Wed, 19 Dec 2018

Articles Posted by the Author: Jason Hernandez

  • DEFCON 25 – Spies in the Skies

    Editor’s Note: The slides we presented at DEFCON 25 are at the bottom of this story which details what we spoke about and more.

    The Spies in the Skies

    Law enforcement agencies have used aircraft for decades to conduct surveillance, but modern radio, camera, and electronics technology has dramatically expanded the power and scope of police surveillance capabilities.

    The Iraq War and other conflicts have spurred the development of mass surveillance technologies and techniques that are now widely available to domestic police.

    The FBI, DEA and other agencies flew powerful surveillance aircraft over cities for years in relative secrecy before …



  • Making a Secure, Open-Source Digital Newsroom

    Follow Jason on Twitter.

    North Star Post was founded in 2015 following the collaboration of the core team on uncovering the FBI’s aerial surveillance program. The core team is split between Minneapolis and Phoenix, and all of us have varying day jobs / obligations that make meeting in person a challenge. Our newspaper covers surveillance, technology, and government accountability among other issues. We seek to keep our research, notes, and communications confidential.

    We choose to use self-hosted applications and avoid cloud services for a number of reasons:
    Our budget is limited, so professional hosted services would rack up costs. Cheaper


  • SECURE SOURCE SUBMISSION GUIDE

    Hello prospective source!

    North Star Post is a fledgling newspaper founded in mid 2015. We cover a number of issues, including surveillance, national security, and government accountability. We have staff in the Minneapolis, Phoenix, Chicago, Canada and trusted partners elsewhere.

    We look forward to working with sources, and using whatever means possible and appropriate to protect their confidentiality. We are excited to announce that we now have a platform for sources to anonymously contact North Star Post’s editorial staff, based on GlobaLeaks, a free and open source project. Our submission site is available exclusively through the Tor network, and


  • Cellebrite: What You Need to Know About Cell Phone Forensics

    Follow Jason on Twitter.

    Smartphones are nearly ubiquitous devices that handle, create, and store massive amounts of information about our lives.

    Law enforcement agencies have spent tens of millions of dollars on technology and training to seize a large trove of data on any given smartphone. Cellebrite has emerged as a leading supplier of cellular data seizure technology. Cellebrite produces software and mobile terminals that are used to physically copy data off of seized cell phones–data that might not be shared over a connection that can be intercepted.

    Smartphones are often the best source of information on their users, which



  • Alleged Teenage Attacker of CIA Director’s Email Remains at Large – Posts New Stolen Data

    image courtesy bgr.com

    Follow Jason on Twitter.

    A Twitter user posted the contact information of federal, state, local and even foreign law enforcement agents Thursday in an apparent protest over U.S. policy towards Palestine. This is the same person that allegedly hacked the personal accounts of CIA Director John Brennan and DHS Secretary Jeh Johnson two weeks ago.

    The information was available on text sharing sites and linked to from Twitter accounts similar to those used by the person sharing documents from CIA Director Brennan’s AOL account two weeks ago. The text documents shared list names, email addresses, titles, agency


  • Declassified Review Sheds Light on Start of Electronic Surveillance in United States

    courtesy shirtigo.co

    WASHTINGTON — A recently declassified report from June 29, 2009 details the rise, short comings and more of the United States mass electronic surveillance programs created by the Bush administration in the wake of the September 11 attacks.

    The report states that the Presidential Surveillance Program was signed into existence on October 4, 2001. The over 700 page report contains information on the PSP which led to the NSA’s collection of telephony and metadata which became part of a national dialogue after the Edward Snowden leaks.

    The PSP required President George W. Bush and the Attorney General to