Spiegel published a long article today on the NSA’s analysis capabilities against encrypted systems, with a lot of new documents from the Snowden archive. I’m not going to have time to look at this for a few days. Describe anything interesting you find — with links to the documents — in the comments. EDITED TO … Read More “New Documents on NSA's Cryptanalysis Capabilities” »
Author: infossl
“St. George, the Dragon, and the Squid: A Preservation Mumming,” by the American Folklife Center. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
On Christmas eve the NSA relesed a bunch of audit reports on illegal spying using EO 12333 from 2001 to 2013. Bloomberg article. The heavily-redacted reports include examples of data on Americans being e-mailed to unauthorized recipients, stored in unsecured computers and retained after it was supposed to be destroyed, according to the documents. They … Read More “Merry Christmas from the NSA” »
He sees you when you’re sleeping. He knows when you’re awake. He’s everywhere. And that’s the whole point of the Elf on the Shelf, the bright-eyed, Kewpie-esque doll that millions of parents display around their homes in December as a reminder to children to behave. The elf, the story goes, is an agent reporting back … Read More “"Santa Claus and the Surveillance State"” »
I am deeply skeptical of the FBI’s announcement on Friday that North Korea was behind last month’s Sony hack. The agency’s evidence is tenuous, and I have a hard time believing it. But I also have trouble believing that the US government would make the accusation this formally if officials didn’t believe it. Clues in … Read More “Did North Korea Really Attack Sony?” »
Interesting article on the subconscious visual tricks used to manipulate juries and affect verdicts. In December 2012 the Washington Supreme Court threw out Glasmann’s convictions based on the “highly inflammatory” slides. As a general rule, courts don’t want prosecutors expressing their personal opinion to a jury; they’re supposed to couch their arguments in terms of … Read More “Manipulating Juries with PowerPoint” »
North Korea has been knocked off the Internet by a distributed denial-of-service (DDoS) attack. Maybe the US did it, and maybe not. This whole incident is a perfect illustration of how technology is equalizing capability. In both the original attack against Sony, and this attack against North Korea, we can’t tell the difference between a … Read More “North Korea DDoSed Off the Internet” »
Interesting article talks about the 2008 cyberattack against a Turkish oil pipeline: For western intelligence agencies, the blowout was a watershed event. Hackers had shut down alarms, cut off communications and super-pressurized the crude oil in the line, according to four people familiar with the incident who asked not to be identified because details of … Read More “2008 Cyberattack Against Turkish Oil Pipeline” »
First we thought North Korea was behind the Sony cyberattacks. Then we thought it was a couple of hacker guys with an axe to grind. Now we think North Korea is behind it again, but the connection is still tenuous. There have been accusations of cyberterrorism, and even cyberwar. I’ve heard calls for us to … Read More “Reacting to the Sony Hack” »
Impressive. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico