House hurtles toward showdown over expiring surveillance tools

At issue is Section 702 of the Foreign Intelligence Surveillance Act, which authorizes snooping that some consider vital to security and others view as an out-of-control privacy threat.

The post House hurtles toward showdown over expiring surveillance tools appeared first on CyberScoop.

Continue reading House hurtles toward showdown over expiring surveillance tools

Declassified NSA Newsletters

Through a 2010 FOIA request (yes, it took that long), we have copies of the NSA’s KRYPTOS Society Newsletter, “Tales of the Krypt,” from 1994 to 2003.

There are many interesting things in the 800 pages of newsletter. There are many redactions. And a 1994 review of Applied Cryptography by redacted:

Applied Cryptography, for those who don’t read the internet news, is a book written by Bruce Schneier last year. According to the jacket, Schneier is a data security expert with a master’s degree in computer science. According to his followers, he is a hero who has finally brought together the loose threads of cryptography for the general public to understand. Schneier has gathered academic research, internet gossip, and everything he could find on cryptography into one 600-page jumble…

Continue reading Declassified NSA Newsletters

Confronted with Chinese hacking threat, industrial cybersecurity pros ask: What else is new? 

At the world’s largest industrial cybersecurity conference, Beijing’s operations targeting U.S. critical infrastructure was just one concern among many.

The post Confronted with Chinese hacking threat, industrial cybersecurity pros ask: What else is new?  appeared first on CyberScoop.

Continue reading Confronted with Chinese hacking threat, industrial cybersecurity pros ask: What else is new? 

Hackaday Links: March 10, 2024

Hackaday Links Column Banner

We all know that we’re living in a surveillance state that would make Orwell himself shake his head, but it looks like at least one company in this space has …read more Continue reading Hackaday Links: March 10, 2024

APT29 revamps its techniques to breach cloud environments

Russian threat actors APT29 are changing their techniques and expanding their targets to access cloud environments, members of the Five Eyes intelligence alliance have warned. About APT29 APT29 (aka Midnight Blizzard, aka Cozy Bear) is a cyber espionag… Continue reading APT29 revamps its techniques to breach cloud environments