Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
United States Privacy Your Rights Online

Leaked Docs Show Spyware Used To Snoop On US Computers 135

Advocatus Diaboli writes Software created by the controversial UK-based Gamma Group International was used to spy on computers that appear to be located in the United States, the UK, Germany, Russia, Iran, and Bahrain, according to a leaked trove of documents analyzed by ProPublica. It's not clear whether the surveillance was conducted by governments or private entities. Customer e-mail addresses in the collection appeared to belong to a German surveillance company, an independent consultant in Dubai, the Bosnian and Hungarian Intelligence services, a Dutch law enforcement officer, and the Qatari government.
This discussion has been archived. No new comments can be posted.

Leaked Docs Show Spyware Used To Snoop On US Computers

Comments Filter:
  • by davidwr ( 791652 ) on Friday August 08, 2014 @07:12PM (#47634547) Homepage Journal

    Sur-prise sur-prise sur-prise

  • by Anonymous Coward on Friday August 08, 2014 @07:51PM (#47634833)

    ...some kind of software to prevent this. Something to keep my PC clean and safe. I have a wife and child to protect from these internetz!

  • Well there you have it. If you're running Windows you get what you deserve. "Oh! but my games! My precious distractions! My fake 'acheivements!'" Yeah. I completely understand. Keep your Windows computers off of the internet for anything other than gaming! No email! No web browsing!

    "But the applications I need to run my business!" Okay, I'll definitely go along with that to a degree. Once again, Keep your work machines off of the internet! If your work is important, and I'm sure it is, then keep i

    • by cbreak ( 1575875 )
      There is an OS X and a Linux version in addition to the Windows version of this spyware. Check it out :)
      • I'm aware there is malware for all. There are reasons to go with something other than windows:

        1. Windows is #1 for known vulnerabilities
        2. Windows is #1 for the rate of new vulnerabilities
        3. Windows is #1 for the general weakness of the security model which exploits use to excallate themselves
        4. Windows is extremely homogenous which means it's far simpler to write one exploit to pwn them all

        Those facts alone are more than enough reason -- if they want in, make them work for it.

        And the nothing of separating

  • by dbIII ( 701233 ) on Saturday August 09, 2014 @12:26AM (#47635811)
    So when do they got to jail? Or is that only for mentally ill UK UFO enthusiasts who look at websites in more detail than their hosters expect and find a few holes?
    I predict the law will not apply to these people, only to people with less criminal intent and less able to defend themselves.
  • by Neelix21 ( 143043 ) on Saturday August 09, 2014 @04:06AM (#47636317)

    The hacker released a "Hack Back" document detailing how he hacked the site. It is very well-written and contains some interesting tips for security also.

    http://pastebin.com/raw.php?i=... [pastebin.com]

    • by Ilarih ( 3525771 )

      Intresting lesson how to hack, but I want to remind that hacking is still dangerous and you cannot event trust to TOR. It would be nice to know if it really hacked or not. If using it still, change your TOR keys often.

      And if the Gamma Group International "worked" for goverment and so on, they have not so much to fear. If you are hacking, you are not so safe. And criminal records would easially make harm to you.

  • This assures that much from 12 reputable sources in the security community as sources for blocking data:

    APK Hosts File Engine 9.0++ 32/64-bit:

    http://start64.com/index.php?o... [start64.com]

    (Details of benefits in link)

    Summary:

    ---

    A.) Hosts do more than:

    1.) AdBlock ("souled-out" 2 Google/Crippled by default)
    2.) Ghostery (Advertiser owned) - "Fox guards henhouse"
    3.) Request Policy -> http://yro.slashdot.org/commen... [slashdot.org]

    B.) Hosts add reliability vs. downed/redirected dns (& overcome redirects on sites, /. beta as an exam

  • "Software created by the controversial UK-based Gamma Group International was used to spy on [Microsoft Windows] computers that appear to be located in the United States, the UK, Germany, Russia, Iran, and Bahrain, according to a leaked trove of documents analyzed by ProPublica."

Beware of Programmers who carry screwdrivers. -- Leonard Brandwein

Working...