Quantcast

Archive: Aug 2014

Unexpected Stories from a Hacker inside the Government 4: Hacker Equals Researcher, Not Criminal

This part is dedicated to the interactions between the Government and the hacker researcher communities, also covering recommendations to both parties. Government communities and the hacker researcher communities Now the fourth story, and maybe I’ll do the fifth story about Barnaby Jack and Abu Dhabi –...

Unexpected Stories from a Hacker inside the Government 3: Game Theory Is a Bitch

Mudge now shares some of his thoughts about why the Government tends to stay with the same contractors even after their tech findings have been compromised. 3. Game theory is a bitch My third story is … well, let me give you a little background. I’ve got a lot of people approach me outside of work and...

Unexpected Stories from a Hacker inside the Government 2: DoD’s Controversial Message

Another story by Mudge is about how blurred and poorly worded statements of the Government agencies can pull off cyber attacks by movements like Anonymous. 2. Department of Defense vs. Anonymous The second story is about Anonymous and the Department of Defense. I remember Anonymous from way back. I mean,...

Unexpected Stories from a Hacker inside the Government

Peiter C. Zatko, aka Mudge, a well-known former member of the L0pht and ex-researcher at DARPA, tells a few stories from his past experience at Defcon. Just so we’re clear, I’m only speaking as myself today. I am not a representative of the U.S. Government; I am not a representative of my current...

The Next Crypto Wars 6: Obstacles to Dragnet Surveillance

Winding up with the Defcon talk, Chris Soghoian highlights the merits of the companies that focus on user data security rather than usability only. Meanwhile The FBI has this team of agents who are doing nothing but delivering malware to the computers of surveillance targets. We only have a couple of cases...

The Next Crypto Wars 5: Government Contractors’ Activity Revealed

ACLU’s Chris Soghoian now delves into how he discovered the activities of contractor company employees supporting the Government’s hacking endeavors. What about the Feds? The feds have the big bucks, federal law enforcement agencies in the United States have enough money to use bespoke custom malware....

The Next Crypto Wars 4: Surveillance Tools by Gamma and Hacking Team

Chris Soghoian’s focus in this entry is on private sector companies providing assistance to the government by developing tools for intercepting communications. Government Hacking Alright, so if they can’t force Google to put a backdoor in Android OS, and if they can’t force Apple to put a backdoor in...