Below are stories from my time as a technical expert and security advisor at the Washington Post where I co-authored articles about the Snowden documents and other privacy news. I also appear in the occasional video segment explaining the stories.
Articles on the Snowden Files
|Privacy watchdog’s next target: the least-known but biggest aspect of NSA surveillance The Privacy and Civil Liberties Oversight Board plans to review signals intelligence collection under Executive Order 12333. Read our analysis here.|
|In NSA-intercepted data, those not targeted far outnumber the foreigners who are Barton Gellman, Julie Tate, and I break the news that the vast majority of communications intercepted by the NSA were from individuals who were not the intended surveillance target. You can read the article here and see a more detailed graphic of the communication breakdown here. Additionally, Barton wrote a behind-the-scenes look at how we report on these documents which is available here.|
|NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls We report on the NSA’s ability to record 100% of a foreign country’s calls and review them with TiVo-like capability.|
|Italian spyware firm relies on U.S. Internet servers The Italian company uses servers in America to hack on journalists and activists around the world. While not part of the reporting on the Snowden files, this article discusses tools of government surveillance.|
|NSA uses Google cookies to pinpoint targets for hacking Intelligence agencies leverage commercial tracking cookies used by Google to identify otherwise anonymous web users.|
|Panel urges new curbs on surveillance by U.S. A 5-member panel appointed by President Obama prepared a 300 page report recommending significant limits on government surveillance. Read the report here.|
|By cracking cellphone code, NSA has capacity for decoding private conversations The outdated encryption technology used in most cell phones is vulnerable to attacks from hackers, foreign operators, and government surveillance.|
|New documents show how the NSA infers relationships based on mobile location data Following a person’s cell phone as it searches for towers can reveal a lot of information about a person, including whether or not they are following an American agent abroad.|
|NSA tracking cellphone locations worldwide, Snowden documents show The NSA collects massive amounts of cell location records to determine if anyone, including US citizens, are co-traveling with suspected targets.
|NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say The NSA taps into the private lines of connecting the data centers of email providers like Gmail, scooping up American’s information in the process.
Related: How we know the NSA had access to internal Google and Yahoo cloud data
|NSA collects millions of e-mail address books globally The NSA intercepts e-mail address books and “buddy lists” from instant messaging services, including those of Americans, to the tune of 250 million a year.
Related: Here’s everything you should know about NSA address book spying in one FAQ
|Secret NSA documents show campaign against Tor encrypted network The Washington Post reports on a 49-page research paper produced by the NSA that describes tactics to unmask TOR users. Read more.|
Privacy and Security News
|FBI warns industry of Chinese cyber campaign The FBI has issued a private warning to industry that a group of highly skilled Chinese government hackers was in the midst of a long-running campaign to steal valuable data from U.S. companies and government agencies.|
|The ethics of Hacking 101 Professors at key universities are players in a controversial area of technology: the teaching and practice of what is loosely called “cyberoffense.” Unsurprisingly, ethics is a big issue in this field. (Photo by Ashkan Soltani)|
|Apple’s new feature to curb phone tracking won’t work if you’re actually using your phone A highly praised privacy feature, first revealed by Apple in June, is designed to prevent unwanted retail tracking that occurs as consumers move around malls. But the feature only works on select phones, namely the iPhone 5s, when the phone is locked and location capabilities such as GPS are disabled.|
|Tech firm tries to pull back curtain on surveillance efforts in Washington For years, researchers have warned of the growing prevalence of ISMI equipment. We take a ride with cellphone security specialists to understand the prevalence of mobile spygear in the Washington area.|
|Yahoo’s uphill battle to secure its users’ privacy After years of pressure from experts, Yahoo announced it is increasing the security of its services including securing traffic that moves between their servers and encrypting most search queries automatically.|
|Companies e-mail sensitive data to law enforcement The Syrian Electronic Army posted stolen documents online that include emails between Microsoft’s government compliance staff and various law enforcement officers. These emails indicate that Microsoft sends sensitive data without sufficient security. There are no laws requiring that information sent as part of criminal law enforcement investigations be kept secure.|
|Research shows how MacBook Webcams can spy on their users without warning Researchers at Johns Hopkins University confirm statements by Marcus Thomas, former assistant director of the FBI’s Operational Technology Division in Quantico, that it is possible to turn on some MacBook cameras without the telltale light also activating.|
|Dictionary.com dubs ‘privacy’ their word of the year. But visiting their homepage sets 90 cookies.|
|Why Apple’s claim that it can’t intercept iMessages is largely semanticsMy take on a debate over whether or not iMessages are completely safe from prying NSA eyes. Spoiler alert: I don’t think they are.|
|Yahoo to make SSL encryption the default for Webmail users. Finally. As a direct response to our reporting about the NSA’s collection of user’s address books and chat buddies, Yahoo announces plans to encrypt their users’ traffic by default. Better late than never.|
|The Snowden files decoded I was on a panel with the rest of the reporting team credited with winning the 2014 Pulitzer for Public Service. We spoke about decoding the documents and took questions from the audience. Twitter recap here.|
|NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls I discuss our reporting of the NSA’s “MYSTIC” program.|
|Webcams can record secretly Watch me demonstrate how to disable the light that indicates a MacBook’s camera is active.|
|Reporter: For NSA, Google cookies allow ‘laser-guided’ targeting|
|Reporter explains NSA collection of cellphone data|