The government — via the DHS and CBP — has long insisted it should be able to search whatever, whenever, within X number of miles of the border for national security reasons. The DOJ has routinely argued on its behalf, delivering non sequiturs like “Not searching your laptop doesn’t protect your civil liberties” with a straight face.
The security/liberty tradeoff has routinely suffered from the government’s insistence that its Fourth Amendment-skirting efforts are in the public’s best interest, even if the public isn’t nearly as interested in seeing the drawers of their personal computing equipment emptied onto the floor every time they stray too close to the “Constitution-Free Zone.”
The courts have generally upheld the government’s arguments, with a few exceptions. The Eastern District of New York basically said that if you don’t want your stuff looked through for no reason, don’t put so much stuff in your stuff — especially sensitive stuff. The presiding judge, Edward Korman, went so far as to compare the US to countries with severe civil rights issues, like Syria and Lebanon, and declared the US the “winner,” seemingly because citizens enjoy more rights once they move further inland.
Security researchers have uncovered highly sophisticated malware that is linked to a secret National Security Agency hacking operation exposed by The Intercept last year.
Russian security firm Kaspersky published a report Monday documenting the malware, which it said had been used to infect thousands of computer systems and steal data in 30 countries around the world. Among the targets were a series of unnamed governments, telecom, energy, and aerospace companies, as well as Islamic scholars, and media organizations.
Kaspersky did not name the NSA as the author of the malware. However, Reuters reported later on Monday that the agency had created the technology, citing anonymous former U.S. intelligence officials.
Kaspersky’s researchers noted that the newly found malware is similar to Stuxnet, a covert tool reportedly created by the U.S. government to sabotage Iranian nuclear systems. The researchers also identified a series of codenames that they found contained within the samples of malware, including STRAIGHTACID, STRAITSHOOTER, and GROK.
Notably, GROK, which Kaspersky said is a piece of malware used to secretly log keystrokes, is tied to secret NSA hacking tactics described in documents from whistleblower Edward Snowden. Last year, The Intercept revealed that the NSA was using a tool called GROK to log keystrokes as part of a toolkit it uses to hack computers and collect data.
The other codenames identified by Kaspersky on Tuesday—such as STRAIGHTACID, STRAITSHOOTER—are strikingly similar to known NSA hacking operations. Leaked NSA documents have revealed that the agency uses hacking tools known as STRAIGHTBIZARRE and FOXACID to break into computers and grab data.
According to Kaspersky, the malware found in the latest discovery is the most advanced ever found and represents an “astonishing technical accomplishment.” It hides deep within an infected computer and can stay on the machine even after attempts to wipe or reformat the hard drive. The security firm has dubbed different variants of the malware EquationLaser, EquationDrug and GrayFish, and they are calling its creators the “Equation Group,” because of the way the spy technology attempts to hide itself in an infected computer using complex encryption.