Post Thumbnail

Twitter has been publishing what bits of info it's allowed to concerning national security requests for some time now, but the social media feed wants the ability to publish the whole thing. Today, the outfit filed a lawsuit aiming to get approval to post its entire transparency report. In a blog ...

3 months ago 0 Comments
Post Thumbnail

It's safe to say that surveillance technology had a profound effect on American culture, even before Edward Snowden's leaks arrived -- there's a sense that you can never really escape the government's eye. If you've ever shared that feeling, you'll be glad to hear that there's finally an art exhib...

4 months ago 0 Comments
Post Thumbnail

The US government's threat that it would fine Yahoo $250,000 per day back in 2008 was bad enough by itself, but declassified documents show that the penalties could easily have been much, much worse. Marc Zwillinger and Jacob Sommer (who were on Yahoo's side in the case) note that $250,000 was mer...

4 months ago 0 Comments
Post Thumbnail

If you've ever been arrested in the United States, chances are strong that your fingerprints and criminal history are floating around in the FBI's Integrated Automated Fingerprint Identification System. It's apparently pretty good at what it does - it can sift through some 70 million subjects in s...

4 months ago 0 Comments
Post Thumbnail

WikiLeaks' all-or-nothing approach to revealing shady government activity just took a new (if decidedly risky) turn. Julian Assange and crew have posted FinFisher and FinSpy PC, the intrusion software that Australia, Italy, Pakistan and other countries use to break into and spy on people's devices...

4 months ago 0 Comments
Post Thumbnail

It's no secret that the NSA's spies have been busy in Germany. However, it's now apparent that their activities in the country may reach much further than just targeting important leaders and suspects. Der Spiegel has published leaks showing that the US agency broke into the networks of both tech ...

4 months ago 0 Comments
Post Thumbnail

Recommended Reading highlights the best long-form writing on technology and more in print and on the web. Some weeks, you'll also find short reviews of books that we think are worth your time. We hope you enjoy the read. The Unstoppable TI-84 Plus: How an Outdated Calculator Still Holds a Monopo...

4 months ago 0 Comments
Post Thumbnail

If you've read George Orwell's 1984, you know of Big Brother's constant surveillance tactics. Taking inspiration from the book, and in response to present-day tracking methods, clothing maker The Affair is looking to Kickstart the 1984 Stealth Fashion collection. Thanks to a removable UnPocket, yo...

4 months ago 0 Comments
Post Thumbnail

Don't think that widespread cellphone surveillance is the sole province of big nations like the US and UK; apparently, it's within reach of just about any country with enough cash and willing carriers. The Washington Post understands that "dozens" of countries have bought or leased surveillance to...

5 months ago 0 Comments
Post Thumbnail

Normally, breaking a PC's security involves either finding security exploits or launching brute force attacks, neither of which is necessarily quick or easy. However, a team at Tel Aviv University has come up with a potentially much simpler way to swipe data from a computer: touch it. If you make ...

5 months ago 0 Comments
Post Thumbnail

You may know that the UK's GCHQ intelligence agency pokes its nose into people's internet service accounts, but it's now clear that the spy outfit is mapping the internet connections of whole nations, too. Heise has obtained documents showing that a GCHQ system, Hacienda, can scan every internet a...

5 months ago 0 Comments
Post Thumbnail

With perhaps the exception of the bands on stage, no one really goes to a concert to be seen -- they go to feel the music coursing through their veins and melt into a crowd. As it turns out, fun-seekers at the 2013 Boston Calling music festivals weren't just caught on film by photographers and Ins...

5 months ago 0 Comments
Post Thumbnail

This boxy, unassuming thing you see above is what's called an IMSI catcher. In essence, they pose as miniature cell towers that mobile devices connect to and route things through. All of that information - phone numbers, call recipient, caller location - are fair game to whomever controls that box...

5 months ago 0 Comments
Post Thumbnail

You may want to be careful about the conversations you hold in the future; if you're near a window, someone might be listening in. A team of researchers from Adobe, Microsoft and MIT have developed a visual microphone algorithm that picks up audio by looking for microscopic vibrations in video foo...

5 months ago 0 Comments