The latest story from the Snowden documents, co-published by The New York Times and ProPublica , shows that the NSA is operating a signature-based intrusion detection system on the Internet backbone: In mid-2012, Justice Department lawyers wrote two secret memos permitting the spy agency to begin hunting on Internet cables, without a warrant and on American soil, for data linked to computer intrusions originating abroad — including traffic that flows to suspicious Internet addresses or contains malware, the documents show. The Justice Department allowed the agency to monitor only addresses and “cybersignatures” - patterns associated with computer intrusions that it could tie to foreign governments. But the documents also note that the N.S.A.
The vigorous debate after the Sony Pictures breach pitted the Obama administration against many of us in the cybersecurity community who didn’t buy Washington’s claim that North Korea was the culprit. What’s both amazing — and perhaps a bit frightening — about that dispute over who hacked Sony is that it happened in the first place. But what it highlights is the fact that we’re living in a world where we can’t easily tell the difference between a couple of guys in a basement apartment and the North Korean government with an estimated $10 billion military budget
4 retweets 1 favorites
7 retweets 2 favorites
On April 1, I announced the Seventh Mostly Annual Movie-Plot Threat Contest: The NSA has won , but how did it do it? How did it use its ability to conduct ubiquitous surveillance , its massive data centers , and its advanced data analytics capabilities to come out on top? Did it take over the world overtly, or is it just pulling the strings behind everyone’s backs
CIA Accused Of Spying On Senate Intelligence Committee Staffers — 6 retweets 3 favorites