Designed to house about 4,000 earphone-clad intercept operators, analysts and other specialists, many of them employed by private contractors, it will have a 2,800-square-foot fitness center open 24/7, 47 conference rooms and VTCs, and “22 caves,” according to an NSA brochure from the event. No television news cameras were allowed within two miles of the ceremony.
Archive for the ‘Security’ Category
Posted by conzymaris on August 16, 2012
Posted by Ron Fabre on August 15, 2012
“In short, TrapWire is surveillance software used by both private industry and the U.S. government and its allies oversees, allowing both public and private sector users to help in counter-terrorism and anti-crime efforts. The software uses algorithms and data from a variety of surveillance sources — including CCTV and human-input from spotted suspicious behavior — to, in essence, predict potentially criminal activity.”
Posted by conzymaris on January 31, 2012
At the Shmoocon hacker conference, Paget aimed to indisputably prove what hackers have long known and the payment card industry has repeatedly downplayed and denied: That RFID-enabled credit card data can be easily, cheaply, and undetectably stolen and used for fraudulent transactions. With a Vivotech RFID credit card reader she bought on eBay for $50, Paget wirelessly read a volunteer’s credit card onstage and obtained the card’s number and expiration date, along with the one-time CVV number used by contactless cards to authenticate payments. A second later, she used a $300 card-magnetizing tool to encode that data onto a blank card. And then, with a Square attachment for the iPhone that allows anyone to swipe a card and receive payments, she paid herself $15 of the volunteer’s money with the counterfeit card she’d just created. (She also handed the volunteer a twenty dollar bill, essentially selling the bill on stage for $15 to avoid any charges of illegal fraud.)
Posted by conzymaris on January 23, 2012
Jacob Appelbaum stands on stage at Linux.conf.au 2012 to deliver the final keynote on Friday morning, patiently waiting for his introduction from the conference organizer.In his hand he holds a smartphone, capturing a photograph of his audience which he later says he uploaded in case his phone is confiscated at the airport on his way back to the United States of America, of which he is ironically a citizen.
Posted by Ron Fabre on January 9, 2012
In exchange for mobile presence in India, RIM, Nokia and Apple have allegedly provided backdoor access for the Indian intelligence to spy on communication.
Those with a Blackberry, iPhone, or Nokia device are at risk.