article thumbnail

On Executive Order 12333

Schneier on Security

Although electronic surveillance programs authorized by EO 12333 generally target foreign intelligence from foreign targets, its permissive targeting standards allow for the substantial collection of Americans’ communications containing little to no foreign intelligence value.

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian spies are attempting to tap transatlantic undersea cables

Security Affairs

The Register reports that the secret structures of GCHQ are part of the surveillance programme codenamed “CIRCUIT” and also refers to an Overseas Processing Centre 1 (OPC-1), while another centre, OPC-2, has been planned, according to documents leaked by Snowden. In the documents, the company is referred to as a “partner” codenamed Gerontic.

Wireless 129
article thumbnail

5G Security

Schneier on Security

These insecurities are a result of market forces that prioritize costs over security and of governments, including the United States, that want to preserve the option of surveillance in 5G networks. What's more, U.S. Again, near-term self-interest has so far triumphed over society's long-term best interests.

article thumbnail

Quad9 to move offices to Switzerland, invites other privacy-focused firms to follow

SC Magazine

The company received a finding of law from the Swiss government that it will not be treated as a telecommunications provider, exempting it from laws that would mandate data collection. surveillance and accept GDPR as a global “gold standard” of privacy protections. are wary of U.S.

DNS 96
article thumbnail

Advanced threat predictions for 2024

SecureList

It determined that the injection point was situated within the connection between two Egyptian telecommunication providers. By relying solely on technical data, the lab could not ascertain which connection side the middlebox was positioned on.

Hacking 101
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Though Paladin has a smaller portfolio relative to other top contenders with 75 companies, the company has a substantial stack of strategic investments in technology, telecommunications, and more. In 2008, the Washington, DC-based firm made a prudent decision by shifting its focus to cybersecurity. Sequoia Investments.