TweakTown NewsRefine News by Category:
A hacker is claiming to have completed a massive hack, where he has said that he has leaked out photos of some of the biggest female celebrities in the world, including Jennifer Lawrence, Kim Kardashian, and many more. Lawrence's reps have confirmed that the nude photos of her are indeed real, allegedly stolen from her Apple iCloud account.
A spokesperson told HuffPost: "This is a flagrant violation of privacy. The authorities have been contacted and will prosecute anyone who posts the stolen photos of Jennifer Lawrence." The hacker claims to have videos of celebrities too, and not just nude photos, as he is offering to release more of his treasure trove in exchange for money.
Representatives for many of the celebrities are coming out claiming that the photos are "completely fake," but there are some that are real, and in this instance, Jennifer Lawrence's reps coming out and confirming the images, proves that this hack has happened and at least some of the pictures are real.
For quite a while now, we've known that the NSA has been spying on millions of citizens within the United States. But with its ICREACH search engine, the US spy agency has a Google-like internal search engine that can quickly flick through some 850 billion files that it keeps on citizens, not just in the US, but across the world.
The Intercept, the new site from Glenn Greenwald, who broke the story on NSA whistleblower Edward Snowden, says that these records are available to 23 agencies. These 23 agencies include the likes of the FBI, the DEA and much more, who can easily access ICREACH. This means that the government can search for very specific bits of data of a target citizen, such as their phone number or email address, with it displaying a list of emails both two and from that person over a certain period of time, analysts can then work out a pattern of who that person is in contact with.
This is achieved thanks to metadata, but don't worry ICREACH doesn't include what was said within a phone call, but it does include who the person was talking to, who called them, and what time the call took place. This data can then be used to determine the target's pattern of behavior, so that if the target was calling a certain person at a particular time, they could plan for that time and listen in.
According to CNN reporter Evan Perez, authorities are now claiming there is a second leaker exposing classified secrets on the government surveillance programs. There has been speculation of a second leaker for a while now, especially from Glenn Greenwald's new outlet, The Intercept.
But, there have been two new stories posted recently that cited unnamed sources, meaning the information given and reported on wasn't coming from Snowden. One of which was from August 2013, months after Snowden had downloaded his documents when he was working with Booz Allen Hamilton in Hawaii, before giving them to Greenwald when he left the country for Hong Kong, before finding solace (in a way) in Russia.
Greenwald said back in July that it "seems clear at this point" that there was a second leaker. We don't know who this second leaker is, but I'm sure after everything Snowden has gone through, he or she won't be unveiling themselves to the world anytime soon.
It was only a year ago that the German government considered the Xbox One to be a monitoring device, and this was at the time of NSA whistleblower Edward Snowden coming out about the NSA spying on the entire world.
Well, the German government is now considering shifting back to the old-fashioned way of writing documents: using a typewriter. The use of a typewriter would be used to type up confidential documents, so that they don't get typed up on a PC, that has an operating system that can be hacked, which is connected to a network. A typewriter can have someone type up a confidential document, finish it, and file it away - without the prying eyes of the NSA getting to it.
Chair of the German Parliament, Patrick Sensburg, has an enquiry into the alleged spying by the NSA, saying that committee members are considering new security measures and are thinking about ditching e-mail in favor of a serious move back to using typewriters. He told the ARD Morning Show Monday: "As a matter of fact, we already have [a typewriter], and it's even a non-electronic typewriter".
It was only a couple of months ago that a New York judge ruled that US search warrants applied to digital information, even if this data was stored somewhere overseas. This happened because of an effort to find a Microsoft user's account information that was stored overseas, in Dublin, Ireland.
The Redmond-based software giant responded to the ruling, challenging it, stating that the US government's longstanding views of digital content on overseas servers was wrong, and that the protections applied to physical media should be extended to cover digital content, too. The US government has replied, saying that according to the Stored Communications Act (SCA), content that is stored online doesn't have the same Fourth Amendment protection as physical data.
The US government said in a statement: "Overseas records must be disclosed domestically when a valid subpoena, order, or warrant compels their production. The disclosure of records under such circumstances has never been considered tantamount to a physical search under Fourth Amendment principles, and Microsoft is mistaken to argue that the SCA provides for an overseas search here. As there is no overseas search or seizure, Microsoft's reliance on principles of extra-territoriality and comity falls wide of the mark".
It looks like Edward Snowden might not be the only NSA whistleblower according to Glenn Greenwald, with the tease coming from Greenwald who tweeted over the weekend that the fact of a second US whistleblower "seems clear at this point".
Greenwald believes there is a second US whistleblower that is leaking information about the NSA to media around the world. Greenwald added: "The lack of sourcing to Snowden on this & that last article seems petty telling". The tweet was made after a German site published an analysis of the NSA's XKEYSCORE code, which doesn't seem to have some from Snowden.
It was only after this that speculation of a second US whistleblower began, with experts agreeing that it looks like Snowden isn't alone. ARD, a German public broadcaster, said in a report last week that the NSA is using its XKEYSCORE program to track Internet users who search the web on how to stay hidden when on the Internet. Greenwald added: "I've long thought one of the most significant and enduring consequences of Snowden's successful whistleblowing will be that he will inspire other leakers to come forward".
When Edward Snowden blew the lid on the NSA's spying last year, everything changed. The NSA has asid that even though it intercepts pretty much every single person's communications, it only "targets" a very small number of these people.
This smaller percentage of traffic is flagged as a pattern, or suspicious by the NSA, which then starts their data retention. These targets don't see their data flushed from NSA databases on a 48-hour or 30-day basis like the rest of the world, instead their data is kept forever. This news comes from German site Tagesschau, where Lena Kampf, Jacob Appelbaum and John Goetz reported the NSA's rules on what is deemed a "target" to the US spy agency.
They report that the NSA targets anyone who searches for online articles about Tails, or Tor. Anyone who even uses Tor becomes an instantly target for long-term surveillance and data rentention. Both Tor and Tails have been part of the mainstream discussion for online security, surveillance and privacy for quite sometime. For the NSA to just instantly put surveillance and retention on these people is yet another step of unbelievable, in an already unbelievable breach of users' privacy and rights.
If you're worried about someone snooping through your e-mail, you might want to take a look at ProtonMail. The new e-mail service is being heralded as being "NSA-proof," something that was created by a group of Harvard and MIT students.
ProtonMail was created by five founders, who all met at the European Organization for Nuclear Research (CERN) in Switzerland. They were each looking for an e-mail service that was more secure than Lavabit, which is what NSA whistleblower Edward Snowden was using until it disappeared. ProtonMail uses end-to-end encryption, with the founders using heavy user authentication measures. This, according to the founders, ensures that your data is inaccessible to the ProtonMail team, let alone a government or spy agency.
Andy Yen, one of ProtonMail's creators, spoke with Bostinno, where he said: "Even we don't have the ability to read that email. If we can't read it, we obviously can't turn it over to any government agencies". There's also a SnapChat-like feature built into ProtonMail, where users can program their e-mails to self-destruct once they have reached the recipient's inbox, or after a certain amount of time.
After months of waiting on an official answer from the US Government, Apple, Google and Facebook say that they are tired of waiting and will begin notifying users of how often and when the government request their data be handed over. The big 3 have said that they all have begun updating their privacy policies to reflect this change as well.
"Later this month, Apple will update its policies so that in most cases when law enforcement requests personal information about a customer, the customer will receive a notification from Apple," company spokeswoman Kristin Huguet said. It's still unsure how the notifications will be handled per company, but the major win here is that it seems like the major tech companies are finally starting to fight back for the consumer.
We all know by now that the FBI, CIA and NSA request information on us from big tech giants such as Apple, Microsoft, Facebook and Google, but did you know that Microsoft sends a massive invoice every time it gives away your private information? A newly released document shows that at least in one incident, Microsoft billed the government as much as $15,600 for information that was requested.
The Syrian Electronic Army hacker group has just leaked details that show Microsoft billing the US government more than $350,000 on September 5th of 2013. The invoice appears to show that more than 78 invoices for request were sent to the government, with the highest being shown set at a whopping $15,600.00.