Blog Posts Tagged with "NSA"
December 06, 2012 Added by:Electronic Frontier Foundation
On December 14th, we hope that the Northern District of California federal court will agree with us that our case challenging illegal domestic spying should move forward. Warrantless wiretapping isn't a state secret—it's a clear violation of FISA, other laws, and the Constitution...
October 14, 2012 Added by:Electronic Frontier Foundation
EFF filed its latest brief in the Jewel v. NSA case, aiming to stop the government from engaging in mass warrantless collection of emails, phone calls, and customer records of ordinary Americans. The matter is set for hearing on December 14, 2012 in federal court in San Francisco...
October 07, 2012 Added by:Electronic Frontier Foundation
Three more NSA whistleblowers, including William Binney a former high ranking official involved with the program during its infancy, also submitted affidavits laying out how the NSA illegally spied on Americans in the aftermath of 9/11...
September 23, 2012 Added by:Electronic Frontier Foundation
The House voted to renew the dangerous FISA Amendment Act which hands the NSA broad, warrantless surveillance powers for another five years. Sadly, the House refused to add any oversight powers or privacy protections, despite evidence the NSA has used it to spy on Americans...
August 30, 2012 Added by:Electronic Frontier Foundation
There’s long been ample evidence the NSA has been unlawfully collecting Americans' communications since the passage of the FISA Amendments Act. As the New York Times reported in 2009, the NSA was still collecting purely domestic communications of Americans' in a "significant and systemic" way...
August 02, 2012 Added by:Bill Mathews
General Alexander says that private sector, hackers, exploit developers, etc. need to share information and tools in order to help protect the US. Is the NSA being nefarious and wanting to spy on hackers, or are they legitimately seeking help for a problem that will only continue to grow in the future?
August 01, 2012 Added by:Electronic Frontier Foundation
Senators John McCain and Kay Bailey Hutchison have proposed amendments that would hand the reins of our nation’s cybersecurity systems to the NSA. The agency's dark history, flouting of domestic law, and resistance to transparency makes it clear that the nation's cybersecurity should not be in its hands...
July 31, 2012 Added by:Scot Terban
With the advent of Anonymous and Stuxnet and the nascent idea of the internet becoming a “digital nation state” we all have to be mindful that while the technologies out there are a commodity, so too are we in the great game of cold war intelligence and cyber war. We are the commodity that makes the new exploit...
July 23, 2012 Added by:Headlines
“First and foremost, our whole strategy from a classified mobility perspective is very much focused on commercial solutions for classified [communications]... It’s our intent that we would deliver, end-to-end, a solution that is reliant on all commercial components and we believe we can do that...”
July 11, 2012 Added by:Headlines
“If the critical infrastructure community is being attacked by something, we need them to tell us at network speed... It requires them - the Internet service provider or that company - to tell us that that type of event is going on at this time. And it has to be at network speed if you’re going to stop it...”
July 10, 2012 Added by:Electronic Frontier Foundation
A few members of Congress have been trying to get the Obama administration to answer a question: How many Americans’ phone calls or emails have been and are being collected without a warrant under the FISA Amendments Act of 2008? Unfortunately, no one else in the government seems to want that question answered...
June 20, 2012 Added by:J. Oquendo
The CIA, NSA and Microsoft created a completely separate operating system somewhere in the Beltway. Microsoft decided to give the agencies the specific code to make the rogue changes. Microsoft allowed the rogue system to be placed inside of their network and only allow a specific country to be infected...
June 15, 2012 Added by:Headlines
Program graduates often develop into cyber experts who help to protect national-security information systems, commercial networks, and critical information infrastructure in both the private and public sectors – meeting the increasingly urgent needs of the U.S. government, industry, and academia...
June 14, 2012 Added by:Headlines
“If you’re moving information into the cloud, it just seems to me that all kinds of nasty activity could go on in there. I would take a Missouri approach and say, ‘prove it to me, show it to me,’ how it’s more secure,” said former director of intelligence, surveillance and reconnaissance for the Air Force...
May 23, 2012 Added by:Headlines
Many of the nation's colleges and universities offer courses or promote projects in cybersecurity. NSA's new program differs in that it integrates the relevant academic disciplines, with a focus on technology and the techniques associated with specialized cyber operations...
May 01, 2012 Added by:Headlines
During the competition, NSA network specialists and military network experts formed the red cell team that challenged cadet blue cell teams to defend a closed-computer network that the cadets designed, built and configured at their respective academies...
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013