Contents Pages by Subject

Surveillance

Subject Photo
Article Image

http://www.wired.com, By Kevin Poulsen

The NSA has released some details of 12 incidents in which analysts used their access to America’s high-tech surveillance infrastructure to spy on girlfriends, boyfriends, and random people they met in social settings.

Article Image

arclein

What I worried about at passport control was the computer I was bringing so that a refusenik group in Moscow could use it to keep their records. In 1988, I didn’t even know how to turn on a computer. What if the border guards asked me to demonstrate

Article Image

AP

The nation's top intelligence official sidestepped questions from a senator about whether the NSA has ever used Americans cellphone signals to collect information on their whereabouts that would allow tracking of the movements of individual callers.

Article Image

The Daily Caller

There’s really no question by now that entirely too many school administrators across America are crazy, drooling morons. However, school administrators in Maryland possess a special, possibly bionic blend of stupidity and lunacy.

Article Image

Simple Justice

I have an answer from OPR, and a FISC judge. I am not providing it to you because all you will do is seek to write around it because you are biased in favor of the idea that an inquiry should have been launched. So I will save what I have for

Article Image

c/Net

A technique commonly used by hackers, a MITM attack involves using a fake security certificate to pose as a legitimate Web service, bypass browser security settings, and then intercept data that an unsuspecting person is sending to that service.

Home Grown Food