Consumerist, By Laura Northrup, October 10
Let’s say that you’re a brand, like Nabisco or the North Face, and you want to see what people are saying about you online. You could do a text search of Facebook and Twitter, but that’s soooo 2009, and you can’t guarantee that people will always label the photos [...]
In 1995, the US government tried – and failed – to categorise encryption as a weapon. Today, the same lines are being drawn and the same tactics repeated as the FBI wants to do the same. Here’s why they are wrong, and why they must fail again.
The Guardian, By Cory Doctorow, October 9
DeSmogBlog, By Mike G., October 7
After California state regulators shut down 11 fracking wastewater injection wells last July over concerns that the wastewater might have contaminated aquifers used for drinking water and farm irrigation, the EPA ordered a report within 60 days.
It was revealed yesterday that the California State Water Resources Board has [...]
RT, September 19
Washington, DC is littered with surveillance devices designed to trick surrounding mobile phones into logging onto signal-lifting networks, thereby allowing for tracking or call-monitoring purposes.
While traveling around the capital city with Washington Post reporters, a top executive using his company’s mobile-security technology detected as many as 18 such devices mimicking legitimate [...]
Wired, By Andy Greenberg, August 14
In the age of surveillance paranoia, most smartphone users know better than to give a random app or website permission to use their device’s microphone. But researchers have found there’s another, little-considered sensor in modern phones that can also listen in on their conversations. And it doesn’t even need [...]
Washington Post, By Craig Timberg, August 24
Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent.
The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, [...]
The Intercept, By Glenn Greenwald, July 14
The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The [...]
Politico, By Brooks Boliek & Katy Bachman, July 15
The Federal Communications Commission could have used an Internet “fast lane” on Tuesday as a flood of net neutrality comments caused its website to sputter and forced the agency to extend its deadline for accepting public input on its controversial plan.
FCC officials hope the additional [...]
FBI and NSA to review policy after leaked documents suggest training materials referred to targets using offensive language.
The Guardian, By Spencer Ackerman, July 9
The White House has instructed US security agencies to review their training and policy materials for racial or religious bias after documents leaked by Edward Snowden showed training material for [...]
RT, July 8
New cybersecurity legislation cleared the Senate Intelligence Committee on Tuesday during a closed session. Critics fear it may broaden the NSA’s already formidable access to Americans’ data.
Written by Senate Intelligence Chair Dianne Feinstein (D-CA) and Senator Saxby Chambliss (R-GA), CISA – or Cybersecurity Information Sharing Act – is widely seen as [...]
Bloomberg, By Carter Dougherty, July 8
Wall Street’s biggest trade group has proposed a government-industry cyber war council to stave off terrorist attacks that could trigger financial panic by temporarily wiping out account balances, according to an internal document.
The proposal by the Securities Industry and Financial Markets Association, known as Sifma, calls for a [...]
Files provided by Snowden show extent to which ordinary Web users are caught in the net
Washington Post, By Barton Gellman, Julie Tate & Ashkan Soltani, July 5
Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according [...]
Washington Post, By Ellen Nakashima and Barton Gellman, June 30
Virtually no foreign government is off-limits for the National Security Agency, which has been authorized to intercept information “concerning” all but four countries, according to top-secret documents.
The United States has long had broad no-spying arrangements with those four countries — Britain, Canada, Australia and [...]
Actual antennae for Aereo
So Barry Diller’s latest venture, Aereo, has hit a major legal snag:
A two-year-long legal battle between the country’s biggest broadcasters and a startup called Aereo is about to culminate at the U.S. Supreme Court.
The court’s decision, expected sometime this summer, could have far-reaching implications for television and technology [...]
BoingBoing, By Cory Doctorow, June 17
When the anonymous authors of the Truecrypt security tool mysteriously yanked their software last month, there was widespread suspicion that they had been ordered by the NSA to secretly compromise their software. A close look at the cryptic message they left behind suggests that they may have encoded a [...]