NSA chief Keith Alexander was immediately dispatched to issue his predictable disclaimers: "It would be illegal for us to do that. So, I don't know what the report is,"he told a cyber-security conference last week."But I can tell you factually we do not ...
The director of both organizations is appointed by the Secretary of Defense and approved by the president before taking the reins. The director must be a commissioned military officer with at least a three-star rank. This person also heads U.S. Cyber Command, a "network warfare" unit created...
Huawei has consistently denied all allegations that it’s involved in any sort of espionage or has any unusual connections with the Chinese government. Huawei’s current global head of cyber security, John Suffolk, has challenged critics to “put up or shut up” by showing their evidence publicl...
Microsoft, AOL, Skype etc) in response to demands under S702 that requires ISP to turn over any data matching court-approved search terms; these are DOWNSTREAM intercepts because the data has already been collected by the companies (un)concerned; the data include e-mails and social network...
and 256 bits—it's incorporated in most commercial email programs and web browsers and is considered so strong that the nsa has even approved its use for top-secret us government communications. most experts say that a so-called brute-force computer attack on the algorithm—trying one combinatio...
Next, is the opening of US mail and manipulation of it contents with potentially dangerous electronic devices (non-FCC or non-UL approved devices which could cause fires or jam civilian radio frequencies). Again, it would be prudent to have EFF or ACLU lawyers look into these legal aspects....
So, quick summary: secret surveillance programs enacted in secret ostensibly to protect America from terrorism threats are now turning over data on American citizens to the FBI, fully unrelated to issues of national security. The rules governing all this are secret, decided by a secret court. ...
“From the Guardian report: ‘It shows the agency worked covertly to get its own version of a draft security standard issued by the US National Institute of Standards and Technology approved for worldwide use in 2006.’ Which standard is that?” I don’t know. DUAL_EC_DRBG, perhaps? http...
Because the Word or PDF is the legally approved policy. If they clerk was to copy it, paste it into an email, and either accidentally leave something out or have spell check auto-correct a word and send it you now have a wrong policy. ...
Whereas in the past the NSA could instantaneously run approved searches of its database, now the agency must approach each telecommunications company to ask about a number and then wait for a response. In his January post Gerstell acknowledged concerns that the new approach could be "too ...