Lyn Reid

143 Flips | 4 Magazines | 1 Like | 1 Following | 55 Followers | @LynReid | Keep up with Lyn Reid on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Lyn Reid”

Invasive phone tracking: New SS7 research blows the lid off mobile security

Hacker conference Chaos Communication Congress 31c3 is under way in Hamburg, Germany right now where three SS7 talks have revealed the ease of …

Analyst: BES12 “The Most Comprehensive End-to-End Mobile Security Solution” Available

“For a theoretically dying company, BlackBerry has been very busy,” writes independent analyst Maribel Lopez in her Forbes column earlier this week. …

Edward Snowden's preferred OS has a major security flaw

Think you're safe from spies because you're using Tails, the same Linux distribution that Edward Snowden uses to remain anonymous? Unfortunately, you'll still have to be on your guard. Security firm Exodus Intelligence has revealed that the latest version of the OS, 1.1, is vulnerable to attacks …

Five schools earn NSA's excellence in cyber ops distinction

This month, the National Security Agency (NSA) announced that five schools had received its academic distinction for Centers of Academic Excellence …

Apple Confirms iOS Backdoors, But Calls Them "Diagnostic Capabilities"

Apple acknowledged that its iOS operating system for iPhones and iPads contains several previously undisclosed “diagnostic capabilities”—services that an iOS forensics expert recently described as “backdoors” that could allow broad access to a user’s personal data on those devices under certain …

Apple denies intentionally compromising iOS security, explains ‘backdoor’ features

Following an extensive security report from an iOS forensic and security expert that questioned some of Apple’s iOS tools when it comes to the user’s …

7 Ways That You (Yes, You) Could End Up On A Terrorist Watch List

Earlier this week, The Intercept published a 166-page document outlining the government's guidelines for placing people on an expansive network of terror watch lists, including the no-fly list. In their report, Jeremy Scahill and Ryan Devereaux highlighted the extremely vague and loosely defined …

The NSA’s New Partner in Spying: Saudi Arabia’s Brutal State Police

The National Security Agency last year significantly expanded its cooperative relationship with the Saudi Ministry of Interior, one of the world’s …

Stingrays, IMSI catchers: How local law enforcement uses an invasive surveillance tool.

From Ferguson to Senate hearings, the news of local police arming themselves with federal-grade equipment—tanks, riot gear, M16 rifles—has captivated …

How Did The FBI Break Tor?

Global law enforcement conducted a massive raid of the Dark Web this week. It started with the FBI takedown of Silk Road 2.0 and the arrest of its alleged operator Blake Benthall in San Francisco on Wednesday. But it quickly exploded from there, as European counterparts seized over 400 black market …

Metadata collection comes under fire in new UN anti-surveillance draft resolution

Advertisement<p>1 Comment<p>Credit: Thinkstock/Tomasz Wyszoamirski<p>Germany and Brazil have drafted a new version of an anti-surveillance resolution that the …

Meet OpenBazaar, the black market that’s part Silk Road and part eBay

Following a wave of Dark Net arrests that brought down the famous anonymous drug market Silk Road 2.0, all eyes have turned to a marketplace called …

Silk Road

Police chiefs ordered to disclose more details of undercover infiltration

Police chiefs have been ordered to disclose more details of one of its most controversial undercover techniques.<p>The order, made by an official watchdog, centres on the theft of dead children's identities. It is a practice that has attracted a lot of criticism from the public, including MPs who …

How to make sure you’re using the real Tor Browser

One of the most widely used tools for protecting online anonymity is the Tor Browser. It’s loathed by government spies and corporate data collectors, …

How Your Webcam May Be Spying on You

Remember that song from 1984, “Somebody’s watching me?” It was a great foreshadowing of things to come: These days, people really CAN watch you while you go about your business at home…through your computer. So if someone confides in you that “they’re spying on me through my computer,” don’t be too …

WSJ: A Secret U.S. Spy Program Is Using Planes to Target Cell Phones

A secret U.S. spy program used fake cell phone towers attached to airplanes to scan citizens' cell phones and collect their data, the Wall Street …

Surveillance

Evidence implicates government-backed hackers in Tor malware attacks

A hacker who was surreptitiously injecting malicious code in downloads in to part of the Tor network has been linked to a series of government-sponsored cyber attacks.<p>Tor, also known as the Onion Router, allows internet users to access sites and services anonymously by routing encrypted traffic …

Canvas fingerprinting is tracking you, and you don't even know what it is

Canvas fingerprinting?<p>Popular, heavily trafficked websites are increasingly turning to “canvas fingerprinting” in order to track your online movements. Canvas fingerprinting is extremely hard to block, hard to detect, and has become a unique identifier that logs your ‘Net history as you jump from …

First Snowden. Then tracking you on wheels. Now spies on a plane. Yes, surveillance is everywhere

US government-owned airplanes that can cover most of the continental United States are covertly flying around the country, spying on tens of thousands of innocent people’s cellphones. It sounds like a movie plot, but in a remarkable report published on Thursday, the Wall Street Journal exposed that …

Edward Snowden on the CIA's secret torture report – video

Intelligence agencies have been monitoring conversations between lawyers and their clients for past five years, government admits<p>Published: 18 Feb 2015<p>Privacy International campaign comes after tribunal rules that sharing between US and UK of intercepted communications was unlawful<p>Published: 17 Feb …

Verizon's New, Encrypted Calling App Plays Nice With the NSA

Verizon is the latest big company to enter the post-Snowden market for secure communication, and it's doing so with an encryption standard that comes …

NSA Hacking of Cell Phone Networks

The <i>Intercept</i> has published an article -- based on the Snowden documents -- about AURORAGOLD, an NSA surveillance operation against cell phone network …

Which surveillance agency just released an encryption app for kids? Answer: GCHQ

British surveillance agency GCHQ has launched an app teaching children to understand “basic encryption techniques”, despite its director having criticised technology firms for making more advanced tools available to their users.<p>Cryptoy is a free app for Android tablets, with an iPad version …

The Inside Story of How British Spies Hacked Belgium’s Largest Telco

When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical …

US Persons on Military Intelligence Sharing Databases

Steven Aftergood catches Charles McCullough, the Intelligence Community Inspector General who has resisted exercising oversight over spying, doing …

To see the changes Edward Snowden wrought, just look at your smartphone

After Edward Snowden leaked information about a wide range of government surveillance programs, many people expected a major legal shift in the world of Internet security. But calls for stricter laws may be missing the point.<p>“Most people want to see statutory change or policy change as evidence …

Irish government retroactively legalizes GCHQ surveillance revealed in Snowden docs

As reported by The Irish Times on Saturday, 6th December; "Foreign law enforcement agencies will be allowed to tap Irish phone calls and intercept …

Stop using NSA-influenced code in our products, RSA tells customers

Firm "strongly recommends" customers stop using RNG reported to contain NSA backdoor.<p>Officials from RSA Security are advising customers of the …

The Creepy, Kitschy and Geeky Patches of US Spy Satellite Launches

Since the Gemini program, NASA has allowed astronauts to design patches for the missions they fly on. There are also patches for each mission of the …