Archive for the 'Surveillance' Category

« Previous PageNext Page »

Attacking Tor: How the NSA Targets Users’ Online Anonymity

October 5th, 2013

Via: Guardian: After identifying an individual Tor user on the internet, the NSA uses its network of secret internet servers to redirect those users to another set of secret internet servers, with the codename FoxAcid, to infect the user’s computer. FoxAcid is an NSA system designed to act as a matchmaker between potential targets and […]

NSA Admits Bulk Collection of Cell Phone Location Data, But Don’t Worry, This Was Only a Test

October 3rd, 2013

*wink* Via: New York Times: The National Security Agency conducted a secret pilot project in 2010 and 2011 to test the collection of bulk data about the location of Americans’ cellphones, but the agency never moved ahead with such a program, according to intelligence officials. The existence of the pilot project was reported on Wednesday […]

Navy Research Blimp Hovering Over Maryland

September 30th, 2013

[???] Via: CBS: The U.S. Navy research laboratory says the blimp is a government research airship conducting aerial mapping, and that the MZ-3A lighter than air blimp began roaming above the D.C. area on Sept. 21 and can remain stationary for more than 12 hours. The blimp is mapping in the flight restriction zones around […]

NSA Gathers Data on Social Connections of U.S. Citizens

September 28th, 2013

Via: New York Times: Since 2010, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials. The spy […]

Who Rooted Kernel.org Servers Two Years Ago, How Did it Happen, and Why?

September 24th, 2013

Via: Ars Technica: More than two years after unknown hackers gained unfettered access over multiple computers used to maintain and distribute the Linux operating system kernel, officials still haven’t released a promised autopsy about what happened. The compromise, which began no later than August 12, 2011, wasn’t detected for at least 16 days, a public […]

Torvalds On Being Asked to Insert a U.S. Government Back Door Into Linux Kernel

September 19th, 2013

Via: eWeek: NSA Backdoor Torvalds was also asked if he had ever been approached by the U.S. government to insert a backdoor into Linux. Torvalds responded “no” while shaking his head “yes,” as the audience broke into spontaneous laughter.

Satire: iPhone 5 NSA

September 18th, 2013

Via: We Are Change: Related: Apple Patents Kill Switch for Mobile Devices Because: “Covert Police or Government Operations May Require Complete ‘Blackout’ Conditions.”

‘Your Pulse Could Be Your New Password’

September 17th, 2013

Via: CBS: Passwords, pin numbers, and credit cards could soon be a thing of the past. Soon, your heart and your body might be used to keep track of just about everything if new technology is able to unlock “pulse passwords”. Your heartbeat reveals more about you than your health, Bionym chief executive officer Karl […]

No Child Left Untableted

September 16th, 2013

A division of Rupert Murdoch’s News Corporation is supplying tablet computers and curricula to students in the U.S. In other words, the world’s most diabolical propagandist is receiving public money (Department of Education’s Race to the Top program—no joke) to provide screen based education to thousands of students in the U.S. This could expand to […]

FBI Admits It Controlled Tor Servers Behind Mass Malware Attack

September 14th, 2013

Via: Wired: It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors. Freedom Hosting’s operator, Eric Eoin Marques, had rented the servers […]

« Previous PageNext Page »