Tuesday, November 21, 2017
Search

Backdoors - search results

If you're not happy with the results, please do another search

UK Parliament Report Rejects Encryption Backdoors, Other Parts of Sweeping Surveillance Bill

Today, the UK Parliament's Draft Investigatory Powers Bill Joint Committee — a group of Members of Parliament charged with assessing a draft of sweeping...
video

Video: The End of Encryption? NSA & FBI Seek New Backdoors Against Advice from...

http://democracynow.org - FBI Director James Comey is set to testify against encryption before the Senate Intelligence Committee today, as the United States ... Via Youtube

Author Of The Patriot Act: Government Backdoors Into iPhones Are Unnecessary

Michael Chertoff , co-author of the Patriot Act, a set of laws that provided the US government with broad surveillance powers in the wake...

Apple has installed security backdoors on 600m iPhones and iPads, claims security researcher

Apple says its diagnostic tools "do not compromise user privacy" but researchers say the un-publicised tools give access to 'excessive' data Apple has been accused...

Skeptics on NSA Reform: Beware the ‘Backdoors and Loopholes’

Jon Queally  RINF Alternative News 'Bill to curb NSA spying looks like change, but isn’t really.' That's the headline on the latest McClatchy reporting focused an a series of...

Wray Confirmed as FBI Director as Questions Swirl Over His Past Record, Close Ties...

The Senate on Tuesday confirmed Christopher Wray as the next director of the FBI, but in an unprecedented move, five senators voted against his...

‘Japanese-paid’ neoconservative think tank hypes Chinese threat to Britain

A British neoconservative think tank, recently accused of being paid by the Japanese embassy to...

The Best Foods for Survival

Upon request from our readers, I was asked to make a follow-up to the MRE article. In there, I had mentioned that creating your...

No Green Thumb?

Gardening is a skill and anyone who tells you something different is not being totally honest.  That being said, having a successful gardening experience...

Leaked NSA exploit blamed for global ransomware cyberattack

A zero-day vulnerability tool, covertly exploited by US intelligence agencies and exposed by the Shadow Brokers...

Why Does Anyone Need These?

One of the cornerstones of being prepared is to identify items that multitask and to embrace their use during normal times.  Doing so not...

Harvest Rainwater for Survival and Self-Sufficiency

APPIP ERROR:nodata[ (0) NO DATA Living in the desert has taught me not to take water for granted.  Unlike the Pacific Northwest, I am...

Useful idiots? Japanese embassy pays British think tank to plant anti-China stories

The neoconservative Henry Jackson Society (HJS) think tank is on the payroll of the Japanese embassy, charged with drafting in public figures to spread...

Is It Safe To Use Expired Prescription Drugs?

The topic of using expired prescription drugs comes up frequently in survival and preparedness circles.  Although there are many articles detailing with the efficacy...

What’s the Best Way To Store Your Batteries?

How much do you know about storing household batteries for the long term?  Until I started prepping, I did not have a clue.  Even...

25 Must-Have Items for Your Survival Hygiene Kit

By Gaye Levy Backdoor Survival August 24, 2016 The Oxford English Dictionary defines hygiene as: “Conditions or practices conducive to maintaining health and preventing disease, especially through...

23 Brilliant Real-Life Uses

Anyone with a modicum of cleverness can come up with the list of 50 ways to do this or 50 ways to do that. ...

The Big Challenge of Finding Your Survival Retreat

There comes a time when every prepper takes a look at what they have done, what they are currently doing, and what they plan...

15 Things To Do Now

Spend ten minutes on the web surfing the keywords “prepping skills” and you will be presented with the site after site preaching the gospel...

Why Learn Morse Code?

This article is about Morse code and why, as a prepper,you should learn just a smattering for survival purposes.  Before you groan, hear me...

DOJ faces legal fight with EFF over US govt ‘secret’ surveillance requests

A digital rights group is suing the US Justice Department over secret court orders it suspects...

Cryptowars: UK activist fears US extradition, 99yr sentence for refusal to surrender encryption keys

UK authorities are trying to force a 31-year-old computer scientist accused of hacking into the...

Decrypt or else: Draft encryption bill says tech companies must comply with court orders

A leaked draft of a Senate bill addressing the fight between Apple and the FBI over...

Why is GCHQ boss encouraging activists and journalists to use the Tor network?

Mick Meaney (RINF) - During a speech at MIT, GCHQ chief Robert Hannigan suspiciously praised the Tor network, and encouraged the use of the technology which offers anonymous protection...

Your Business Been Hacked? Thanks NSA!

It appears that the NSA (“or someone”) hacked into the code of a popular firewall and planted a password in there that would allow...

GCHQ handed new smartphone-hacking legal powers

Spy agencies in Britain will be given the explicit right to hack into smartphones and computers as part of a new law being introduced...

FBI’s Proposals for Mandatory Tech Security ‘Back Doors’ Is Slammed by Bipartisan Committee

An FBI proposal to force companies to provide law enforcement with so-called back doors into consumer phones and computers would be like “drilling a...

5 Ways Mass Surveillance Is Destroying the US Economy

Via Washington's Blog with permission Prosperity Requires Privacy Privacy is a prerequisite for a prosperous economy. Even the White House admits: People must have confidence that data will travel...

FBI Director: Government Surveillance ‘Enhances Liberty’

As technology companies enhance their user security software, FBI director James Comey said the government should expand its surveillance laws Nadia Prupis In a speech on...

NSA Documents Suggest a Close Working Relationship Between NSA, U.S. Companies

Documents describe “contractual relationships” between NSA and U.S. companies, as well as undercover operatives at some U.S. companies. Jeff Larson and Julia Angwin Newly disclosed National...

Our National Security State Knows Everything about You but Nothing about the World

Americans are trading away their privacy, civil liberties, and billions of tax dollars for an intelligence complex that never seems to know what's going...

FBI informant organized Anonymous hackers’ attacks on government sites in 30 countries

Government websites in the UK, Australia and more than two dozen other countries were provided by an undercover FBI informant to a hacker involved...

Failure Is Success: How US Intelligence Works in the 21st Century

What are the odds? You put about $68 billion annually into a maze of 17 major intelligence outfits. You build them glorious headquarters. You...

5 Ways that Mass Surveillance Destroys the Economy

Reprinted with permission Privacy is a prerequisite for a prosperous economy.   Even the White House admits: People must have confidence that data will travel to its destination...

U.S. Government at War With Itself Over Civil Liberties

Over the past year, the United States government has been in the news a lot for its efforts to undermine the Internet’s basic privacy...

Congress Decides This Week Whether to Shut the NSA Backdoor: Here’s How You Can...

The NSA may seem like an intimidating giant, but it has a serious Achilles' heel– the enormous budget it claims from taxpayer dollars every year. While change...

A Big Fat List Of Essential Oils For Preppers

The world is a scary place. It is not as though we are intentionally trying to live dangerously, it kind of, sort of just...

Beyond Prepping: 72 Ideas That Will Simplify Your Life

Gaye Levy RINF Alternative News Every once in awhile, I come across something that is perfect just the way it is. It could be a list,...

The US Government: Paying to Undermine Internet Security, Not to Fix It

Julia Angwin The Heartbleed computer security bug is many things: a catastrophic tech failure, an open invitation to criminal hackers and yet another reason to upgrade our passwords on dozens of websites....

Security Experts Call on Tech Companies to Defend Against Surveillance

Open Letter to Tech Companies Includes 10 Principles to Protect Users From NSA Sabotage Yan Zhu  RINF Alternative News In the past nine months, our trust in...

20 Tips for Soldiering Through an Economic Meltdown

Gaye Levy  Three years ago, I wrote about our deteriorating economy. As I recall, the words were “current lousy economy”. The good news is that...

Privacy in the Age of Surveillance

Dinah PoKempner  RINF Alternative News President Obama had a signature opportunity in his January speech to limit the damage Edward Snowden’s revelations about National Security Agency...

The surveillance Wild West – Your secrets for sale

Pratap Chatterjee  RINF Alternative News The Invisible World of Software Backdoors and Bounty Hunters Imagine that you could wander unseen through a city, sneaking into houses and...

NSA Super Computer Part of ‘Owning The Net’ Paradigm?

New reporting from the Washington Post, based on documents leaked by NSA whistleblower Edward Snowden, revealed Thursday that the spy agency has "been racing...

Apple Denies Ever Working With The NSA

Zero HedgeJanuary 1, 2014 Yesterday, we broke the story that during the 30th Chaos Communication Congress,...

Sorry for letting them snoop? Dell apologizes for ‘inconvenience’ caused by NSA backdoor

Security researcher Jacob Appelbaum dropped a bombshell of sorts earlier this week when he accused American tech companies of placing government-friendly backdoors in their...

The NSA is Building the Foundation for a Global Police State

Eric Sommer RINF Alternative News  The US National Security Agency (NSA) is building the foundation for a global police state. This is not an exaggeration. The...

NSA has complete control of your iPhone, can activate your microphone and camera without...

Joshua CookBen Swann.comDecember 31, 2013 Leaked documents now show what we all suspected: the NSA can...

NSA ‘installing’ spy malware on laptops

According to a new report from Der Spiegel based on internal NSA documents, the signals intelligence agency's elite hacking unit (TAO) is able to...

Non-denying denial? RSA aims to distance itself from NSA scandal

Security firm RSA denies accusations that it entered into a secret contract with the National Security Agency to promote the use of weak security...

White House Releases Findings of Internal NSA Review

(Photo: Evan Vucci/AP)The White House announced Wednesday the release of the findings from a presidential advisory committee review of NSA surveillance practices.Though progressive analysts...

The Hero and the Villains: The Jeremy Hammond Sentence

This past Friday, Internet activist Jeremy Hammond stood in a federal courtroom and told Judge Loretta A. Preska why he released a trove of...

Jeremy Hammond: FBI Directed My Attacks on Foreign Government Sites

Hammond said: 'I took responsibility by pleading guilty, but when will the government be made to answer for its crimes?' (Photograph: Michael Gottschalk/AFP)The Anonymous...

New Xbox to Produce Child Porn

Xbox One will be able to see your kids' privates Adan Salazar If the successes of its past game console launches are any indicator, sales of...

The U.S. Secret State and the Internet: “Dirty Secrets” and “Crypto Wars” from “Clipper...

Back in the 1990s, security researchers and privacy watchdogs were alarmed by government demands that hardware and software firms build “backdoors” into their...

RINFORMATION

USA Topics 9/11 Agenda 21 Assassinations Banks Bush, George Jr Boston Bombings Bohemian Grove CIA Cointelpro Corruption DARPA Democrats Disinformation Congress Drones Eugenics FBI Federal Reserve Guantanamo HAARP ...

American authorities charge UK man with hacking Army, Missile Defense Agency and NASA websites

A 28-year-old man from Stradishall, England has been charged in the United States with hacking into US government and military computers, stealing sensitive data...

CryptoSeal VPN service opts to close down rather than grant NSA access

Published time: October 21, 2013 22:45 AFP Photo / David Gannon CryptoSeal, a virtual private network that has guaranteed its customers would be insulated...

Government Lies About Spying Again and Again … Here’s What’s REALLY Going On

Government Officials Fail Honesty Standards of 12 Year Olds Government leaders have been caught in lie after lie about spying … but keep on spouting new lies: The...

NSA’s Attack on Privacy Tools Puts Global Online Security at Risk

According to new reporting by The Guardian, the NSA and the U.K.'s GCHQ have developed complex and "dangerous" programs to infiltrate the encryption and...

The Man In Charge Of The NSA Modeled His Office After The Bridge Of...

Zero Hedge Privacy: the final frontier. These are the voyages of the NSA, as it enters every computer and pries whatever data can be stolen...

The End of Internet Privacy? Glenn Greenwald on Secret NSA Program to Crack Online...

via Shutterstock )' width="400" height="400">(Image: via Shutterstock).A new exposé based on the leaks of Edward Snowden has revealed the National Security Agency...

Legal loophole: US offers no apologies for hacking internet encryptions

The US Director of National Intelligence has issued a statement in response to a report revealing that the National Security Agency, with help from...

The feds pay for 60 percent of Tor’s development. Can users trust it?

Brian Fung The Washington Post September 6, 2013 This week, we learned that the NSA had managed to circumvent much of the encryption that...

‘UK, US spies defeat internet privacy’

Privacy further undermined; British & U.S. spying agencies defeat online encryption Freshly disclosed top-secret files show the UK and U.S. spying agencies have had...

Hacker pleads guilty to selling FBI 'supercomputer' secrets

A Pennsylvania man affiliated with the Underground Intelligence Agency hacker collective has pleaded guilty in connection to selling access to US Energy Department servers...

Xbox Nixes Kinect Device Requirement

Platform’s second major revision this year Adan SalazarInfowars.comAugust 15, 2013 Privacy-minded gamers concerned over the...

The Rise of the Internet Dissidents

NSA whistleblower Edward Snowden’s volcanic revelations of ubiquitous US surveillance are in their third month. The aftershocks felt around the world continue. As Russia...

Circumventing Invasive Internet Surveillance with “Carrier Pigeons”

Introduction Recent disclosures have revealed the extreme level of surveillance of telephone and internet communications, as discussed separately with respect to the US National...

Is the Government Spying On You Through Your Own Computer’s Webcam Or Microphone?

Washington’s BlogJune 25, 2013 We documented earlier today that - if you are near your smart...

Is the Government Spying On You Through Your Own Computer’s Webcam Or Microphone?

Government — Or Private Individuals — May Be Watching and Listening We documented earlier today that - if you are near your smart phone —...

The Obama Regime: What the NSA Revelations Tell Us about America’s Police State

Ongoing revelations by The Guardian and The Washington Post of massive, illegal secret state surveillance of the American people along with advanced plans for...

Rep. Steve Stockman says, ‘I really did call, just ask Obama!’

Donna AndersonInfowars.comJune 12, 2013 In response to media concerns over reports that the NSA...

How the Chinese Exploited the Shady Relationship Between US Spymasters and Google

Silicon Valley is now ground zero of the biggest espionage struggles facing the United States since the height of the Cold War.

MiniDuke: New cyber-attack ‘hacks governments’ for political secrets

Published time: February 27, 2013 21:35

Image from flickr.com user@dustball

The governments of at least 20 countries may have fallen victim to a sophisticated new cyber-attack. Security experts believe the hackers are attempting to steal political intelligence.

The governments of at least 20 countries may have fallen victim to a sophisticated new cyber-attack. Security experts believe the hackers are attempting to steal political intelligence.

Computer security firms Kaspersky Lab and CrySyS Lab discovered that the malware, dubbed "MiniDuke," targeted government computers in the Czech Republic, Ireland, Portugal and Romania along with think tanks, research institutes and healthcare providers in the United States.

“The technical indicators from our analysis show this is a new type of threat actor that hasn't been seen before,” Kurt Baumgartner, a senior security researcher with Kaspersky Lab, told RT.

Although experts avoid speculating on who the attackers may be, Baumgartner clarified that “based on the target victims and the functionality of the malware” the objective of MiniDuke’s authors is “to collect geopolitical intelligence.”

The threat operates on low-level code to stay hidden, and uses Twitter and Google to get instructions and updates. It allegedly infected PCs when ‘victims’ opened a cleverly disguised Adobe PDF attachment to an email.

“The high level of encryption in the malware and the flexible system it used to communicate with the C2 via Twitter and Google indicates this was a strategically planned operation,” Baumgartner said.

The PDF documents were specifically tailored to their targets, according to the researchers. The attachments referred to highly relevant topics subjects like “foreign policy,” a “human rights seminar,” or “NATO membership plans."

When the files were opened, MiniDuke would install itself on the user's computer.

So far it is only known that the malware then connects to two servers, one in Panama and one in Turkey, but security researchers say there are no clear indications of who was behind the online attacks.

According to Karpersky Lab the spyware was written in “assembler language,” a low-level code where each statement corresponds to a specific command, and is very small in size, only 20 kilobytes. Assembler language codes are written specifically for each system they are meant to attack, as opposed to higher-level codes, which can infect multiple types of technologies.

The way the malware was created and used indicates that the attackers “have knowledge from the elite, ‘old school’  type of malicious programmers who were extremely effective at creating highly complex viruses in the past,” Baumgartner says. “MiniDuke’s attackers have combined these skills with the newly advanced sandbox-evading exploits to target high-profile victims, which is unique and something we haven’t seen before.”

MiniDuke is a three-stage attack, technology news and information website, Arstechnica, explains. First it tricks a victim into opening an authentic-looking PDF document, and then infected machines start using Twitter or Google “to retrieve encrypted instructions showing them where to report for additional backdoors.”

"These accounts were created by MiniDuke’s Command and Control (C2) operators and the tweets maintain specific tags labeling encrypted URLs for the backdoors,” Kaspersky Lab said in a statement. “Based on the analysis, it appears that the MiniDuke’s creators provide a dynamic backup system that also can fly under the radar - if Twitter isn’t working or the accounts are down, the malware can use Google Search to find the encrypted strings to the next C2.

Stages two and three are hidden inside a GIF image file which is downloaded from the command server and “disguised as pictures that appear on a victim’s machine.”

Image from securelist.com

Eugene Kaspersky, founder and chief executive of Kaspersky Lab, compared the highly-advanced MiniDuke to “malicious programming from the end of the 1990s and the beginning of the 2000s”, saying it has the potential to be "extremely dangerous" because it was an "elite, old-school" attack.

"This is a very unusual cyber-attack," the statement emailed to RT read.

"I remember this style of malicious programming from the end of the 1990s and the beginning of the 2000s. I wonder if these types of malware writers, who have been in hibernation for more than a decade, have suddenly awoken and joined the sophisticated group of threat actors active in the cyber world. These elite, “old school” malware writers were extremely effective in the past at creating highly complex viruses," Kaspersky's CEO added.

Neither Kaspersky nor CrySyS is disclosing what the malware does once it takes hold of a victim until they have had a chance to privately warn infected organizations, Arstechnica reported.

According to the technology news and information website, at least 60 victims have been affected. Kaspersky has identified at least 23 affected countries, including the US, Hungary, Ukraine, Belgium, Portugal, Romania, the Czech Republic, Brazil, Germany, Israel, Japan, Russia, Spain, the UK, and Ireland.

Revelations about the new malware come two weeks after Silicon Valley security firm FireEye discovered security flaws in Reader and Acrobat software.

Leaked document sample. Image from securelist.com


27 Items Every Prepper Should Carry While Traveling

Gaye Levy, Activist Post |  This is the time of year when families travel to visit friends and relatives near and far. When taking a road trip,...

Are biotech GMO corporations plotting to steal the election on Proposition 37?

NaturalNews | I'm hearing grumblings through the grapevine that an effort may be underway to steal the election against Proposition 37. So far, these are just rumors,...

Comparison of the two Giants – Linux vs. Windows

Even if you’re a dedicated Windows user you have probably at least heard of Linux, and it may be possible you even know a...

Europeans could get access to UK ID database

By Lewis Page News emerged yesterday of a mysterious international ID card plan, described by the Tories as "a European-wide identity card project called Project...

FOIA Documents Detail FBI Surveillance Network

By Ryan Singel The FBI has quietly built a sophisticated, point-and-click surveillance system that performs instant wiretaps on almost any communications device, according to...