Category Archives: Surveillance

Cellphones Used as Secret Trackers Worldwide

Posted on by

Author: Craig Timberg

cell
Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent. The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, up-to-the-minute records...

Apple Wants All of You

Posted on by

Author: Lily Hay Newman

AppleGoodEvil
Remember the PC wars? Desktops running Windows dominated the market, but Apple’s Macintoshes stubbornly captured small but valuable market share. As a consumer you had to choose sides. Now Apple is involved in a similar battle with Google, but the narrative here is more titans clashing than David and Goliath....

Facebook Can Follow You by Listening Through Your Smartphone

Posted on by

Author: James Vincent - Video

facebbok-cia
Now, Facebook wants to make this public diary even more detailed with a feature that uses your phone’s microphone to listen to your surroundings and add data about the music or TV you might have on using audio clues. “That means if you want to share that you’re listening to...

How the Digital Age Has Eroded Student Privacy

Posted on by

Author: David R. Wheeler

surveilance
In 1965, when Mary Beth Tinker was 13 years old, she wore a black armband to her junior high school to protest the Vietnam War. The school promptly suspended her, but her protest eventually led to a landmark Supreme Court case: Tinker v. Des Moines. In their verdict, the court vindicated Tinker by...

Airlines Call for More Security…

Posted on by

Author: Associated Press

scared
The disappearance of Malaysia Airlines Flight 370 highlights the need for security improvements both in tracking aircraft and screening passengers before they board planes, the International Air Transport Association said Tuesday. The global airline body also announced it is creating a task force that will make recommendations by the end...

How the NSA Plans to Infect ‘Millions’ of Computers with Malware

Posted on by

Author: Ryan Gallagher and Glenn Greenwald

flame-works-virus-whos.n
Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new...

Why You Should Care More About Your Smartphone’s Security

Posted on by

Author: LifeHacker - Video

ku-xlarge
It seems like every week we hear about a smartphone security flaw. Whether it's a massive bug in iOS, apps leaking your location data to the public, or insecure passcodes on our phones, smartphone security isn't taken seriously. Yet it should be: in a lot of cases, you can access...

Angry Birds Will Have Angry Users

Posted on by

Author: Arosha K Bandara

images
It was reported this week that the NSA and British intelligence agency GCHQ have been gathering information from popular apps including David Cameron’s favourite game, Angry Birds. According to the Guardian, the spy agencies have been working since 2007 to develop the means to take advantage of “leaky” smartphone apps...

Edward Snowden: ‘I Already Won’

Posted on by

Author: Bridie Jabour

snowden
Whistleblower Edward Snowden has declared “mission accomplished”, seven months after revelations were first published from his mass leak of National Security Agency documents. The documents, which were leaked to the Guardian and also the Washington Post and Der Spiegel, revealed how technological developments were used by the US surveillance agency...

Edward Snowden: NSA Surveillance Is about Power, Not Safety

Posted on by

snowden
Six months ago, I stepped out from the shadows of the United States Government's National Security Agency to stand in front of a journalist's camera. I shared with the world evidence proving some governments are building a world-wide surveillance system to secretly track how we live, who we talk to,...

By Cracking Cellphone Code, NSA Gains Sweeping Powers

Posted on by

Author: Craig Timberg

cell
The cellphone encryption technology used most widely across the world can be easily defeated by the National Security Agency, an internal document shows, giving the agency the means to decode most of the billions of calls and texts that travel over public airwaves every day. While the military and law...