search slide
search slide
pages bottom
Currently Browsing: Results for Tag "surveillance"

Microsoft sues US government, asks court to declare secrecy orders unconstitutional

Microsoft sues US government, asks court to declare secrecy orders unconstitutional This isn’t meant to give the government carte blanche to spy on its citizens, and the law spells out the scenarios under which Section 2705(b) applies.This means that we effectively are prohibited forever from telling our customers that the government has obtained their data.

Supreme Court grants FBI decentralized warrants, power to hack suspects anywhere

Supreme Court grants FBI decentralized warrants, power to hack suspects anywhere On Thursday, the US Supreme Court passed a proposed change to Rule 41 of the Federal Rules for Criminal Procedure, one of the main bodies of law that governs the powers and behavior of the FBI.The new version of Rule 41, approved on Thursday, removes the requirement in cases where the suspect’s location cannot be realistically obtained.

FBI aims to catalogue and track people by their tattoos

The FBI is working on software that will track and link people based on the tattoos they choose to ink on their skin.That is, if they were even aware the photos were being taken in the first place.

Snowden and colleague design ‘introspection engine’ anti-snooping mod for the iPhone 6

Snowden and colleague design ‘introspection engine’ anti-snooping mod for the iPhone 6 Edward Snowden and collaborator Andrew “bunnie” Huang participated in the MIT Media Lab’s invite-only Forbidden Research conference, with an anti-snooping hardware mod for the iPhone 6.They’re calling it an “introspection engine,” and it feels a lot like opening Pandora’s box.

Researchers find more than 100 Tor nodes that are snooping on users

Researchers find more than 100 Tor nodes that are snooping on users Security researchers (and indeed, law enforcement) have worked out a number of theoretical ways to attack Tor.The researchers report that 110 live nodes in Tor are “misbehaving” by collecting data on the connections that pass through it.

The ultimate guide to staying anonymous and protecting your privacy online

The ultimate guide to staying anonymous and protecting your privacy online It uses a vast network of computers to route your Web traffic through a number of encrypted layers to obscure the origin of the traffic.If the results show the third-party DNS service you’re using (like TorGuard), you’re set.

Comcast thinks it should be able to charge more to preserve your privacy

Comcast thinks it should be able to charge more to preserve your privacy People get up in arms when it comes to privacy on services like Google and Facebook, but your ISP could gather much, much more information about you if it wanted.The cable giant thinks your privacy should come with an added fee.

How to buy DIY home alarm and security systems

How to buy DIY home alarm and security systems A security system is one of the best lines of defense in protecting your home.There are many well-known options for turn-key, monitored alarm systems that come with a professional installer and a monthly fee.

Researchers: Hackers could weaponize up to a billion monitors to spy on everyone

Researchers: Hackers could weaponize up to a billion monitors to spy on everyone Most of the time when we talk about PC security, we talk about either the operating system or the hardware that it runs on.The team initially hacked the Dell U2410 monitor using a USB port, but were also able to hack the hardware using the HDMI cable.

InternetNZ calls out Govt's Intelligence and Security Bill

InternetNZ calls out Govt's Intelligence and Security Bill Called the Independent Review of Intelligence and Security, Cullen and Reddy reviewed the NZ Security Intelligence Service (NZSIS) and Government Communications Security Bureau (GCSB), sought public submissions and reported back to the Government on 9 March 2016.The Independent Reviewers of Intelligence and Security released their report on New Zealand’s intelligence agencies, titled Intelligence and Security in a Free Society, in March this year.

Your guide to the ‘Shadow Brokers’ NSA theft, which puts the Snowden leaks to shame

Your guide to the ‘Shadow Brokers’ NSA theft, which puts the Snowden leaks to shame It’s the group that, arguably, has given the NSA a bad name in recent years.But it’s also the group that gives the NSA the majority of its real, target-specific power to advance and protect American interests.

Authorities using cutting-edge voice recognition to profile fugitives

Authorities using cutting-edge voice recognition to profile fugitives When the coast guard finally succeeded in trailing down the perpetrator, his profile matched up almost perfectly with the one generated by the CMU researchers.There are micro expressions contained within a voice that happen at a subconscious level and are beyond a person’s control.

Apple patches critical security flaws used to steal encrypted data

Apple patches critical security flaws used to steal encrypted data Apple products have a reputation for security, especially compared with the systemic security flaws baked into the Android update system (or lack thereof).In the world of device security, however, no one is ever perfect, and the critical flaws that Apple patched today underscore that point.

Leaked manuals confirm Stingrays can be used for mass surveillance, bypassing smartphone security

Leaked manuals confirm Stingrays can be used for mass surveillance, bypassing smartphone security Nearly four years ago, the Electronic Privacy Information Center released FBI documents discussing a controversial surveillance technique.Both federal and local authorities often have access to cell phone surveillance hardware, dubbed Stingrays (Harris Corp.

From civil liberties champion to turncoat: Yahoo built specialized software to spy on users for the NSA

From civil liberties champion to turncoat: Yahoo built specialized software to spy on users for the NSA Ever since the Snowden leaks in 2013, there’s been an ongoing debate over the nature of state surveillance.If a new report from Reuters is accurate, the Yahoo that went to bat to defend its users is a dim and distant memory today.

Yahoo applies for patent on mass surveillance system the Soviets would envy

Yahoo applies for patent on mass surveillance system the Soviets would envy On March 31, 2015 Yahoo applied for a patent with implications that would make the Stasi sit up and cheer.But there could be, if you and everyone else would just surrender all your personal information forever.

It's time to pardon Edward Snowden, and defuse Putin's increasingly dangerous weapon

It's time to pardon Edward Snowden, and defuse Putin's increasingly dangerous weapon As Russian intelligence demonstrates ever more alacrity with American political and social disruption, we must remember that the great bear still has a major weapon in reserve that’s tailored for this purpose.Edward Snowden is widely believed to be one of Vladimir Putin’s more successful gambits.