Security News
You might not believe it, but it's possible to spy on secret conversations happening in a room from a nearby remote location just by observing a light bulb hanging in there-visible from a window-and measuring the amount of light it emits. A team of cybersecurity researchers has developed and demonstrated a novel side-channel attacking technique that can be applied by eavesdroppers to recover full sound from a victim's room that contains an overhead hanging bulb.
A beer and pub-rating app built off the back of Foursquare's location-tracking API poses a risk to the security of military and intelligence personnel, according to legendary OSINT website Bellingcat. Untappd 'has over eight million mostly European and North American users, and its features allow researchers to uncover sensitive information about said users at military and intelligence locations around the world,' wrote Bellingcat's Foeke Postma in a fascinating guide to using the app for tracking down people of interest.
A beer and pub-rating app built off the back of Foursquare's location-tracking API poses a risk to the security of military and intelligence personnel, according to legendary OSINT website Bellingcat. Untappd 'has over eight million mostly European and North American users, and its features allow researchers to uncover sensitive information about said users at military and intelligence locations around the world,' wrote Bellingcat's Foeke Postma in a fascinating guide to using the app for tracking down people of interest.
Germany's foreign intelligence service violated the constitution by spying on internet data from foreigners abroad, the nation's top court ruled Tuesday in a victory for overseas journalists who brought the case. The BND agency's surveillance violates "The fundamental right to privacy of telecommunications" and freedom of the press, judges at the Constitutional Court in Karlsruhe said in their verdict.
Dutch spies operating as a part of a European equivalent of the Five Eyes espionage alliance helped GCHQ break Argentinian codes during the Falklands War, it has been revealed. Flowing from revelations made in German-language news reports earlier this year that Swiss cipher machine company Crypto AG was owned by the CIA and German counterpart the BND during most of the Cold War, an academic paper has described the Maximator alliance which grew from the Crypto AG compromise.
Dutch spies operating as a part of a European equivalent of the Five Eyes espionage alliance helped GCHQ break Argentinian codes during the Falklands War, it has been revealed. Flowing from revelations made in German-language news reports earlier this year that Swiss cipher machine company Crypto AG was owned by the CIA and German counterpart the BND during most of the Cold War, an academic paper has described the Maximator alliance which grew from the Crypto AG compromise.
"Furthermore, we noted a significant increase over time in the number of zero-days leveraged by groups suspected to be customers of companies that supply offensive cyber capabilities," said FireEye, which went on to refer to a group of malicious persons variously named by researchers as Stealth Falcon and FruityArmor [sic]. This group "Used malware sold by NSO Group", said FireEye, which speculated that it might also be linked to Uzbekistani state spying operations: "The zero-days used in SandCat operations were also used in Stealth Falcon operations, and it is unlikely that these distinct activity sets independently discovered the same three zero-days."
Current and former officials say just because a FISA warrant produces charges other than national security ones doesn't mean the target is no longer considered a national security threat. Prosecutors produced a statement from Attorney General William Barr saying the FISA materials held classified information about counterterrorism investigations and that disclosing them would harm national security.
US and German intelligence services raked in the top secret communications of governments around the world for decades through their hidden control of a top encryption company, Crypto AG, US, German and Swiss media reported Tuesday. Together they rigged Crypto's equipment to be able to easily break the codes and read the government's messages, according to reports by the Washington Post, German television ZTE and Swiss state media SRF. - 'Coup of the century' -.
In a massive win for privacy rights, the advocate general advising the European Court of Justice has said that national security concerns should not override citizens' data privacy. In essence, the issue was whether national governments can oblige private parties - in this case, mostly ISPs - to hand over personal details by simply saying there were national security issues at hand.