Blog Posts Tagged with "Surveillance"


Warrantless Cell Phone Tracking, Drones, and FBI Surveillance

April 19, 2012 Added by:Electronic Frontier Foundation

Documents prove warrantless cell phone tracking “has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight, documents show...

Comments  (1)


UK Proposes Monitoring Every Email, Call, and Text Message

April 10, 2012 Added by:Electronic Frontier Foundation

Law enforcement would have access to IP addresses, email addresses, when you send an email, and corresponding data for phone calls and text messages. The government has claimed this is needed to fight terrorism, but it would be available to law enforcement for all purposes...

Comments  (0)


NSA Denies Warrantless Wiretaps Despite Evidence

March 27, 2012 Added by:Electronic Frontier Foundation

The NSA claims it only has access to emails and phone calls of non-U.S. citizens overseas, but many previous reports that the program targets US based email records. In the 11 years since 9/11, Binney estimates 15 to 20 trillion transactions have been collected and stored by the NSA...

Comments  (0)


Supreme Court Decision on GPS Surveillance Ripples

March 23, 2012 Added by:Electronic Frontier Foundation

The U.S. Supreme Court’s decision has been lauded as a landmark ruling and the FBI's own lawyer commented that it is perceived as a sea change within the FBI. And now its impact is starting to work its way through the judicial system as courts evaluate warrantless use of GPS devices...

Comments  (0)


Digital Posse Comitatus: Generals Obfuscate and Inveigle Congress

March 21, 2012 Added by:Infosec Island Admin

9/11 opened the floodgates to the world of warrantless wiretaps and surveillance culture we now have and diminished the lines between military and civilian agencies collection and alleged sharing of data. In the case of the NSA though, the abilities were always there...

Comments  (0)


Liars and Outliers: Enabling the Trust that Society Needs to Thrive

March 20, 2012 Added by:Ben Rothke

Liars and Outliers is an absolutely fascinating and groundbreaking book. In this election year where the candidates attempt to make sweeping simplistic promises to fix complex problems, Schneier simply answers that in our complex society, there are no simple answers...

Comments  (0)


CIA and the Intelligence Components of Security

March 16, 2012 Added by:Plagiarist Paganini

We must approach with care the diffusion of technology, and correctly size up the potential threats. As there has been increased media attention on vulnerabilities within critical structures, the same approach must be followed to manage issues with commonly used devices...

Comments  (0)


Bluetooth Security: Be Wary

February 07, 2012 Added by:Theresa Payton

Many of us use and love Bluetooth technology. It’s easy to set up and convenient to use. But you might want to think twice about what you use it for because that easy connection for you can also be an easy connection for a cybercreep...

Comments  (4)


Managing Employee's Expectation of Privacy

February 02, 2012 Added by:Suzanne Widup

FDA whistleblowers allege their emails were monitored once they told Congress the agency was approving risky medical devices, violating their Constitutional rights. The FDA said that employees are warned they may be monitored, and should not have an expectation of privacy...

Comments  (1)


Exclusive: Interview With Hacker YamaTough

January 13, 2012 Added by:Anthony M. Freed

Update: “The Lords of Dharmaraja” claim to have released the source code for Symantec's Norton Utilities as was threatened earlier today. The alleged data dump has not been confirmed, and company officials have not yet released a statement. Exclusive interview with YamaTough here...

Comments  (3)


The Lords of Dharmaraja Faked Indian Gov't Memo

January 12, 2012 Added by:Jeffrey Carr

I compared the emails in the .bat archive of Mr. Reinsch with emails allegedly collected through RINOA SUR against multiple USCC commissioners and they were identical, either a tremendous coincidence or evidence that YamaTough has invented this entire scandal...

Comments  (8)


Exclusive: Indian Intelligence Infiltrated US Government Networks

January 10, 2012 Added by:Anthony M. Freed

Infosec Island received sixty-eight sets of usernames and passwords for compromised US government network accounts which “The Lords of Dharmaraja” said were acquired from servers belonging to India’s Ministry of External affairs and the National Informatics Centre...

Comments  (29)


Rim, Nokia and Apple Providing Government Back Doors

January 09, 2012 Added by:Plagiarist Paganini

Some Indian Military internal documents were found that refer to a surveillance project called RINOA SUR, which stands for RIM, Nokia and Apple. The project is related to a platform used to spy on the USCC - the US-China Economic and Security Review Commission...

Comments  (9)


Internet Giants Enlisted for Government Surveillance

October 03, 2011 Added by:Headlines

"When the possibility exists for information to be obtained that wasn't possible before, it's entirely understandable that law enforcement is interested. Then the issue would be, what's the right policy? And that, or course, engenders a lot of debate..."

Comments  (1)


Coalition Challenges Domestic Surveillance Policies

September 26, 2011 Added by:Headlines

"Congress has already provided the courts with strong, clear security procedures for handling evidence related to secret government surveillance. Letting the courts do their job and judge the legality of government wiretapping will not risk national security..."

Comments  (0)


Western Companies in Collusion with Chinese Oppression

September 21, 2011 Added by:Headlines

"Entering into the Chinese market as a search engine or social media provider is an ethical mine field. In the hands of authorities determined to police their subjects, search engines and social media platforms such as Facebook can become a potent tool of online repression..."

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »