-
+9 +3
Communication Security Establishment's cyberwarfare toolbox revealed
Top-secret documents obtained by the CBC show Canada's electronic spy agency has developed a vast arsenal of cyberwarfare tools alongside its U.S. and British counterparts to hack into computers and phones in many parts of the world, including in friendly trade countries like Mexico and hotspots like the Middle East. The little known Communications Security Establishment wanted to become more aggressive by 2015, the documents also said.
-
+3 +1
The Social Laboratory
The Social Laboratory Singapore is testing whether mass surveillance and big data can not only protect national security, but actually engineer a more harmonious society.…
-
+4 +1
After years in Guantanamo, ex-detainees find little solace in Uruguay
Six housemates say their years in prison left them with ailments — and anger — that make it hard to adapt.
-
+12 +4
US to stop collecting bulk phone data if Congress lets law expire
US intelligence agencies in June will stop bulk collection of data documenting calls by US telephone subscribers, unless Congress extends a law authorising the spying, US officials said on Monday. The disclosure that the National Security Agency was collecting metadata generated by domestic telephone users was one of the most controversial revelations made by the former NSA contractor Edward Snowden nearly two years ago.
-
+4 +1
Documents Reveal Canada’s Secret Hacking Tactics
Canada's spy agency has developed an arsenal of cyberweapons capable of stealing data and destroying adversaries’ infrastructure, Snowden files reveal.
-
+2 +1
Trans-Pacific Partnership Seen as Door for Foreign Suits Against U.S.
The 12-nation accord would let foreign corporations challenge American actions and regulations that hurt their business, a classified document obtained by The Times says.
-
+16 +4
Connected cars perfect for harvesting personal data, report warns
As our cars get more high-tech and connected, they are increasingly spying on us and sending personal data about us to many different parties — in violation of Canadian privacy laws, a new report warns. Regulators need to step up and protect the privacy of car users at a time when the range and amount of potentially sensitive — and commercially valuable — data being collected by cars is growing, says a study funded by...
-
+5 +1
Iran Case Is So Secret It Can't Go On
For the first time, a U.S. court has dismissed a lawsuit on the basis of state secrets when it didn't directly involve the government or a defense contractor.
-
+16 +7
Leave Facebook if you don't want to be spied on, warns EU
European Commission admits Safe Harbour framework cannot ensure privacy of EU citizens’ data when sent to the US by American internet firms
-
+4 +1
NSA Doesn't Need to Spy on Your Calls to Learn Your Secrets
When you're surveilling one person, the contents of conversations can be more important than metadata. But when you're surveilling an entire population, metadata is far more useful. by Bruce Schneier
-
+6 +2
Stuck on the Flypaper
Frances Stonor Saunders on MI5 and the Hobsbawm File
-
+11 +3
Here's the top-secret StingRay manual
After a half year-long investigation, TheBlot obtained a heavily-redacted copy of a top-secret manual detailing StingRay and KingFish surveillance gear.
-
+12 +4
TSA’s Secret [~$900M] Behavior Checklist to Spot Terrorists
Fidgeting, whistling, sweaty palms. These are just a few of the suspicious signs that the Transportation Security Administration directs its officers to look out for in airport travelers, according to a confidential document obtained...
-
+5 +1
‘The FBI Is Trying to Destroy My Life’
After a year of being trailed by the FBI for knowing the Boston bombers, Khairullozhon Matanov was arrested. He is now headed to jail. And he’s not alone.
-
+18 +1
Passphrases That You Can Memorize — But That Even the NSA Can't Guess
It’s getting easier to secure your digital privacy. iPhones now encrypt a great deal of personal information; hard drives on Mac and Windows 8.1 computers are now automatically locked down; even Facebook, which made a fortune on open sharing, is providing end-to-end encryption in the chat tool WhatsApp. But none of this technology offers as much protection as you may think if you don’t know how to come up with a good passphrase.
-
+12 +3
NSA Behind "Malware" Infection of Computer Hardware Used by "Enemies" of the U.S.?
The NSA’s “Equation Group” is apparently behind the infection with malware of hard drive firmware on computers used by nations considered “enemies” by the United States. The installation of the malware is believed to have required access to trade secrets of IT manufacturers as well as physical access to the soon-to-be infected computers.
-
+14 +2
The FBI used to recommend encryption - Now they want to ban it
The FBI wants to make us all less safe. At least that’s the implication from FBI director Jim Comey’s push to ban unbreakable encryption and deliberately weaken everyone’s security. And it’s past time that the White House makes its position clear once and for all. Comey was back before Congress this week - this time in front of the House Appropriations Committee - imploring Congressmen to pass a law that would force tech companies to create a backdoor in any...
-
+9 +3
A court case so secret, US Govt says it can't go on
Imagine that someone has wronged you, and you sue them. Then the Government magically appears in court and asks that your suit be dismissed because, for reasons it won't tell you, state secrets might be dredged up in the course of the litigation. You have no idea what they're talking about. But after secret discussions with the judge from which both you and the defendant are excluded, the court dismisses your suit.
-
+10 +1
Absurd Fourth Circuit ruling embodies everything that’s wrong with drug raids
Court overturns award to father of man who was shot and killed by cops, even though the police lied about knocking and announcing.
-
+13 +4
Tor reportedly hires Verizon's PR firm to fight back against Pando's reporting
Over the past six months, I've published a series of stories on the longstanding and deeply conflicted financial relationship between the Tor Project and various arms of the US National Security State...
Submit a link
Start a discussion