Remove 2012 Remove Hacking Remove Surveillance
article thumbnail

Russians Hack FBI Comms System

Schneier on Security

Yahoo News reported that the Russians have successfully targeted an FBI communications system: American officials discovered that the Russians had dramatically improved their ability to decrypt certain types of secure communications and had successfully tracked devices used by elite FBI surveillance teams. counterintelligence vulnerabilities.

Hacking 233
article thumbnail

On Chinese "Spy Trains"

Schneier on Security

The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance. Our allies do it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RedTorch Formed from Ashes of Norse Corp.

Krebs on Security

Flushed with venture capital funding in 2012, Norse’s founders started hiring dozens of talented cybersecurity professionals. An ad for RedTorch’s “Cheetah” counter-surveillance tech. But Norse never published that report, nor did it produce any data that might support their insider claim in the Sony hack.

article thumbnail

Chinese Supply-Chain Attack on Computer Systems

Schneier on Security

Bloomberg News has a major story about the Chinese hacking computer motherboards made by Supermicro, Levono, and others. It’s been going on since at least 2008. The US government has known about it for almost as long, and has tried to keep the attack secret: China’s exploitation of products made by Supermicro, as the U.S.

article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. Reading about the NSA’s hacking abilities will do that to you. Many have written about how being under constant surveillance changes a person. I wrote the essay below in September 2013.

article thumbnail

Russian spies are attempting to tap transatlantic undersea cables

Security Affairs

The Register reports that the secret structures of GCHQ are part of the surveillance programme codenamed “CIRCUIT” and also refers to an Overseas Processing Centre 1 (OPC-1), while another centre, OPC-2, has been planned, according to documents leaked by Snowden. SecurityAffairs – hacking, undersea cables). Pierluigi Paganini.

Wireless 145
article thumbnail

Crooked Cops, Stolen Laptops & the Ghost of UGNazi

Krebs on Security

KrebsOnSecurity has learned that many of the man’s alleged targets were members of UGNazi , a hacker group behind multiple high-profile breaches and cyberattacks back in 2012. ” who said Iza hired him to surveil Zelocchi but ultimately refused to pay him for much of the work. KrebsOnSecurity has learned that T.H.