A Powerful Tool US Spies Misused to Stalk Women Faces Its Potential Demise

The federal law authorizing a vast amount of the United States government's foreign intelligence collection is set to expire in two months, a deadline that threatens to mothball a notoriously extensive surveillance program currently eavesdropping on the phone calls, text messages, and emails of no fewer than a quarter million people overseas. The US National Security Agency relies heavily on the program, known as Section 702, to compel the cooperation of communications giants that oversee huge swaths of the internet's traffic. The total number of communications intercepted under the 702 program each year, while likely beyond tally, ostensibly reaches into the high hundreds of millions, according to scraps of reportage declassified by the intelligence community over the past decade, and the secret surveillance court whose macroscopic oversight-even when brought to full bear against the program-scarcely takes issue with any quotidian abuses of its power. As of now, members of Congress have introduced exactly zero bills to prevent 702 from sunsetting on January 1, 2024, even though many-perhaps a majority-view this intelligence "Crown jewel" as fundamental to the national defense, a flawed but fixable law. The Democrats, who control the Senate, are not blameless in stalling the reauthorization, with more than a handful vying to ensure its renewal is contingent on forcing the government to obtain warrants before using 702 data to investigate its own citizens. The internal conflict roiling the Republican Party-many of whose members share in the desire to rein in the government's far-reaching domestic surveillance capabilities-deserves the lion's share of the credit right now for neutralizing any hope of a consolatory agreement. A litany of reported errors, ethical violations, and at least some criminal activity bearing the telltale signs of having been swept under the proverbial rug have gone a long way in validating the concerns of Section 702's most ardent detractors: Career Fourth Amendment defenders on both sides of the aisle, implausible joined by a colorful cast of Trump loyalists, lawmakers whose animosity for the intelligence community routinely explodes with allegations of partisan bias, among other "Treasonous things." A US report published in September by an independent government privacy watchdog describes a number of new "Noncompliant" uses of raw Section 702 data by analysts at the NSA, an agency where military and civilian staff have been repeatedly caught abusing their access for personal, even sexual, reasons. Issued by the Privacy and Civil Liberties Oversight Board, a body effectively commandeered by Congress in 2005 in an effort to expose the scope of the post-9/11 surveillance explosion, the report adds to a decade's worth of documented surveillance abuse. Months after the start of the Edward Snowden scandal in 2013, The Wall Street Journal reported that NSA staff members had been caught numerous times spying on individuals the paper unfortunately relegated as "Love interests." This motive-stalking-grew into a bona fide intelligence meme, the abuses "Common enough" at the agency to warrant an internal designation: LOVEINT..

This Cyber News was published on www.wired.com. Publication date: Thu, 30 Nov 2023 23:19:27 +0000


Cyber News related to A Powerful Tool US Spies Misused to Stalk Women Faces Its Potential Demise

International Women's Day: Expanding cybersecurity opportunities in the era of AI - March is a meaningful month for me personally as we honor Women's History Month and International Women's Day. Some of the most powerful role models in my own life are the women who raised me and the community of women who've provided the support and ...
7 months ago Microsoft.com
CRN Recognizes three Check Point Channel Stars in its 2024 Women of the Channel list - CRN has recognized Check Point's Head of Americas Channel Sales, Nisha Holt, for her outstanding achievements as one of the Women of the Channel Power 100. Rebecca James and Lauren Ventura have also earned a spot on the esteemed Women of the Channel ...
5 months ago Blog.checkpoint.com
A Powerful Tool US Spies Misused to Stalk Women Faces Its Potential Demise - The federal law authorizing a vast amount of the United States government's foreign intelligence collection is set to expire in two months, a deadline that threatens to mothball a notoriously extensive surveillance program currently eavesdropping on ...
11 months ago Wired.com
#MIWIC2024: Illyana Mullins, Founder of WiTCH - Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. Overall I consider myself a community specialist when it comes to cyber ...
6 months ago Itsecurityguru.org
Empowering Women in Cybersecurity: Bridging the Gender Gap - On the occasion of the International Day of Women and Girls in Science, it is crucial to address the gender disparity that still persists in the cybersecurity sector. While the field has seen significant growth over the years, women continue to be ...
8 months ago Blog.checkpoint.com
Empowering Women Through Mentoring: Meet Rebecca Frizzarin - Check Point's EMEA Women's Mentorship Program is an experience designed to support women in their journey as leaders. Through one-to-one coaching, we aim to help women build confidence, develop career skills, and foster an environment of support and ...
5 months ago Blog.checkpoint.com
Detecting Vulnerability Scanning Traffic From Underground Tools Using Machine Learning - Our structured query language (SQL) injection detection model detected triggers containing unusual patterns that did not correlate to any known open-source or commercial automated vulnerability scanning tool. We have tested all malicious payloads ...
1 month ago Unit42.paloaltonetworks.com
Diverse Cybersecurity Workforce Act Offers More Than Diversity Benefits - COMMENTARY. While some may consider the Diverse Cybersecurity Workforce Act as intended primarily to improve diversity in a workforce dominated by white men, that attitude ignores the real security risk that exists due to the lack of different ...
4 months ago Darkreading.com
Best Paid and Free OSINT Tools for 2024 - Open Source Intelligence tools are software applications or platforms used to collect, analyze, and interpret publicly available information from various online sources, aiding in investigations, research, and intelligence gathering. These OSINT ...
6 months ago Hackread.com
What are OSINT Tools - Open Source Intelligence (OSINT) tools are incredibly useful for companies, organizations, cybersecurity researchers, and students. This article will discuss the 15 best OSINT tools that can be used for investigations and educational purposes. OSINT ...
1 year ago Hackread.com
What is Word Unscrambler In Gaming? - Are you tired of getting stuck on those tricky word puzzles in your favourite mobile game? Have you ever wished for a tool to help unscramble those seemingly impossible words? Look no further because the word unscrambler is here to save the day! This ...
1 year ago Hackread.com
#MIWIC2024: Rosie Anderson, Th4ts3cur1ty.Company - Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024's Top 20 women selected by an ...
7 months ago Itsecurityguru.org
#MIWIC2024: Andrea Cullen, Co-Founder of CAPSLOCK Education Ltd. - Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024's Top 20 women selected by an ...
7 months ago Itsecurityguru.org
Deciphering Metrics: From NCAA Women's Basketball to Cyber Trends - Iowa's Caitlin Clark clearly propelled NCAA women's basketball viewership. Everyone agrees, Caitlin Clark is a superstar athlete. On March 3, 2024, Ms. Clark became the all-time NCAA Division I scoring leader in basketball, breaking the late Pete ...
6 months ago Securityboulevard.com
CVE-2011-4367 - Multiple directory traversal vulnerabilities in MyFaces JavaServer Faces (JSF) in Apache MyFaces Core 2.0.x before 2.0.12 and 2.1.x before 2.1.6 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) ln parameter to ...
4 years ago
8 Tips on Leveraging AI Tools Without Compromising Security - Forecasts like the Nielsen Norman Group estimating that AI tools may improve an employee's productivity by 66% have companies everywhere wanting to leverage these tools immediately. How can companies employ these powerful AI/ML tools without ...
11 months ago Darkreading.com
Ransomware review: January 2024 - This provides the best overall picture of ransomware activity, but the true number of attacks is far higher. In February, there were 376 ransomware victims, marking an unusually active month for the historically subdued time period. February didn't ...
7 months ago Malwarebytes.com
Russian Spies Hacked Microsoft Email Systems & Accessed Code - Microsoft has disclosed that Russian government hackers, identified as the group Midnight Blizzard, have successfully infiltrated its corporate email systems and stolen source codes. Microsoft's announcement on March 8, 2024, detailed that Midnight ...
7 months ago Cybersecuritynews.com
Building Your First Web Application with Yii Framework - In this article, we will show you, as an inspiration and example, how easy it is to create your first web application using Yii Framework, a simple yet powerful tool for beginners. Successful examples of Yii Framework developments include products ...
1 month ago Hackread.com
Optimizing Cybersecurity: How Hackers Use Golang Source Code Interpreter to Evade Detection - Hackers have been upping the stakes when it comes to executing cyberattacks, and an increasingly popular tool in their arsenal is the Golang source code interpreter. Reportedly, the interpreter is used to obfuscate code, thus making it harder for ...
1 year ago Bleepingcomputer.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
11 months ago Esecurityplanet.com
SiCat: Open-source exploit finder - SiCat is an open-source tool for exploit research designed to source and compile information about exploits from open channels and internal databases. Its primary aim is to assist in cybersecurity, enabling users to search the internet for potential ...
8 months ago Helpnetsecurity.com
CVE Prioritizer: Open-source tool to prioritize vulnerability patching - CVE Prioritizer is an open-source tool designed to assist in prioritizing the patching of vulnerabilities. It integrates data from CVSS, EPSS, and CISA's KEV catalog to offer insights into the probability of exploitation and the potential effects of ...
8 months ago Helpnetsecurity.com
Twitter glitch allows CIA informant channel to be hijacked - A cyber-security researcher has exploited a glitch on the CIA's official Twitter account, to hijack a channel used for recruiting spies. The US Central Intelligence Agency account on X, formerly known as Twitter, displays a link to a Telegram channel ...
11 months ago Bbc.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)