Cyberwar and secu...
Follow
Find tag "Google"
6.3K views | +2 today
Cyberwar and security
New military challenges in cyberspace, digital crime
Curated by Pierre Levy
Your new post is loading...
Your new post is loading...
Scooped by Pierre Levy
Scoop.it!

Google is encrypting search globally. That’s bad for the NSA and China’s censors.

Google is encrypting search globally. That’s bad for the NSA and China’s censors. | Cyberwar and security | Scoop.it
Google is encrypting its search results worldwide. Here's how they will look to Chinese censors: "1fe7897ad064478fc...�
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Leaked Slide Shows NSA Celebrated Victory Over Google's Security With A Smiley Face

Leaked Slide Shows NSA Celebrated Victory Over Google's Security With A Smiley Face | Cyberwar and security | Scoop.it
A new slide from ex-NSA contractor Edward Snowden features the use of emoticons.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Reports that NSA taps into Google and Yahoo data hubs infuriates tech giants

Reports that NSA taps into Google and Yahoo data hubs infuriates tech giants | Cyberwar and security | Scoop.it
Files obtained from Edward Snowden suggest NSA can collect information sent by fibre optic cable between Google and Yahoo data hubs 'at will'
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Use These Secret NSA Google Search Tips to Become Your Own Spy Agency | Wired.com

Use These Secret NSA Google Search Tips to Become Your Own Spy Agency | Wired.com | Cyberwar and security | Scoop.it
Want to know how to "'hack" Google like the pros? The NSA has released a book it produced for its workers on how to find intelligence on the web.
more...
luiy's curator insight, July 12, 2013 11:09 AM

The 643-page tome, called Untangling the Web: A Guide to Internet Research (.pdf), was just released by the NSA following a FOIA request filed in April by MuckRock, a site that charges fees to process public records for activists and others.

 

The book was published by the Center for Digital Content of the National Security Agency, and is filled with advice for using search engines, the Internet Archive and other online tools. But the most interesting is the chapter titled “Google Hacking.”

 

Say you’re a cyberspy for the NSA and you want sensitive inside information on companies in South Africa. What do you do?

Search for confidential Excel spreadsheets the company inadvertently posted online by typing “filetype:xls site:za confidential” into Google, the book notes.

 

Want to find spreadsheets full of passwords in Russia? Type “filetype:xls site:ru login.” Even on websites written in non-English languages the terms “login,” “userid,” and “password” are generally written in English, the authors helpfully point out.

 

Misconfigured web servers “that list the contents of directories not intended to be on the web often offer a rich load of information to Google hackers,” the authors write, then offer a command to exploit these vulnerabilities — intitle: “index of” site:kr password.

 

“Nothing I am going to describe to you is illegal, nor does it in any way involve accessing unauthorized data,” the authors assert in their book. Instead it “involves using publicly available search engines to access publicly available information that almost certainly was not intended for public distribution.” You know, sort of like the “hacking” for which Andrew “weev” Aurenheimer was recently sentenced to 3.5 years in prison for obtaining publicly accessible information from AT&T’s website.

 

Stealing intelligence on the internet that others don’t want you to have might not be illegal, but it does come with other risks, the authors note: “It is critical that you handle all Microsoft file types on the internet with extreme care. Never open a Microsoft file type on the internet. Instead, use one of the techniques described here,” they write in a footnote. The word “here” is hyperlinked, but since the document is a PDF the link is inaccessible. No word about the dangers that Adobe PDFs pose. But the version of the manual the NSA released was last updated in 2007, so let’s hope later versions cover it.