article thumbnail

Snowden speaks about the role of surveillance firm NSO Group in Khashoggi murder

Security Affairs

Snowden warns of abuse of surveillance software that also had a role in the murder of the Saudi Arabian journalist Jamal Khashoggi. Snowden claimed that Israeli company NSO Group had sold Saudi Arabia software that was used to compromise the smartphone of one of Khashoggi’s friends. COUNTRY NEXUS. 1 (Source: Citizen Lab ).

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance. Our allies do it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Amnesty International employee targeted with NSO group surveillance malware

Security Affairs

An employee at Amnesty International has been targeted with Israeli surveillance malware, the news was revealed by the human rights group. Amnesty International revealed that one of its employees was targeted with a surveillance malware developed by an Israeli firm. com , pine-sales[.]com com , and ecommerce-ads[.]org.”

article thumbnail

Chinese Supply-Chain Attack on Computer Systems

Schneier on Security

That included an FBI counterintelligence investigation that began around 2012, when agents started monitoring the communications of a small group of Supermicro workers, using warrants obtained under the Foreign Intelligence Surveillance Act , or FISA, according to five of the officials. We need some fundamental security research here.

article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. Everything has one: every program, every piece of equipment, every piece of software. Has the company that makes my encryption software deliberately weakened the implementation for it?

article thumbnail

RedTorch Formed from Ashes of Norse Corp.

Krebs on Security

Flushed with venture capital funding in 2012, Norse’s founders started hiring dozens of talented cybersecurity professionals. An ad for RedTorch’s “Cheetah” counter-surveillance tech. By 2014 it was throwing lavish parties at top Internet security conferences.

article thumbnail

Highlights from the New U.S. Cybersecurity Strategy

Krebs on Security

The Biden administration today issued its vision for beefing up the nation’s collective cybersecurity posture, including calls for legislation establishing liability for software products and services that are sold with little regard for security. ” Many of the U.S.