Blog Posts

Eavesdropping via Fake Cell Towers

posted by
Filed under: First Amendment Issues, Fraud and Deception

Can you hear me now? In case you still thought you had personal privacy…


Fake Cell Towers Allow the NSA and Police to Keep Track of You
By Lauren Walker
Newsweek
September 5, 2014

phony-towers-425

The Internet is abuzz with reports of mysterious devices sprinkled across America””many of them on military bases””that connect to your phone by mimicking cell phone towers and sucking up your data. There is little public information about these devices, but they are the new favorite toy of government agencies of all stripes; everyone from the National Security Agency to local police forces are using them.

These fake towers, known as “interceptors,” were discovered in July by users of the CryptoPhone500, one of the ultra-secure cell phones released after Edward Snowden”™s leaks about NSA snooping. The phone is essentially a Samsung Galaxy S3 customized with high-level encryption that costs around $3,500. While driving around the country, CryptoPhone users plotted on a map every time they connected to a nameless tower (standard towers run by wireless service providers like Verizon usually have names) and received an alert that the device had turned off their phone”™s encryption (allowing their messages to be read). Read the rest of this article here.

Have a Secret? Good Luck

posted by
Filed under: First Amendment Issues, Legal Issues

Ever wonder what’s happening with all the data the NSA has collected on you?


New Snowden Leak: NSA Shares 850 Billion Metadata Records Via Search Portal
by Graham Cluley
Tripwire.com
August 27, 2014

783640841-425

Some are starting to consider Edward Snowden as the NSA”™s old, boring uncle. His leaks grimly pass around secrets of the NSA: online surveillance disclosures, the MonsterMind program and privacy invasion of international governments. And still revelations about the NSA”™s classified activities continue to tumble out.

The latest? The National Security Agency is supplying data to two dozen US government agencies courtesy of a “Google-like” search engine designed to share 850 billion records about emails, cellphone locations, Internet chats and phone calls, according to classified documents provided to The Intercept by none other than Edward Snowden.

The tool, called ICREACH, includes millions of records on innocent US citizens (not accused of any wrongdoing), as well as private communications of foreigners. While a multitude of NSA programs have been exposed for collecting large data of communications, and the NSA has admitted sharing some of the collected information with domestic agencies, no one had a clue about the scoop and insights of its sharing. Read the rest of this article here.

Create an NSA document

posted by
Filed under: Creative Activism, First Amendment Issues

From Joe King: Leak your own NSA document, via Graham Cluley’s Security Newsletter, the site churns out a unique [fake] surveillance program when you visit.


The NSA Product Generator

Inspired by the recent dump of NSA’s TAO product catalog, containing weirdly-codenamed products beyond the wildest paranoid’s dreams. Each time you refresh the page, another document is generated.

nsaproductgenerator

Another demented project from @ternus

NSA Cracks Smartphone Security. Why Wear Clothes?

posted by
Filed under: First Amendment Issues

The NSA Can Access Basically Everything On iOS, Android and Blackberry
by Lily Hay Newman
Gizmodo
August 8, 2013

ku-bigpic-200I guess we’re not even surprised at this point. Der Spiegel is reporting that internal NSA documents prove the agency’s widespread smartphone data access. And it’s pretty exhaustive. Spiegel found explicit mention of information access from iPhones, BlackBerry handsets, and devices running Android.

Everything from contact lists to texts and location tracking is available, and the NSA has set up teams to specialize in cracking each operating system. These teams also look for additional gains like the ability to monitor a user’s computer after an iPhone sync, and get access from there to even more iPhone features.

The news is problematic for RIM in particular, because the security of BlackBerry mail has always been a touted feature. A RIM representative made a statement to Der Spiegel that, “It is not for us to comment on media reports regarding alleged government surveillance of telecommunications traffic.”

Der Spiegel notes that the documents indicate specific, customized access on the part of the NSA, perhaps without company knowledge, rather than widespread smartphone surveillance. But at this point who knows. [Der Spiegel]

image: Gizmodo

Iranian Prank Calls the NSA

posted by
Filed under: Political Pranks, Satire

We interviewed the guy who prank-called the NSA
by Brian Fung
WashingtonPost.com
September 1, 2013

The NSA is in dire need of customer service training “” at least in the case of Bahram Sadeghi, a Dutch-Iranian filmmaker who decided to call the surveillance agency for “help” after one of his e-mails was accidentally deleted. In a three-minute exchange with NSA spokespeople, Sadeghi manages to confound one with his request (you can almost hear the relief in her voice when Sadeghi asks to speak to someone else) and gets a curt reply from another.

How did Sadeghi pull off his trick? In an interview Sunday, the prankster revealed how his plan came together and where it went off the rails. The following transcript has been lightly edited for clarity.

Read the rest of the story here.

via BoingBoing

Secure Email Service Shuts Down Preemptively to Elude Fed Prying

posted by
Filed under: First Amendment Issues

Encryption App Silent Circle Shuts Down E-Mail Service ‘To Prevent Spying’
by Parmy Olson
Forbes.com
August 9, 2013

Updated with comments from co-founder Phil Zimmermann

Silent-Circle-200The business of protecting consumers from prying government eyes has suddenly become a pre-emptive one for Silent Circle. The communications encryption firm said Friday that it was shutting down its e-mail service to prevent spying, a day after competitor Lavabit suspended its core email service. Lavabit”™s founder had suggested in a letter to customers that he had been the subject of a U.S. government investigation and gag order.

Silent Circle, which has seen a 400% revenue jump in recent months as a result of the Snowden furore and concerns over government surveillance, does not rely solely on e-mail hosting as Lavabit does. It also encrypts phone calls, text messages and video conferencing with a suite of iOS and Android apps.

Only a small portion of its customers used Silent Mail, some of whom used it as their exclusive email provider “” at some point in the last 24 hours, many discovered their cloud-based emails had been suddenly deleted. (more…)

Email Service Provider Shuts Down to Avoid Violating Users’ Privacy

posted by
Filed under: First Amendment Issues

Update from Forbes: Lavabit’s Ladar Levison: ‘If You Knew What I Know About Email, You Might Not Use It’


Lavabit, email service Snowden reportedly used, abruptly shuts down
by Xeni Jardin
boingboing.net
August 8, 2013

Screen-Shot-2013-08-08-at-3.03Remember when word circulated that Edward Snowden was using Lavabit, an email service that purports to provide better privacy and security for users than popular web-based free services like Gmail? Lavabit’s owner has shut down the service, and posted a message on the lavabit.com home page today about wanting to avoid “being complicit in crimes against the American people.”

According to the statement, it appears he rejected a US court order to cooperate with the government in spying on users.

The email service offered various security features to a claimed user base of 350,000, and is the first such firm to have publicly and transparently closed down, rather than cooperate with state surveillance programs. The email address Snowden (or someone sending emails on his behalf) is reported to have used to send invites to a press conference at Moscow’s Sheremetyevo Airport in mid-July was a Lavabit account.

Read the full message from Lavabit’s founder and operator Ladar Levison here.