No one knows what happened to NSA staffers who snooped on their lovers

Turns out, not even the head of the Senate Judiciary Committee can figure out what’s happened to the National Security Agency (NSA) staffers who were involved in the LOVEINT spying scandal.

Back in August 2013, the Wall Street Journal introduced the world to an internal term that NSA analysts have come up with to describe the act of spying on one’s ex-partner: LOVEINT. The word is reminiscent of existing spycraft parlance like HUMINT (human intelligence) or SIGINT (signals intelligence). (LOVEINT also spawned endless Twitter jokes.)

In a letter sent Monday to the attorney general, Sen. Chuck Grassley (R-Iowa) described how he initially asked the Department of Justice (DOJ) to explain what it was doing to address the 12 publicly-known instances of this inappropriate use of NSA surveillance capability. However, the DOJ has stayed mum.

Read 4 remaining paragraphs | Comments

Syrian rebels lured into malware honeypot sites through “sexy” online chats

Hacking for "signals intelligence" doesn't take NSA-level resources; it doesn't even require very sophisticated exploit tools. Using a combination of Windows and Android malware and some very simple social engineering, a group aligned with the regime of Syrian President Bashar Al-Assad have raked in a wealth of intelligence on Syrian opposition groups. And they did it by pretending to be women and flirting with their victims.

Over the past two years, using a combination of fake social media and Skype accounts associated with fictional female supporters of Syrian rebel groups, the group—apparently operating from Lebanon—fooled rebel soldiers and others providing aid to them into downloading malware to their computers and Android smartphones. As revealed in a report published today by FireEye (PDF), the group (which may have been associated with Hezbollah) was able to harvest not just personal information on their targets, but also battle plans and other intelligence information that could have been used by Hezbollah and the Syrian government's troops to counter the opposition.

FireEye discovered the operation during a malware investigation, uncovering a cache of 7.7 gigabytes of stolen data on a German server. The data contains Skype databases including chat logs and contacts, as well as documents and images.

Read 7 remaining paragraphs | Comments

SnoopyPro – Windows USB Sniffer Tool

SnoopyPro is a lightweight, standalone (no installation necessary) USB sniffer tool, it will log all data exchange between USB Device and its driver under a Windows environment. It definitely works on Windows XP, unsure about newer versions. SnoopyPro allows you to intercept, display, record and analyze USB protocol and all the data transferred...

Read the full post at darknet.org.uk