-
+15 +2
The Latest Snowden Leaks Show That NSA Surveillance Gets Extremely Personal
We have known since Edward Snowden's first leaks came to light more than a year ago that NSA surveillance practices rely upon dragnet spying — the sort of programs that sweep in communications data of many thousands of ordinary phone and Internet users who have never been suspected of being terrorists. This is the backbone of the NSA story as it has played out so far: Surveillance is totalized, not targeted.
-
+18 +2
Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On
The National Security Agency and FBI have covertly monitored the emails of prominent Muslim-Americans—including a political candidate and several civil rights activists, academics, and lawyers—under secretive procedures intended to target terrorists and foreign spies. According to documents provided by NSA whistleblower Edward Snowden, the list of Americans monitored by their own government includes:
-
+13 +4
NSA Spied On Five Politically Active American Citizens, The Intercept Reports
Glenn Greenwald is naming names. The National Security Agency spied on five American citizens despite a lack of any finding that they posed a threat to national security, The Intercept, an investigative outlet co-founded by Greenwald, is reporting Wednesday.
-
+19 +1
NSA confirms it has Snowden emails, but says they're exempt from FOIA
A few moments ago, former Reuters social media editor Matthew Keys tweeted a photo he says is the NSA’s response to his Freedom of Information Act (FOIA) request for emails sent by Edward Snowden using his official government email address.
-
+19 +5
The airborne panopticon: How plane-mounted cameras watch entire cities
On June 28, 2012, in Dayton, Ohio, police received reports of an attempted robbery. A man armed with a box cutter had just tried to rob the Annex Naughty N’ Nice adult bookstore. Next, a similar report came from a Subway sandwich shop just a few miles northeast of the bookstore.
-
+17 +3
The Fifth Surveillance: Corporate Spying On Non-Profits | Techdirt
In the age of innocence that was brought to an end by Edward Snowden's revelations, we broadly knew of three kinds of surveillance: the classic kind, by countries against other countries; the industrial kind, by companies against companies; and...
-
+20 +4
The ultimate goal of the NSA is total population control
At least 80% of all audio calls, not just metadata, are recorded and stored in the US, says whistleblower William Binney – that's a 'totalitarian mentality'
-
+22 +5
Edward Snowden condemns Britain's emergency surveillance bill
The NSA whistleblower Edward Snowden has condemned the new surveillance bill being pushed through the UK's parliament this week, expressing concern about the speed at which it is being done, lack of public debate, fear-mongering and what he described as increased powers of intrusion.
-
+14 +3
NSA: Releasing Edward Snowden Emails Would Violate His Privacy
Surveillance agency says publishing more Snowden messages would be a 'clearly unwarranted invasion of personal privacy.'
-
+27 +4
Journalists will face jail over spy leaks under new security laws
George Brandis's new spying laws will include measure to criminalise media reporting of Snowden-style leaks
-
+32 +5
Snowden: NSA employees routinely pass around intercepted nude photos
Edward Snowden has revealed that he witnessed “numerous instances” of National Security Agency (NSA) employees passing around nude photos that were intercepted “in the course of their daily work.”
-
+21 +5
Snowden seeks to develop anti-surveillance technologies
Edward Snowden, a former U.S. spy agency contractor who leaked details of major U.S. surveillance programs, called on supporters at a hacking conference to spur development of easy-to-use technologies to subvert government surveillance programs around the globe.
-
+16 +4
Snowden tells hackers of the world to unite
Edward Snowden addressed a packed-to-capacity crowd at the Hackers On Planet Earth (HOPE) conference with a message reminiscent of a line from the hacker scene's favorite campy movie: Hackers of the world, unite.
-
+16 +4
How to Get Your Government Paycheck
How to get a government job.
-
+28 +4
New Surveillance Whistleblower: Another Way the NSA Violates the Constitution
A former Obama administration official calls attention to unaccountable mass surveillance conducted under a 1981 executive order.
-
+20 +4
Before Snowden: The Whistleblowers Who Tried To Lift The Veil
Bill Binney worked at the National Security Agency nearly three decades as one of its leading crypto-mathematicians. He then became one of its leading whistleblowers. Now 70 and on crutches, both legs lost to diabetes, Binney recalls the July morning seven years ago when a dozen gun-wielding FBI agents burst through the front door of his home, at the end of a cul-de-sac a 10-minute drive from NSA headquarters in Fort Meade, Md.
-
+21 +3
The Intercept Reveals The US Government's Guidebook For Declaring You're A Terrorist Or Putting You On The No Fly List | Techdirt
Jeremy Scahill and Ryan Deveraux, over at The Intercept have a giant scoop: the full 166-page guidebook that US law enforcement uses to declare someone a terrorist who deserves to be on one of its various watchlists from the no-fly list to the...
-
+24 +6
What I Learned from Edward Snowden at the Hacker Conference
Whatever Snowden’s origins and affiliations, he was not coming to his audience as a peer. He was coming as a prophet, and the gospel was liberty and anonymity and privacy and security.
-
+20 +4
Personal Privacy Is Only One of the Costs of NSA Surveillance
There is no doubt the integrity of our communications and the privacy of our online activities have been the biggest casualty of the NSA’s unfettered surveillance of our digital lives. But the ongoing revelations of government eavesdropping has had a profound impact on the economy, the security of the internet and the credibility of the U.S. government’s leadership when it comes to online governance.
-
+22 +5
A sneak peak at the leaked CIA Style Guide
This is not satire; this guide really exists and the quotes in this post really come from the CIA's Style Manual and Writer's Guide.
Submit a link
Start a discussion