search slide
search slide
pages bottom
Currently Browsing: Results for Tag "nsa"

Microsoft sues US government, asks court to declare secrecy orders unconstitutional

Microsoft sues US government, asks court to declare secrecy orders unconstitutional This isn’t meant to give the government carte blanche to spy on its citizens, and the law spells out the scenarios under which Section 2705(b) applies.This means that we effectively are prohibited forever from telling our customers that the government has obtained their data.

Warrantless spying on Americans more than doubled since 2013: oversight report

Warrantless spying on Americans more than doubled since 2013: oversight report The problem is the so-called “incidental” collection of Americans’ communications, which puts them in the NSA’s vast “702 database.” Once a US person’s personal information is in the database, it’s as searchable as anything else that was collected legitimately.

Alexa does not like when you ask her about the NSA

Alexa does not like when you ask her about the NSA But if you ask her if the NSA is monitoring you right now?The NSA is notorious for tapping into various modes of communication, but whether the agency is actually listening to your Alexa queries is pretty questionable.

Snowden and colleague design ‘introspection engine’ anti-snooping mod for the iPhone 6

Snowden and colleague design ‘introspection engine’ anti-snooping mod for the iPhone 6 Edward Snowden and collaborator Andrew “bunnie” Huang participated in the MIT Media Lab’s invite-only Forbidden Research conference, with an anti-snooping hardware mod for the iPhone 6.They’re calling it an “introspection engine,” and it feels a lot like opening Pandora’s box.

The ultimate guide to staying anonymous and protecting your privacy online

The ultimate guide to staying anonymous and protecting your privacy online It uses a vast network of computers to route your Web traffic through a number of encrypted layers to obscure the origin of the traffic.If the results show the third-party DNS service you’re using (like TorGuard), you’re set.

Your guide to the ‘Shadow Brokers’ NSA theft, which puts the Snowden leaks to shame

Your guide to the ‘Shadow Brokers’ NSA theft, which puts the Snowden leaks to shame It’s the group that, arguably, has given the NSA a bad name in recent years.But it’s also the group that gives the NSA the majority of its real, target-specific power to advance and protect American interests.

Leaked manuals confirm Stingrays can be used for mass surveillance, bypassing smartphone security

Leaked manuals confirm Stingrays can be used for mass surveillance, bypassing smartphone security Nearly four years ago, the Electronic Privacy Information Center released FBI documents discussing a controversial surveillance technique.Both federal and local authorities often have access to cell phone surveillance hardware, dubbed Stingrays (Harris Corp.

From civil liberties champion to turncoat: Yahoo built specialized software to spy on users for the NSA

From civil liberties champion to turncoat: Yahoo built specialized software to spy on users for the NSA Ever since the Snowden leaks in 2013, there’s been an ongoing debate over the nature of state surveillance.If a new report from Reuters is accurate, the Yahoo that went to bat to defend its users is a dim and distant memory today.

Feds demand fingerprints from all home residents to unlock their phones

Feds demand fingerprints from all home residents to unlock their phones But it offers absolutely no protection against the government, and can be compelled from suspects without raising any Fifth Amendment concerns.This was driven home with a vengeance over the weekend, when a May 2016 warrant application surfaced.

In bid to achieve quantum encryption, China set to finish 2,000-kilometer 'quantum link'

In bid to achieve quantum encryption, China set to finish 2,000-kilometer 'quantum link' Now, China is nearing completion of another major facet in its push for a quantum phone at the capital building: a 2,000-kilometer fiber-optic line for ferrying quantum encryption keys.It’s the beginning of China’s roll-out of true quantum encryption technology.

It's time to pardon Edward Snowden, and defuse Putin's increasingly dangerous weapon

It's time to pardon Edward Snowden, and defuse Putin's increasingly dangerous weapon As Russian intelligence demonstrates ever more alacrity with American political and social disruption, we must remember that the great bear still has a major weapon in reserve that’s tailored for this purpose.Edward Snowden is widely believed to be one of Vladimir Putin’s more successful gambits.