Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Unexpected Stories from a Hacker inside the Government 5: A Tribute to Barnaby Jack

This is the closing part where Peiter Zatko tells the Defcon community two hilarious stories from his reminiscence of the famous white hat hacker Barnaby Jack. 5. A Tribute to Barnaby Jack Okay, so let me try and give my Barnaby one without actually breaking down into tears here. Let’s see if I pulled...

Unexpected Stories from a Hacker inside the Government 4: Hacker Equals Researcher, Not Criminal

This part is dedicated to the interactions between the Government and the hacker researcher communities, also covering recommendations to both parties. Government communities and the hacker researcher communities Now the fourth story, and maybe I’ll do the fifth story about Barnaby Jack and Abu Dhabi –...

Unexpected Stories from a Hacker inside the Government 3: Game Theory Is a Bitch

Mudge now shares some of his thoughts about why the Government tends to stay with the same contractors even after their tech findings have been compromised. 3. Game theory is a bitch My third story is … well, let me give you a little background. I’ve got a lot of people approach me outside of work and...

Unexpected Stories from a Hacker inside the Government 2: DoD’s Controversial Message

Another story by Mudge is about how blurred and poorly worded statements of the Government agencies can pull off cyber attacks by movements like Anonymous. 2. Department of Defense vs. Anonymous The second story is about Anonymous and the Department of Defense. I remember Anonymous from way back. I mean,...

Unexpected Stories from a Hacker inside the Government

Peiter C. Zatko, aka Mudge, a well-known former member of the L0pht and ex-researcher at DARPA, tells a few stories from his past experience at Defcon. Just so we’re clear, I’m only speaking as myself today. I am not a representative of the U.S. Government; I am not a representative of my current...

The Next Crypto Wars 6: Obstacles to Dragnet Surveillance

Winding up with the Defcon talk, Chris Soghoian highlights the merits of the companies that focus on user data security rather than usability only. Meanwhile The FBI has this team of agents who are doing nothing but delivering malware to the computers of surveillance targets. We only have a couple of cases...

The Next Crypto Wars 5: Government Contractors’ Activity Revealed

ACLU’s Chris Soghoian now delves into how he discovered the activities of contractor company employees supporting the Government’s hacking endeavors. What about the Feds? The feds have the big bucks, federal law enforcement agencies in the United States have enough money to use bespoke custom malware....

The Next Crypto Wars 4: Surveillance Tools by Gamma and Hacking Team

Chris Soghoian’s focus in this entry is on private sector companies providing assistance to the government by developing tools for intercepting communications. Government Hacking Alright, so if they can’t force Google to put a backdoor in Android OS, and if they can’t force Apple to put a backdoor in...

The Next Crypto Wars 3: Government Mandating Backdoors

Chris Soghoian zeroes in on the government’s attempts to circumvent privacy measures by the Silicon Valley companies that all came to employ encryption. Silicon Valley vs. telco surveillance What we have seen in the last few years is a transition. We’ve seen a migration away from telecommunications...

The Next Crypto Wars 2: Going Dark

Delving further into crypto evolution, Chris Soghoian focuses on the relationship between law enforcement and companies that adopted strong privacy algos. Going Dark And so, things were good for a while. It didn’t really matter that your browser could do strong crypto. It didn’t really matter that you...