search slide
search slide
pages bottom
Currently Browsing: Results for Tag "nsa"

Microsoft sues US government, asks court to declare secrecy orders unconstitutional

Microsoft sues US government, asks court to declare secrecy orders unconstitutional This isn’t meant to give the government carte blanche to spy on its citizens, and the law spells out the scenarios under which Section 2705(b) applies.This means that we effectively are prohibited forever from telling our customers that the government has obtained their data.

Warrantless spying on Americans more than doubled since 2013: oversight report

Warrantless spying on Americans more than doubled since 2013: oversight report The problem is the so-called “incidental” collection of Americans’ communications, which puts them in the NSA’s vast “702 database.” Once a US person’s personal information is in the database, it’s as searchable as anything else that was collected legitimately.

Alexa does not like when you ask her about the NSA

Alexa does not like when you ask her about the NSA But if you ask her if the NSA is monitoring you right now?The NSA is notorious for tapping into various modes of communication, but whether the agency is actually listening to your Alexa queries is pretty questionable.

Snowden and colleague design ‘introspection engine’ anti-snooping mod for the iPhone 6

Snowden and colleague design ‘introspection engine’ anti-snooping mod for the iPhone 6 Edward Snowden and collaborator Andrew “bunnie” Huang participated in the MIT Media Lab’s invite-only Forbidden Research conference, with an anti-snooping hardware mod for the iPhone 6.They’re calling it an “introspection engine,” and it feels a lot like opening Pandora’s box.

The ultimate guide to staying anonymous and protecting your privacy online

The ultimate guide to staying anonymous and protecting your privacy online It uses a vast network of computers to route your Web traffic through a number of encrypted layers to obscure the origin of the traffic.If the results show the third-party DNS service you’re using (like TorGuard), you’re set.

Your guide to the ‘Shadow Brokers’ NSA theft, which puts the Snowden leaks to shame

Your guide to the ‘Shadow Brokers’ NSA theft, which puts the Snowden leaks to shame It’s the group that, arguably, has given the NSA a bad name in recent years.But it’s also the group that gives the NSA the majority of its real, target-specific power to advance and protect American interests.

Leaked manuals confirm Stingrays can be used for mass surveillance, bypassing smartphone security

Leaked manuals confirm Stingrays can be used for mass surveillance, bypassing smartphone security Nearly four years ago, the Electronic Privacy Information Center released FBI documents discussing a controversial surveillance technique.Both federal and local authorities often have access to cell phone surveillance hardware, dubbed Stingrays (Harris Corp.

From civil liberties champion to turncoat: Yahoo built specialized software to spy on users for the NSA

From civil liberties champion to turncoat: Yahoo built specialized software to spy on users for the NSA Ever since the Snowden leaks in 2013, there’s been an ongoing debate over the nature of state surveillance.If a new report from Reuters is accurate, the Yahoo that went to bat to defend its users is a dim and distant memory today.

Feds demand fingerprints from all home residents to unlock their phones

Feds demand fingerprints from all home residents to unlock their phones But it offers absolutely no protection against the government, and can be compelled from suspects without raising any Fifth Amendment concerns.This was driven home with a vengeance over the weekend, when a May 2016 warrant application surfaced.

In bid to achieve quantum encryption, China set to finish 2,000-kilometer 'quantum link'

In bid to achieve quantum encryption, China set to finish 2,000-kilometer 'quantum link' Now, China is nearing completion of another major facet in its push for a quantum phone at the capital building: a 2,000-kilometer fiber-optic line for ferrying quantum encryption keys.It’s the beginning of China’s roll-out of true quantum encryption technology.

It's time to pardon Edward Snowden, and defuse Putin's increasingly dangerous weapon

It's time to pardon Edward Snowden, and defuse Putin's increasingly dangerous weapon As Russian intelligence demonstrates ever more alacrity with American political and social disruption, we must remember that the great bear still has a major weapon in reserve that’s tailored for this purpose.Edward Snowden is widely believed to be one of Vladimir Putin’s more successful gambits.

The government's public evidence falls short of proving Russian involvement in the DNC hack

The government's public evidence falls short of proving Russian involvement in the DNC hack The following terms are used and defined within the ODNI report.None of the assessments in the ODNI report are rated as low confidence.

Jeff Sessions, Trump's pick for attorney general, will likely renew fight against strong encryption

Jeff Sessions, Trump's pick for attorney general, will likely renew fight against strong encryption But Apple’s staunch defense and widespread dissent in the court of public opinion led the bureau to back down.Jeff Sessions (R-AL), President Trump’s choice for attorney general, is unlikely to let that decision stand once he is confirmed — and he’s expected to be confirmed with strong Republican support.

Former NSA contractor accused of stealing top secret documents says he was just a hoarder

Former NSA contractor accused of stealing top secret documents says he was just a hoarder Harold Martin, 52, a private contractor for the National Security Agency (NSA) and a former U.Navy lieutenant, was indicted Wednesday on 20 counts of stealing classified materials.

Peter Thiel company reportedly helped NSA spy program

Peter Thiel company reportedly helped NSA spy program Peter Thiel is a man who enjoys both the having of cake and the putting of that cake into the largest hole in his face.He's written that "A free press is vital for public debate," yet financed a lawsuit that bankrupted Gawker Media.

Wikileaks document dump alleges the CIA can hack almost everything

Wikileaks document dump alleges the CIA can hack almost everything If the CIA wants to peer inside your digital life, it'll find a way, no matter what you've done to protect yourself.That's the basic message inherent in a trove of documents dumped by Wikileaks Tuesday that allegedly exposes a slew of CIA hacking techniques.

NSA is staying quiet over U.S. citizens caught in dragnet surveillance

NSA is staying quiet over U.S. citizens caught in dragnet surveillance Just as it has for the past six years, though, the NSA isn’t playing ball.Since 2011, several key members have been trying to find out how many Americans the NSA has collected personal information from but it’s always been denied, according to Ars Technica.