is to get inside of it physically. But the U.S. governments counterterrorism policies have made that next to impossible.

The FBI, for example, targets the very Arab-American and Muslim-American communities it needs to work with if it hopes to find and neutralize home-grown violent extremists, including promulgating new rules on profiling that allow for the potential mapping of Arab- or Muslim-American communities.

The rest is here:
FBI’s attack on encryption

No, a Cryptocurrency Can’t Fix a Broken Economy

Auroracoin, the digital currency given as a free hand-out to every resident of Iceland, was supposed to be a a salvo for a country rankled by a broken financial system. It was heralded as the beginning of hyper-localized cryptocurrencies; it became the second-largest cryptocurrency before it even launched, valued at half a billion dollars at its peak.

And then it fell apart. A failure that's a blow to the entire crypto community, because as outlandish as it was, Auroracoin was launched in the right place at the right time, and it still crash-landed.

That right time was March 2014. When a mysterious entrepreneur proposed a bold plan to "airdrop" digital money upon the masses, the political climate in Iceland was ideal for introducing a radical idea.

Iceland was still reeling from the 2008 financial nuclear meltdown. Its largest private banks collapsed and the krna plummeted in value. It made the recession in the US that year look like the roaring 20s. Six years later, despite a rebound, the aftershocks were still harsh. Tight capital controls initially adopted to bolster the krna remained in place, limiting what Icelanders could do with their money.

Enter Auroracoin! It wasn't just a weird new novelty currency, it was a political statement: Creator Baldur Friggjar Odinsson wanted to "break the shackles of the fiat currency system in Iceland" by urging the country to adopt his coin. "The people of Iceland are being sacrificed at the altar of a flawed financial system," his manifesto clucked. It leaned on public sentiment that people deserved better than the limpid krna, that there needed to be some reparation for the immense damage done in the financial crisis.

Of course, "Baldur Friggjar Odinsson" isn't a real person. Like Satoshi Nakamoto, the furtive creator of Bitcoin, Odinsson is a pseudonym, a mashup of references to Nordic gods. Like Nakamoto, Odinsson concocted his own cryptocurrency, but its hooks were substantially different than Bitcoin. It was squarely aimed at one local population. It would start out 50% pre-mined by Odinsson, who would distribute a set number of coins in stages to each citizen of Iceland by using the country's Kennitala identification system. Everyone would get 31.8 coins just for being Icelandic.

It was also the right media moment. Auroracoin was catching a ride on a hype machine at its most powerful. The outlook was wildly optimistic, and the amped-up speculation skyrocketed the value of the digital coins.

But the swarming interest soon vanished.

Cryptocurrencies are notoriously volatile, but the popping of Auroracoin's hype bubble was especially hard and quick. Auroracoin lost over 50% of its value within a few days of its March 25, 2014 launch and never recovered. A month after it was gifted to them, less than 10% of Icelanders had picked up their free money, and the price fell and flatlined. It's now worth a paltry $.016 USD, down from over $30 at its highest. Like the northern lights it was named after, Auroracoin's brief rise was intense and ephemeral, a strange and likely unrepeatable phenomenon.

Read the original here:
No, a Cryptocurrency Can't Fix a Broken Economy

What Morgan Spurlock left out of his Bitcoin documentary: How to steal bitcoins

Morgan Spurlock, the documentarist who brought us theaward-winning film Super Size Me, now has an investigative show on CNN called Inside Man. His recent episode dealt with living only on the cryptocurrency Bitcoin for a week, taking the opportunity to discuss Bitcoin security and the impact on the Bitcoin exchange market when Mt.Gox lost nearly a billion bitcoin to theft. While Spurlock spent a great deal explaining how to secure bitcoins, he didnt offer nearly as much detail on how they can be stolen from whats supposed to be a highly protected exchange market.

Those tracking Bitcoin news probably noticed the growing string of Bitcoin services that have recently shut down. Some have filed for bankruptcy related to the plummeting value of Bitcoin, while others have closed their doors after being hacked.

Like in the case of Mt.Gox, which filed for bankruptcy in early 2014 after allegedly being hacked. The once popular exchange lost $27 million in cash and nearly a billion bitcoins worth close to $450 million at that time, and claimed that hackers were the ones responsible for the missing Bitcoins.

In a modern day twist on bank heists, hackers today are infiltrating these cryptocurrencyexchanges to get the bitcoins stored by the services. Even if the value of Bitcoin has significantly dropped since the latter part of 2013, a single Bitcoin is currently equivalent to $238.66. Now imagine getting a hold of 1,000 Bitcoins; thats a lot of money to spend.

But how easy it is to steal Bitcoins? Is hacking the only way to steal the digital currency? And is there actually a market for stolen Bitcoins?

Malicious software or malware can be used to infiltrate systems and obtain data covertly or make the system perform tasks surreptitiously. Malware can come in various forms and serve different purposes, including stealing Bitcoins. When installed in a computer, malware can start looking for a wallet.dat file or other commonly used filenames and directories related to Bitcoin wallets, and then transfer the needed files to the remote server. From there, a users key can be extracted from the wallet to start transferring the Bitcoins to another wallet.

Malware can also attack exchange services and steal user credentials by intercepting the login process. Another method includes man-in-the-browser malware, which waits until a user copies a Bitcoin address. The thief then replaces the copied Bitcoin address with his desired address so the Bitcoin will be transferred to the thief. A Bitcoin address is pretty complex and hard to memorize, which means users wont easily notice if the address has changed.

View original post here:
What Morgan Spurlock left out of his Bitcoin documentary: How to steal bitcoins

Edward Snowden emerges as a film star

Depending on your point of view (or maybe on whether you're Neil Patrick Harris), Edward Snowdens actions could be read very differently: The former NSA contractor is either, in the end, a dangerous traitor or a laudable hero.

It's that split that makes the 32-year-old a compelling--and increasingly popular--cinematic figure. That popularity is demonstrated by the doc phenomenon "CitizenFour" this season, and now by Snowden, the new Oliver Stone drama that recently began production in Europe with Joseph Gordon Levitt in the title role and Zachary Quinto as muckraking journalist Glenn Greenwald.

How Snowden's decision to leak scores of documents about national surveillance should be interpreted is one of the key moral mysteries of the national security debate, and hardly a clear matter even for some of those telling his story.

FULL COVERAGE: Oscars 2015

"Im endlessly fascinated by Snowdens decision, his process, his motivation, Quinto told Movies Now. "The vast majority of accounts had it one way or anotherhes either one more traitor or a righteous whistleblower. And the question is, which one is it? Or maybe it's something more complicated than that."

Contemporary news figures in the Snowden vein can make for some weak cinematic sauce (see: Julian Assange movie The Fifth Estate in 2012). Perhaps it's that we grow tired of the cult-of-personality aspects of the story; maybe were just worn out by all the cable-news volleying.

But Snowden is proving resistant to the rule. CitizenFour," in which Laura Poitras offers an unusually intimate look at Snowden and Greenwald in the now-famous Hong Kong hotel room where documents were leaked, scored best documentary at the Oscars on Sunday, notched strong ratings in its initial airing on HBO Monday and was one of the highest-grossing documentaries of 2014 when distributor Radius released it in theaters.

Sony, meanwhile, has bought the rights to Greenwalds book No Place to Hide in the hope of making its own movie, and has set James Bond producer Barbara Broccoli for the project, though whether it still moves forward in the wake of Stones take is an open question.

Stones Snowden"--which is backed by a group of U.S and European companies and will be released by Open Road in December--has plenty going for it. The film features an all-star supporting cast that includes Melissa Leo, Tom Wilkinson, Nicolas Cage and Shailene Woodley, and takes matters beyond the hotel room setting of CitizenFour to the sanctuary Snowden sought in Russia. Basically its about the battle for freedom (for him) and for extradition and prosecution (for the U.S. government).

To tell the tale, the director and producing partner Moritz Borman have acquired the rights to several books, including Luke Hardings The Snowden Files, a Guardian reporters look at the pursuit of Snowden as the story was boiling over in the summer of 2013.

Read more from the original source:
Edward Snowden emerges as a film star

Edward Snowden Film ‘Citizenfour’ Wins Best Documentary Oscar

Adrees Latif / ReutersDirector Laura Poitras (C) accepts the award for best documentary for her film "Citizenfour" at the 2015 Film Independent Spirit Awards in Santa Monica, California on Feb. 21, 2015.

"Citizenfour," amovie about former NSA contractor Edward Snowden's exposure ofthe U.S. government's mass surveillance programs, has won anAcademy Award award forbest documentary film.

Directed byLaura Poitras, "Citizenfour" recounts Snowden's exposure ofNational Security Agency (NSA) surveillance practices andpresents live interviews with Snowden inHong Kong, where he handed classified NSA documents toPoitras andjournalist Glenn Greenwald.

Poitras who shared aPulitzer Prize forPublic Service journalism with TheGuardian andThe Washington Post forpublicizing Snowden's documents had been working ona film about surveillance when Snowden contacted her inJan. 2013 using "CITIZENFOUR" as analias inencrypted e-mails.

"When Laura Poitras asked me if she could film our encounters, I was extremely reluctant," Snowden said Sunday ina statement published via theAmerican Civil Liberties Union. "I'm grateful that I allowed her topersuade me. Theresult is abrave andbrilliant film that deserves thehonor andrecognition it has received.

"My hope is that this award will encourage more people tosee thefilm andbe inspired byits message that ordinary citizens, working together, can change theworld," he added.

Poitras, editor Mathilde Bonnefoy andproducer Dirk Wilutzky accepted theOscar onSunday atHollywood's Dolby Theatre, alongside Greenwald andLindsay Mills, who is Snowden's girlfriend.

"The subject of'Citizenfour,' Edward Snowden, could not be here forsome treason," joked theceremony's host Neil Patrick Harris, according toReuters.

Snowden has been living inexile inRussia since thesummer of2013 toescape theespionage charges he faces inthe U.S. Last year, Russian authorities issued Snowden athree-year residency permit.

Here is the original post:
Edward Snowden Film 'Citizenfour' Wins Best Documentary Oscar

How To Sabotage Encryption Software (And Not Get Caught)

In the field of cryptography, a secretly planted backdoor that allows eavesdropping on communications is usually a subject of paranoia and dread. But that doesnt mean cryptographers dont appreciate the art of skilled cyphersabotage. Now one group of crypto experts has published an appraisal of different methods of weakening crypto systems, and the lesson is that some backdoors are clearly better than othersin stealth, deniability, and even in protecting the victims privacy from spies other than thebackdoors creator.

In a paper titled Surreptitiously Weakening Cryptographic Systems, well-known cryptographer and author Bruce Schneier and researchers from the Universities of Wisconsin and Washington take the spys view to the problem of crypto design: What kind of built-in backdoor surveillance works best?

Their paper analyzes and rates examples of both intentional and seemingly unintentional flaws built into crypto systems over the last two decades. Their results seem to imply, however grudgingly, that the NSAs most recent known method of sabotaging encryption may be the best option, both in effective, stealthy surveillance and in preventing collateral damage to the Internets security.

This is a guide to creating better backdoors. But the reason you go through that exercise is so that you can create better backdoor protections, says Schneier, the author of the recent book Data and Goliath, on corporate and government surveillance. This is the paper the NSA wrote two decades ago, and the Chinese and the Russians and everyone else. Were just trying to catch up and understand these priorities.

The researchers looked at a variety of methods of designing and implementing crypto systems so that they can be exploited by eavesdroppers. The methods ranged from flawed random number generation to leaked secret keys to codebreaking techniques. Then the researchers rated them on variables like undetectability, lack of conspiracy (how much secret dealing it takes to put the backdoor in place), deniability, ease of use, scale, precision and control.

Heres the full chart of those weaknesses and their potential benefits to spies. (The ratingsL, M, and H stand for Low, Medium and High.)

A bad random number generator, for instance, would be easy to place in softwarewithout many individuals involvement, and if it were discovered, could be played off as a genuinecoding error rather than a purposeful backdoor. As an example of this, the researchers point to an implementation of Debian SSL in 2006 in which two lines of code were commented out, removing a large source of the entropy needed to create sufficiently random numbers for the systems encryption. The researchers acknowledge that crypto sabotagewas almost certainly unintentional, the result of a programmer trying to avoid a warning message from a security tool. But the flaw nonetheless required the involvement of only one coder, went undiscovered for two years, and allowed a full break of Debians SSL encryption for anyone aware of the bug.

Another, even subtler method of subverting crypto systemsthat the researchers suggest is what they call implementation fragility, which amounts to designing systemsso complex and difficult that coders inevitably leave exploitable bugs in the software that uses them. Many important standards such as IPsec, TLS and others are lamented as being bloated, overly complex, and poorly designedwith responsibility often laid at the public committee-oriented design approach, the researchers write. Complexity may simply be a fundamental outcome of design-by-committee, but a saboteur might also attempt to steer the public process towards a fragile design. Thatkind of sabotage, if it were found, would be easily disguisedas the foibles of a bureaucratic process.

But when it comes to a rating for controlthe ability to distinguish who will be able to exploit the security weakness youve insertedthe researchers label implementation fragility and bad number generation as low.Use a bad random number generator or fragile crypto implementation, and any sufficiently skilled cryptanalysts who spot the flaw will be able to spy on your target. Its clear that some of these thingsare disastrous in terms of collateraldamage, says paper co-author University of Wisconsin computer scientist Thomas Ristenpart. If you have a saboteur leaving vulnerabilities in criticalsystem that can be exploited by anyone, then this is just disastrous for the security of consumers.

More here:
How To Sabotage Encryption Software (And Not Get Caught)

The Government Refuses to Prove Snowden Damaged National Security

Did Edward Snowden actually damage national security? There's no way in hell to tell from official documents released to the pressthey've been thoroughly redacted to the point of uselessness.

Well, that's not true: They're useful in showing that the government isn't exactly eager to reveal concrete proof that the revelations about its surveillance abuses have harmed America.

The idea that Snowden has jeopardized national security and the lives of troops is the linchpin for arguments that the ex-NSA contractor is a treasonous villain, not a whistleblower. That's why Vice sought out proof of this jeopardy in government documents:

In response to a Freedom of Information Act (FOIA) lawsuit, the Defense Intelligence Agency (DIA) recently released to VICE News more than 100 pages of internal reports prepared by a task force made up of two dozen DIA analysts that examined the alleged damage to national security resulting from Snowden's leaks.

The pages are largely blanked out (save for the Vice watermark slapped on to let everyone know that Vice knows how to file an FOIA). They reveal nothing about the impact of Edward Snowden's decision to reveal information about widespread state surveillance programs targeting wide swathes of the population or than the fact that there were internal documents about it.

They're so redacted, they're pointless to look through unless you have a fetish for oddly aggressive media watermarks:

The only ways these documents could be more redacted is if they were simply not released.

If the Snowden leaks have caused grave damage to national security, it'd make sense if the government wanted proof of the damage in the public view, to back up its assessment that Snowden should be punished for his crimes, to back up the assessment that his actions were treasonous. The party line here is that the government can't reveal more because any additional information will screw up national security even further. (Yet it selectively leaked parts of a report to Congress to shore up anti-Snowden sentiment.)

Go here to read the rest:
The Government Refuses to Prove Snowden Damaged National Security

Hillary Clinton’s Thoughts on NSA Surveillance – The Atlantic

On the eve of her presumptive bid for the White House, the former senator is willfully obscuring the positions she would take as president.

Hillary Clinton is almost certain to launch a bid for the presidency. But at least for now, she's determined to keep the public guessing about her stance on NSA spying. As Edward Snowden's revelations forced the issue to the fore of national debate, she kept mum, even as other prospective candidates staked out positions.

On Tuesday, the technology journalist Kara Swisher raised the subject of surveillance while questioning the former Secretary of State. "Would you throttle back the NSA in the ways that President Obama has promised but that haven't come to pass?" she asked. Clinton's successfully evasive answer unfolded as follows:

Clinton: Well, I think the NSA needs to be more transparent about what it is doing, sharing with the American people, which it wasn't. And I think a lot of the reaction about the NSA, people felt betrayed. They felt, wait, you didn't tell us you were doing this. And all of a sudden now, we're reading about it on the front page...

So when you say, "Would you throttle it back?" Well, the NSA has to act lawfully. And we as a country have to decide what the rules are. And then we have to make it absolutely clear that we're going to hold them accountable. What we had because of post-9/11 legislation was a lot more flexibility than I think people really understood, and was not explained to them. I voted against the FISA Amendments in 2008 because I didn't think they went far enough to kind of hold us accountable in the Congress for what was going on.

Swisher: By flexibility you mean too much spying power, really.

Clinton: Well yeah but how much is too much? And how much is not enough? That's the hard part. I think if Americans felt like, number one, you're not going after my personal information, the content of my personal information. But I do want you to get the bad guys, because I don't want them to use social media, to use communications devices invented right here to plot against us. So let's draw the line. And I think it's hard if everybody's in their corner. So I resist saying it has to be this or that. I want us to come to a better balance.

This will not do. The answer elides the fact that Clinton has not been a passive actor in surveillance policy. "What the rules are" is something that she was responsible for helping to decide. She served in the United States Senate from 2001 to 2009. She cast votes that enabled the very NSA spying that many now regard as a betrayal. And she knew all about what the NSA wasn't telling the public. To say now that the NSA should've been more transparent raises this question: Why wasn't Clinton among the Democrats working for more transparency?

Clinton may resist "saying" that surveillance policy "has to be this or that," but it must be something specific. "Let's draw the line" and "I want us to come to a better balance" are shameless weasel phrases when you're vying to call the shots. What is being balanced in her view? What should the NSA have revealed earlier? How much transparency should it provide going forward? What does the law require of the NSA? Since 9/11, when has the NSA transgressed against the law as Clinton sees it? Those questions hint at the many ways that her position is evasive. So long as no one else contests her party's nomination, she can get away with it.

See more here:
Hillary Clinton's Thoughts on NSA Surveillance - The Atlantic

Julian Assange appeals to Sweden’s supreme court over …

Julian Assange was accused by two women of rape but has not been charged because the prosecutor says she is unable to interview him about the allegations. Photograph: FACUNDO ARRIZABALAGA/EPA

Julian Assange is taking his appeal to Swedens highest court in a final attempt to persuade a Swedish judge that the arrest warrant against him should be lifted.

His lawyers will ask Swedens supreme court on Wednesday to agree that the severe limitations on Assanges freedoms since he claimed asylum in the Ecuadorian embassy in London in 2012 to escape extradition to Sweden are unreasonable and disproportionate to the case.

In August 2010, the WikiLeaks founder and campaigning journalist was accused by two women of rape and sexual molestation, but he has not been charged because the prosecutor insists she is unable to interview him about the allegations.

Prosecutor Marianne Ny has declined invitations by Assange to do so in London, where he has taken refuge in the embassy to avoid a perceived threat of extradition to the US for publishing military secrets. Assange denies all the charges.

In November, Stockholms appeal court rejected Assanges case, saying there was a risk he would evade legal proceedings should the detention order be lifted. The court also ruled that his confinement to the embassy was voluntary.

However, in the ruling, senior appeal court judge Nicklas Wgnert noted the deadlock in the case and criticised the prosecution for failing to move the investigation forward.

That is a heavy obligation on the prosecutor, Judge Wgnert told the Guardian after the ruling. If Assange challenges the detention order again [in the supreme court], I believe the court will consider what measures the prosecutor has taken to move the preliminary investigation forward in between now and the next challenge.

A spokesperson for the prosecutor said she would not give details about the investigation, and Per Samuelson, one of Assanges Stockholm lawyers, said he had heard nothing about any movement.

Swedish legal opinion at a senior level has swung against the prosecutors decision not to travel to London to interview Assange, with Anne Ramberg, head of the Bar Association, calling the current impasse a circus.

Go here to see the original:
Julian Assange appeals to Sweden's supreme court over ...