WikiLeaks’ latest release of CIA cyber-tools could blow the cover on agency hacking operations
March 31, 2017 | Ellen Nakashima, Washington Post
Press
“This appears to be one of the most technically damaging leaks ever done by WikiLeaks, as it seems designed to directly disrupt ongoing CIA operations and attribute previous operations,” said Nicholas Weaver
With new iPhone, Trump still a target for hackers
March 30, 2017 | Rob Lever, Phys.org
Nicholas Weaver, a researcher at the California-based International Computer Science Institute, said Trump's phone swap "massively reduces, but does not completely eliminate, the security risks." But while he agreed foreign governments are likely to try to hack the phone, Weaver said US intelligence services may have modified it to be "a nice honeypot to trap attempted attacks."
Meet the Midwestern Contractor That Appears Hundreds of Times in the CIA WikiLeaks Dump
March 30, 2017 | Jenna McLaughlin, The Intercept
It’s highly likely the government knows where the leak came from, or has a good idea, said Nick Weaver, a senior staff researcher at the International Computer Science Institute in Berkeley.
Electronics ban wastes effort to improve security
March 28, 2017 | Alina Agha, The Daily Texan
“It’s weird, because it doesn’t match a conventional threat model,” said Nicholas Weaver, a senior researcher at the International Computer Science Institute at the University of California, Berkeley, in an interview with “The Guardian.” “If you assume the attacker is interested in turning a laptop into a bomb, it would work just as well in the cargo hold.”
Is Trump Still Tweeting From His Unsecured Android Phone?
March 27, 2017 | Kaveh Waddell, The Atlantic
The device, likely a Samsung Galaxy S3, has such serious security problems that it’s probably “compromised by at least one—probably multiple—hostile foreign intelligence services and is actively being exploited,” according to Nicholas Weaver, a security researcher at the University of California, Berkeley.
Security experts skeptical about electronics ban on aircraft
March 26, 2017 | Robert Silk, Travel Weekly
"Yes, bombs in laptops are a threat, but this assumes the laptop has to be manually detonated or placed, while a timer can work just as well in the cargo hold," Nicholas Weaver, a researcher at the International Computer Science Institute at the University of California-Berkeley wrote in an email. "At the same time, by only targeting a few source airports but not transit, this assumes that said suicidal terrorist is willing to blow up a plane but is unwilling to transfer through Frankfurt."
Nintendo Switch, iPads, More Banned On Some US-Bound Flights
March 24, 2017 | Oscar Dayus, GameSpot
"If you assume the attacker is interested in turning a laptop into a bomb, it would work just as well in the cargo hold," International Computer Science Institute researcher Nicholas Weaver told the Guardian. "If you're worried about hacking, a cellphone is a computer."
FBI director floats international framework on access to encrypted data
March 23, 2017 | Michael Kan, IDG News Service
Comey’s idea means that all countries will essentially agree to weaken the security in their vendors’ tech products, Weaver said. However, other countries will balk, fearing that the U.S. might exploit the cooperation for spying purposes.
How the new ‘electronics ban’ serves the Trump agenda
March 22, 2017 | Ishaan Tharoor
“It’s weird, because it doesn’t match a conventional threat model,” said Nicholas Weaver, a researcher at the International Computer Science Institute at the University of California, Berkeley, in an interview with the Guardian. “If you assume the attacker is interested in turning a laptop into a bomb, it would work just as well in the cargo hold. If you’re worried about hacking, a cellphone is a computer.”
Experts criticize US electronic devices ban on some flights from Middle East
March 21, 2017 | Sam Theilman and Sam Levin, The Guardian
“It’s weird, because it doesn’t match a conventional threat model,” said Nicholas Weaver, researcher at the International Computer Science Institute at the University of California, Berkeley. “If you assume the attacker is interested in turning a laptop into a bomb, it would work just as well in the cargo hold.” “If you’re worried about hacking, a cellphone is a computer.”