<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:og="http://ogp.me/ns#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" version="2.0" xml:base="https://www.linuxjournal.com/">
  <channel>
    <title>NSA</title>
    <link>https://www.linuxjournal.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Spy Games: the NSA and GCHQ Offer Their Software to the Open Source Community</title>
  <link>https://www.linuxjournal.com/content/spy-games-nsa-and-gchq-offer-their-software-open-source-community</link>
  <description>  &lt;div data-history-node-id="1340506" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/david-habusha" lang="" about="https://www.linuxjournal.com/users/david-habusha" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;David Habusha&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;Spies worth their salt are generally expected to be good at keeping secrets. With dead drops, encryption, cyanide pills and the like, openly sharing useful information isn’t supposed to be a part of the job description.&lt;/p&gt;

&lt;p&gt;So it caught more than a few of us off guard when a couple years ago, some of the top spy agencies began contributing code to GitHub, making it available to the masses by open-sourcing some of their software.&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://code.nsa.gov/"&gt;&lt;u&gt;National Security Agency&lt;/u&gt;&lt;/a&gt;, the American signals intelligence organization that is tasked with the majority of the cyber-snooping, has released two separate pages on GitHub. The first is the NSA's primary account on GitHub that has &lt;a href="https://github.com/nationalsecurityagency"&gt;&lt;u&gt;17 listed repos&lt;/u&gt;&lt;/a&gt;, followed up by its more substantive “&lt;a href="https://github.com/nsacyber"&gt;&lt;u&gt;NSA Cybersecurity&lt;/u&gt;&lt;/a&gt;” page with its 31 repositories.&lt;/p&gt;

&lt;p&gt;Even though the NSA appears to have been posting some of its software as open source since 2017, presumably a result in part of the effort from the US government to make more of the code produced by the USG &lt;a href="https://obamawhitehouse.archives.gov/blog/2016/03/09/leveraging-american-ingenuity-through-reusable-and-open-source-software"&gt;&lt;u&gt;available to the public&lt;/u&gt;&lt;/a&gt;, the agency made news in early January when it announced plans to release a new product to the Open Source community.&lt;/p&gt;

&lt;p&gt;The software is called GHIDRA, and it has been described as a tool for reverse-engineering malware. According to &lt;a href="https://www.bleepingcomputer.com/news/security/nsa-releasing-the-ghidra-reverse-engineering-tool-at-rsaconference/"&gt;&lt;u&gt;reports&lt;/u&gt;&lt;/a&gt;, GHIDRA has been referenced in the past during the Vault7 document leaks and is available for use across all the major operating systems. Those who are curious for more information on this tool and how to use it can catch a glimpse at a demonstration that the NSA has committed to putting on at this year’s RSA conference.&lt;/p&gt;

&lt;p&gt;However, with perhaps less fanfare, it would seem as though it was the Brits who first made the move to take some of their code open source. The British SigInt agency GCHQ released its first piece of open-source tooling with the Gaffer graph database &lt;a href="https://motherboard.vice.com/en_us/article/bmvxdm/gchq-the-uks-secretive-spy-agency-now-has-an-open-source-github-account"&gt;&lt;u&gt;back in 2015&lt;/u&gt;&lt;/a&gt;, beating the Americans by two years. At the time of writing, the good folks at Her Majesty’s cyber-snooping agency have &lt;a href="https://github.com/GCHQ"&gt;&lt;u&gt;39 repositories&lt;/u&gt;&lt;/a&gt; on offer for all to try out, including one called the &lt;u&gt;&lt;a href="https://github.com/gchq/CyberChef"&gt;CyberChef&lt;/a&gt;,&lt;/u&gt; which is billed as the “Cyber Swiss Army Knife—a web app for encryption, encoding, compression, and data analysis”.&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/spy-games-nsa-and-gchq-offer-their-software-open-source-community" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Thu, 07 Mar 2019 12:30:00 +0000</pubDate>
    <dc:creator>David Habusha</dc:creator>
    <guid isPermaLink="false">1340506 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>The Linux Journal NSA Reading List: Tails and Tor</title>
  <link>https://www.linuxjournal.com/content/linux-journal-nsa-weekend-reading-list-tails-and-tor</link>
  <description>  &lt;div data-history-node-id="1339762" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/carlie-fairchild" lang="" about="https://www.linuxjournal.com/users/carlie-fairchild" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Carlie Fairchild&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;&lt;em&gt;Tails is a live media Linux distro designed to boot into a highly secure desktop environment. Tor is a browser that prevents somebody watching your internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Learn why anonymity matters and how you can protect yourself by reading the following archived &lt;cite&gt;Linux Journal&lt;/cite&gt; articles:&lt;/p&gt;

&lt;p&gt;&lt;a href="//www.linuxjournal.com/content/tails-above-rest-installation
"&gt;Tails above the Rest: the Installation&lt;/a&gt; by Kyle Rankin: how to get and validate the Tails distribution and install it. I will follow up with what Tails can and can't do to protect your privacy, and how to use Tails in a way that minimizes your risk. Then I will finish with some more advanced features of Tails, including the use of a persistent volume (with this feature, depending on your needs, you could conceivably use Tails as your main Linux distribution).&lt;/p&gt;

&lt;p&gt;&lt;a href="//www.linuxjournal.com/content/tails-above-rest-part-ii "&gt;Tails above the Rest, Part II&lt;/a&gt; by Kyle Rankin: now that you have Tails installed, let's start using it. Read on to find out how to get started.&lt;/p&gt;

&lt;p&gt;&lt;a href="//www.linuxjournal.com/content/tails-above-rest-part-iii "&gt;Tails above the Rest, Part III&lt;/a&gt; by Kyle Rankin: in the first two parts on this series, I gave an overview of Tails, including how to get the distribution securely, and once you have it, how to use some of the basic tools. Here, I cover some of the more advanced features of Tails, such as some of its log-in options, its suite of encryption tools and the persistent disk.&lt;/p&gt;

&lt;p&gt;&lt;a href="//www.linuxjournal.com/content/tor-security-android-and-desktop-linux
"&gt;Tor Security for Android and Desktop Linux&lt;/a&gt; by Charles Fischer: the Tor Project presents an effective countermeasure against hostile and disingenuous carriers and ISPs that, on a properly rooted and capable Android device or Linux system, can force all network traffic through Tor encrypted entry points (guard nodes) with custom rules for iptables. This action renders all device network activity opaque to the upstream carrier—barring exceptional intervention, all efforts to track a user are afterwards futile.&lt;/p&gt;

&lt;p&gt;&lt;a href="//www.linuxjournal.com/content/bundle-tor "&gt;A Bundle of Tor&lt;/a&gt; by Kyle Rankin: the best way to set up Tor on your personal machine.&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/linux-journal-nsa-weekend-reading-list-tails-and-tor" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Sun, 25 Mar 2018 19:33:50 +0000</pubDate>
    <dc:creator>Carlie Fairchild</dc:creator>
    <guid isPermaLink="false">1339762 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Best of Hack and /</title>
  <link>https://www.linuxjournal.com/content/best-hack-and</link>
  <description>  &lt;div data-history-node-id="1339356" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/user/800005" lang="" about="https://www.linuxjournal.com/user/800005" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;LJ Staff&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;Secure Server Deployments in Hostile Territory; Preseeding Full Disk Encryption; Own Your Own DNS; Learn How-to Secure Desktops with Qubes; What's New In 3D Printing
&lt;p&gt;
&lt;/p&gt;
&lt;a href="http://www.linuxjournal.com/content/secure-server-deployments-hostile-territory"&gt;Secure Server Deployments in Hostile Territory&lt;/a&gt;
&lt;br /&gt;
Would you change what you said on the phone, if you knew someone malicious was listening? Whether or not you view the NSA as malicious, I imagine that after reading the &lt;a href="http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance"&gt;NSA coverage on &lt;cite&gt;Linux Journal&lt;/cite&gt;&lt;/a&gt;, some of you found yourselves modifying your behavior. The same thing happened to me when I started deploying servers into a public cloud (EC2 in my case). 
&lt;p&gt;
&lt;/p&gt;
In this article, I discuss some of the techniques I use to secure servers when they are in hostile territory. Although some of these techniques are specific to EC2, most are adaptable to just about any environment.
&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.linuxjournal.com/content/secure-server-deployments-hostile-territory"&gt;Part I&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.linuxjournal.com/content/secure-server-deployments-hostile-territory-part-ii"&gt;Part II&lt;/a&gt; 
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;/p&gt;
&lt;a href="https://www.linuxjournal.com/content/preseeding-full-disk-encryption"&gt;Preseeding Full Disk Encryption&lt;/a&gt;
&lt;br /&gt;
Usually I try to write articles that are not aimed at a particular distribution. Although I may give examples assuming a Debian-based distribution, whenever possible, I try to make my instructions applicable to everyone. This is not going to be one of those articles. Here, I document a process I went through recently with Debian preseeding (a method of automating a Debian install, like kickstart on Red Hat-based systems) that I found much more difficult than it needed to be, mostly because documentation was so sparse. In fact, I really found only two solid examples to work from in my research, one of which referred to the other.
&lt;p&gt;
&lt;/p&gt;
&lt;a href="http://www.linuxjournal.com/content/own-your-dns-data"&gt;Own Your Own DNS&lt;/a&gt;
&lt;br /&gt;
I honestly think most people simply are unaware of how much personal data they leak on a daily basis as they use their computers. Even if they have some inkling along those lines, I still imagine many think of the data they leak only in terms of individual facts, such as their name or where they ate lunch. What many people don't realize is how revealing all of those individual, innocent facts are when they are combined, filtered and analyzed.
&lt;p&gt;
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/best-hack-and" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Wed, 05 Apr 2017 11:40:59 +0000</pubDate>
    <dc:creator>LJ Staff</dc:creator>
    <guid isPermaLink="false">1339356 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Dolphins in the NSA Dragnet</title>
  <link>https://www.linuxjournal.com/content/dolphins-nsa-dragnet</link>
  <description>  &lt;div data-history-node-id="1336787" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/kyle-rankin" lang="" about="https://www.linuxjournal.com/users/kyle-rankin" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Kyle Rankin&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
There's an old quote from Jamie Zawinkski that goes: "Some people, when confronted with a problem, think ‘I know, I'll use regular expressions.’ Now they have two problems." Even people like me who like regular expressions laugh at the truth in that quote, because we've seen the consequences when someone doesn't think through the implications of a poorly written pattern. When some people write a bad pattern, they end up with extra lines in a log file. When the NSA does it, they capture and retain Internet traffic on untold numbers of innocent people.
&lt;/p&gt;
&lt;p&gt;
As I mentioned in &lt;a href="http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance"&gt;"NSA: &lt;em&gt;Linux Journal&lt;/em&gt; is an ‘extremist forum’ and its readers get flagged for extra surveillance”&lt;/a&gt;, the NSA has been flagging certain Internet traffic as extremist based on specific patterns. Alongside patterns that match anyone who was searching for information about the Tor and Tails projects was the following pattern:
&lt;/p&gt;
&lt;pre&gt;
linuxjournal.com/content/linux*
&lt;/pre&gt;&lt;p&gt;
While the general consensus seems to be that all of these patterns were overreaching, even if you think it's reasonable to label people who are curious about Tor or Tails as extremist, you would have a hard time lumping &lt;em&gt;Linux Journal&lt;/em&gt; in the same category. A number of news outlets have speculated that the above pattern was intended to match the following URL:
&lt;/p&gt;
&lt;p&gt;
&lt;a href="http://linuxjournal.com/content/linux-distro-tales-you-can-never-be-too-paranoid"&gt;http://linuxjournal.com/content/linux-distro-tales-you-can-never-be-too…&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
This link goes to a short blog post by Michael Reed in 2011 that provides a brief overview of Tails. The blog post wasn't even intended as a HOWTO, and it instead links to the official Tails Web site if you want more details on how to download or install the distribution. Although that article is innocent enough (I can only imagine what they must think of my more in-depth &lt;a href="http://www.linuxjournal.com/content/bundle-tor"&gt;Tor&lt;/a&gt; and &lt;a href="http://www.linuxjournal.com/content/tails-above-rest-installation"&gt;Tails HOWTOs&lt;/a&gt; we recently published), to catch that post they flagged 186 other posts along the way.
&lt;/p&gt;
&lt;p&gt;
At the end of this article, I have posted the complete list of 187 posts on linuxjournal.com that match the pattern, but I figured I'd pick out a few articles to give you a sense of the depth and breadth of the content swept up in this dragnet, like this one:
&lt;/p&gt;
&lt;p&gt;
"Linux Foundation Collaboration Summit - Austin, Texas - April 8th to 10th, 2008" published February 13, 2008 by Jon maddog Hall&lt;br /&gt;&lt;a href="http://www.linuxjournal.com/content/linux-foundation-collaboration-summit-austin-texas-april-8th-10th-2008"&gt;http://www.linuxjournal.com/content/linux-foundation-collaboration-summ…&lt;/a&gt;
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/dolphins-nsa-dragnet" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Mon, 07 Jul 2014 16:26:38 +0000</pubDate>
    <dc:creator>Kyle Rankin</dc:creator>
    <guid isPermaLink="false">1336787 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance</title>
  <link>https://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance</link>
  <description>  &lt;div data-history-node-id="1336379" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/kyle-rankin" lang="" about="https://www.linuxjournal.com/users/kyle-rankin" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Kyle Rankin&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
A new story published on the German site &lt;a href="http://www.tagesschau.de/inland/nsa-xkeyscore-100.html"&gt;Tagesschau&lt;/a&gt; and followed up by &lt;a href="http://boingboing.net/2014/07/03/if-you-read-boing-boing-the-n.html"&gt;BoingBoing&lt;/a&gt; and &lt;a href="http://daserste.ndr.de/panorama/aktuell/NSA-targets-the-privacy-conscious,nsa230.html"&gt;DasErste.de&lt;/a&gt; has uncovered some shocking details about who the NSA targets for surveillance including visitors to &lt;em&gt;Linux Journal&lt;/em&gt; itself.
&lt;/p&gt;&lt;p&gt;
While it has been revealed before that the NSA captures just about all Internet traffic for a short time, the Tagesschau story provides new details about how the NSA's XKEYSCORE program decides which traffic to keep indefinitely. XKEYSCORE uses specific selectors to flag traffic, and the article reveals that Web searches for Tor and Tails--software I've covered here in &lt;em&gt;Linux Journal&lt;/em&gt; that helps to protect a user's anonymity and privacy on the Internet--are among the selectors that will flag you as "extremist" and targeted for further surveillance. If you just consider how many &lt;em&gt;Linux Journal&lt;/em&gt; readers have read our Tor and Tails coverage in the magazine, that alone would flag quite a few innocent people as extremist.
&lt;/p&gt;&lt;p&gt;
While that is troubling in itself, even more troubling to readers on this site is that linuxjournal.com has been flagged as a selector! DasErste.de has published the relevant XKEYSCORE &lt;a href="http://daserste.ndr.de/panorama/xkeyscorerules100.txt"&gt;source code&lt;/a&gt;, and if you look closely at the rule definitions, you will see linuxjournal.com/content/linux* listed alongside Tails and Tor. According to an article on &lt;a href="http://daserste.ndr.de/panorama/aktuell/NSA-targets-the-privacy-conscious,nsa230.html"&gt;DasErste.de&lt;/a&gt;, the NSA considers &lt;em&gt;Linux Journal&lt;/em&gt; an "extremist forum". This means that merely looking for any Linux content on &lt;em&gt;Linux Journal&lt;/em&gt;, not just content about anonymizing software or encryption, is considered suspicious and means your Internet traffic may be stored indefinitely.
&lt;/p&gt;&lt;p&gt;
One of the biggest questions these new revelations raise is why. Up until this point, I would imagine most &lt;em&gt;Linux Journal&lt;/em&gt; readers had considered the NSA revelations as troubling but figured the NSA would never be interested in them personally. Now we know that just visiting this site makes you a target. While we may never know for sure what it is about &lt;em&gt;Linux Journal&lt;/em&gt; in particular, the Boing Boing article speculates that it might be to separate out people on the Internet who know how to be private from those who don't so it can capture communications from everyone with privacy know-how. If that's true, it seems to go much further to target anyone with Linux know-how. 
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Thu, 03 Jul 2014 16:51:46 +0000</pubDate>
    <dc:creator>Kyle Rankin</dc:creator>
    <guid isPermaLink="false">1336379 at https://www.linuxjournal.com</guid>
    </item>

  </channel>
</rss>
