Sunday, January 31, 2016
NSA Hacker Chief Explains How To Keep Him Out of Your System
Joyce himself did little to shine a light on the TAO's classified operations.
His talk was mostly a compendium of best security practices.
But he did drop a few of the not-so-secret secrets of the NSA's success, with many people responding to his comments on Twitter.
intercepting positional data as well as imagery from Israeli drones and fighters, through a joint program dubbed "Anarchist," based on the island of Cyprus.
Among the captured images that the Intercept has published, based on data provided by Edward Snowden, are ones that appear to show weaponized drones, something that the U.S. military is well-known for using, but that the IDF does not publicly acknowledge as part of its own arsenal.
U.S. spying on allies is nothing new.
It is surprising to see the ease with which encrypted Israeli communications were intercepted.
As always, it wasn't the crypto which was broken -- just the lousy method it was applied.
Ars Technica explains that open-source software, including ImageMagick was central to the analysis of the captured data.