Since 2010, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times,
"The connections between war and surveillance are clear. I don't want to give too much away but we're working on a project that has at its center how the National Security Agency plays a significant, central role in the US assassination program,"
We have a Constitution that prohibits warrantless searches and seizures. We have a government — and a President — who previously misled us about the existence of such programs. We have Senators who knew of the prior deception
The NSA has released some details of 12 incidents in which analysts used their access to America’s high-tech surveillance infrastructure to spy on girlfriends, boyfriends, and random people they met in social settings.
What I worried about at passport control was the computer I was bringing so that a refusenik group in Moscow could use it to keep their records. In 1988, I didn’t even know how to turn on a computer. What if the border guards asked me to demonstrate
The nation's top intelligence official sidestepped questions from a senator about whether the NSA has ever used Americans cellphone signals to collect information on their whereabouts that would allow tracking of the movements of individual callers.
South American nations are jointly exploring the creation of a communications system to curtail U.S. spying in the region, Ecuadorean Foreign Minister Ricardo Patino said on Wednesday.
Federal prosecutors have documented at least 350 instances of faulty background investigations done by private contractors and special agents for the US Office of Personnel Management, illustrating what some lawmakers call systemic
There’s really no question by now that entirely too many school administrators across America are crazy, drooling morons. However, school administrators in Maryland possess a special, possibly bionic blend of stupidity and lunacy.
Google is asking a federal appeals court to reconsider a recent ruling finding Google potentially liable for wiretapping when it secretly intercepted data on open Wi-Fi routers.
A bi-partisan group of senators has sent a letter to the inspector general of the United States intelligence community in hopes of having a federal auditor review the surveillance operations carried out by the government.
Brazilian President Dilma Rousseff lambasted US spying on her country at Tuesday’s UN summit, calling it a “breach of international law.” She further warned that the NSA surveillance, revealed since June, threatened freedom of speech and democracy.
I have an answer from OPR, and a FISC judge. I am not providing it to you because all you will do is seek to write around it because you are biased in favor of the idea that an inquiry should have been launched. So I will save what I have for
On Friday the Food and Drug Administration announced new rules that will require most new medical devices sold in the United States to possess a unique tracking code.
A St. Petersburg city lawmaker known for his conservative views cautioned Russian officials Monday against using Apple’s new iPhone until there is proof that the advanced technology is safe from US spying.
The U.S. Department of Homeland Security will test its crowd-scanning facial recognition system, known as the Biometric Optical Surveillance System, or BOSS, at a junior hockey game this weekend, according to the Russian news agency RT.
The latest allegations indicate the NSA manipulated and weakened a cryptography standard issued by the National Institute of Standards and Technology. As a result, NIST publicly discouraged companies from using that standard and
Since at least 2006 a secret spy court has continuously compelled the nation’s carriers to hand over records of every telephone call made to, from, or within the United States.
U.S. government legal opinions that interpret the powers that the FBI has to conduct surveillance should be declassified and released to the public, a civil liberties group said.
In a report set for release on Tuesday, the American Civil Liberties
A technique commonly used by hackers, a MITM attack involves using a fake security certificate to pose as a legitimate Web service, bypass browser security settings, and then intercept data that an unsuspecting person is sending to that service.
Call it the Edward Snowden effect: Citing the former NSA contractor, a federal judge has ordered the government to declassify more reports from the secret Foreign Intelligence Surveillance Court.
File-sharing tycoon Kim Dotcom has a plan to become a multi-millionaire again: He’s filed a seven-figure lawsuit against the New Zealand government over the spectacular 2012 assault on his mansion, and the electronic spying that preceded it.
Israeli officials have angrily rejected yesterday’s reports on leaked NSA documents showing that the US surveillance behemoth has been giving Israel “unevaluated” access to documents, including private information of US citizens.
The “markets monitoring” program in which the CFPB aims to monitor 80% of all credit card transactions in 2013, collecting data on 42 billion transactions made with 933 million credit cards, and to monitor 95% of all mortgage transactions
Watch Streaming Broadcast Live:
LRN.fm
DLive
Live Chat Telegram
Share this page with your friends
on your favorite social network: