Fri, 24 May 2019

Articles Posted in the " By: Jason Hernandez " Category

  • Making a Secure, Open-Source Digital Newsroom

    Follow Jason on Twitter.

    North Star Post was founded in 2015 following the collaboration of the core team on uncovering the FBI’s aerial surveillance program. The core team is split between Minneapolis and Phoenix, and all of us have varying day jobs / obligations that make meeting in person a challenge. Our newspaper covers surveillance, technology, and government accountability among other issues. We seek to keep our research, notes, and communications confidential.

    We choose to use self-hosted applications and avoid cloud services for a number of reasons:
    Our budget is limited, so professional hosted services would rack up costs. Cheaper


  • SECURE SOURCE SUBMISSION GUIDE

    Hello prospective source!

    North Star Post is a fledgling newspaper founded in mid 2015. We cover a number of issues, including surveillance, national security, and government accountability. We have staff in the Minneapolis, Phoenix, Chicago, Canada and trusted partners elsewhere.

    We look forward to working with sources, and using whatever means possible and appropriate to protect their confidentiality. We are excited to announce that we now have a platform for sources to anonymously contact North Star Post’s editorial staff, based on GlobaLeaks, a free and open source project. Our submission site is available exclusively through the Tor network, and


  • Cellebrite: What You Need to Know About Cell Phone Forensics

    Follow Jason on Twitter.

    Smartphones are nearly ubiquitous devices that handle, create, and store massive amounts of information about our lives.

    Law enforcement agencies have spent tens of millions of dollars on technology and training to seize a large trove of data on any given smartphone. Cellebrite has emerged as a leading supplier of cellular data seizure technology. Cellebrite produces software and mobile terminals that are used to physically copy data off of seized cell phones–data that might not be shared over a connection that can be intercepted.

    Smartphones are often the best source of information on their users, which



  • Alleged Teenage Attacker of CIA Director’s Email Remains at Large – Posts New Stolen Data

    image courtesy bgr.com

    Follow Jason on Twitter.

    A Twitter user posted the contact information of federal, state, local and even foreign law enforcement agents Thursday in an apparent protest over U.S. policy towards Palestine. This is the same person that allegedly hacked the personal accounts of CIA Director John Brennan and DHS Secretary Jeh Johnson two weeks ago.

    The information was available on text sharing sites and linked to from Twitter accounts similar to those used by the person sharing documents from CIA Director Brennan’s AOL account two weeks ago. The text documents shared list names, email addresses, titles, agency