Contents Pages by Subject

Surveillance

Subject Photo
Article Image

http://www.vox.com, Sarah Kliff and Soo Oh

Some people collect stamps. Others gather rare baseball cards. Jonathan Melby and Angela Buffington, however, prefer to collect something quite different: traffic cameras.

Article Image

Schneier on Security

ID checks were a common response to the terrorist attacks of 9/11, but they'll soon be obsolete. You won't have to show your ID, because you'll be identified automatically. A security camera will capture your face, and it'll be matched with

Article Image

Schneier on Security

.... This is the first practical break of the full SHA-1, reaching all 80 out of 80 steps, while only 10 days of computation on a 64 GPU cluster were necessary to perform the attack. ....

Article Image

Social media and smart phones don't have to be evil - there's nothing bad about talking to your friends, after all - but right now social media and "Big Brother in your pocket" phones are very clearly servicing evil.

Article Image

Schneier on Security

A rural New Hampshire library decided to install Tor on their computers and allow anonymous Internet browsing. The Department of Homeland pressured them to stop.

Article Image

http://hosted.ap.org

Kim Dotcom and three colleagues face an extradition hearing that began Monday in an Auckland courtroom. Dotcom is the colorful German-born entrepreneur who started the Internet site Megaupload, which was shut down by federal authorities in 2012. Here

Article Image

https://www.youtube.com

Besides massive layoffs and a 50% decline in Hewlett Packard's stock during her brief tenure as CEO, what else has Carly Fiorina done? With legal barriers to Big Brother surveillance ignored, Carly has partnered with Michael Hayden

ContentSafe