Archive for the 'Surveillance' Category

« Previous PageNext Page »

Son of Stuxnet

November 13th, 2014

Via: Firstlook: As he drove to work, he tried to wrap his mind around what he’d just seen, and couldn’t believe the Stuxnet gang was still active. After all the media attention and finger-pointing at Israel and the United States, he thought for sure the attackers would have laid low for a while to let […]

Big Safari

November 7th, 2014

Via: Vocativ: The man on the other line didn’t seem happy. “We are a secretive and shadowy organization that has been in existence for over 60 years,” he said. The man’s name is Col. Edward Topps. He’s the leader of a mysterious Air Force agency known as “Big Safari.” Last month, he called me out […]

Verizon Launching Tech News Site that Bans Stories on U.S. Spying

October 29th, 2014

Via: The Daily Dot: Verizon is getting into the news business. What could go wrong? The most-valuable, second-richest telecommunications company in the world is bankrolling a technology news site called SugarString.com. The publication, which is now hiring its first full-time editors and reporters, is meant to rival major tech websites like Wired and the Verge […]

Verizon Wireless Injects Identifiers that Link Its Users to Web Requests

October 29th, 2014

Via: Ars Technica: Cellular communications provider Verizon Wireless is adding cookie-like tokens to Web requests traveling over its network. These tokens are being used to build a detailed picture of users’ interests and to help clients tailor advertisements, according to researchers and Verizon’s own documentation. The profiling, part of Verizon’s Precision Market Insights division, kicked […]

Taco Bell Unveils Mobile Ordering

October 28th, 2014

“Cashiers and food service workers: You’re pretty much screwed.” —Seattle Hikes Minimum Wage to $15 Per Hour Via: USA Today: Food used to be what drove folks into restaurants. But these days, it’s also increasingly the technology behind it. That’s why two major restaurant chains, Taco Bell and Outback Steakhouse, made marketing waves on Tuesday, […]

British Spies Allowed to Access U.S. Data Without a Warrant

October 28th, 2014

Via: National Journal: British authorities are capable of tapping into bulk communications data collected by other countries’ intelligence services—including the National Security Agency—without a warrant, according to secret government documents released Tuesday. The agreement between the NSA and Britain’s spy agency, known as Government Communications Headquarters or GCHQ, potentially puts the Internet and phone data […]

Assange: Google Is Not What It Seems

October 28th, 2014

Via: Newsweek: It was also in 1999 that Schmidt joined the board of a Washington, D.C.–based group: the New America Foundation, a merger of well-connected centrist forces (in D.C. terms). The foundation and its 100 staff serve as an influence mill, using its network of approved national security, foreign policy and technology pundits to place […]

Extensive U.S. Mail Monitoring Revealed

October 28th, 2014

Via: Dallas Morning News: The U.S. Postal Service reported that it approved nearly 50,000 requests last year from law enforcement agencies and its own internal inspection unit to secretly monitor the mail of ordinary Americans for use in criminal and national security investigations. The findings serve as a rare public accounting of the Postal Service’s […]

Government Set Up A Fake Facebook Page In This Woman’s Name

October 23rd, 2014

Via: BuzzFeed: The Justice Department is claiming, in a little-noticed court filing, that a federal agent had the right to impersonate a young woman online by creating a Facebook page in her name without her knowledge. Government lawyers also are defending the agent’s right to scour the woman’s seized cell phone and to post photographs […]

Corpus of Data Automatically Shared with Apple by a Standard Installation of OS X Yosemite

October 20th, 2014

Via: GitHub: This repository provides a corpus of network communications automatically sent to Apple by OS X Yosemite; we’re using this dataset to explore how Yosemite shares user data with Apple. The provided data was collected using our Net Monitor toolkit; more information regarding usage and methodology is provided below. … Having read DuckDuckGo’s privacy […]

« Previous PageNext Page »