National Security Agency (NSA)
See the following -
Twitter Breaks Rank, Threatens To Fight NSA Gag Orders
Twitter threatened to launch a legal battle with the Obama administration on Thursday over gag orders that prevent it from disclosing information about surveillance of its users. Read More »
- Login to post comments
Unnecessary And Disproportionate: How The NSA Violates International Human Rights Standards
Even before Ed Snowden leaked his first document, human rights lawyers and activists were concerned about law enforcement and intelligence agencies spying on the digital world. One of the tools developed to tackle those concerns was the development of the International Principles on the Application of Human Rights to Communications Surveillance (the “Necessary and Proportionate Principles”)...
- Login to post comments
UPDATE 1-Apple, Google, Dozens Of Others Urge U.S. Surveillance Disclosures
Dozens of companies, non-profits and trade organizations including Apple Inc, Google Inc and Facebook Inc sent a letter on Thursday pushing the Obama administration and Congress for more disclosures on the government's national security-related requests for user data. Read More »
- Login to post comments
US Firms Worry Edward Snowden Is Wrecking Their Business, But The Patriot Act Was Already Doing That
Shortly after a meeting of an EU-sponsored program to push European cloud-computing capabilities in Estonia last month, a high-ranking EC official noted that the biggest losers from Edward Snowden’s revelation about US surveillance would be US businesses: Read More »
- Login to post comments
Vote All You Want. The Secret Government Won’t Change.
The people we elect aren’t the ones calling the shots, says Tufts University’s Michael Glennon...
- Login to post comments
Want A Cloud Where You Call The Shots? Consider ownCloud
Nervous about the NSA, PRISM and your public cloud? Not sure you want to put all your data eggs in one Amazon Web Services zone basket? Read More »
- Login to post comments
What Does Screening Your Phone Records Have To Do With Health Care?
I have been following the news about the National Security Agency (NSA) access to our phone records with great interest. If we as a society don’t sort some of this out, we’ll see a repeat in the health sector a few years from now. Read More »
- Login to post comments
What Scares Me About Healthcare & Electric Power Security
...As a security guy, what industries scare you most?” I get that question more frequently than you might imagine and my answer is always the same -- the healthcare and electrical power industries...
- Login to post comments
What Transparency Reports Don't Tell Us
These reports give us a lot of numbers, but very little information about how hard these companies fight on the behalf of users. Read More »
- Login to post comments
What Will Happen If The Feds Get Warrantless Access To Phone Location Data
On Tuesday prosecutors for the Obama administration argued that records of location data gathered by cell-phone companies should be available to law enforcement even when no search warrant has previously been issued by a judge. Read More »
- Login to post comments
What Your Email Metadata Told The NSA About You
President Obama said "nobody is listening to your telephone calls," even though the National Security Agency could actually track you from cellphone metadata. Well, the latest from the Edward Snowden leaks shows [the following]. Read More »
- Login to post comments
When It's At The Border, Your Data Is Fair Game — Even On Your Laptop
Americans are protected from warrantless search in America — but not at the nation's borders. The imaginary line separating the United States from the rest of the world has become a critical demarcation for the privacy of the country's citizens, as new documents from the ACLU and the ongoing Snowden leaks make clear. Read More »
- Login to post comments
Who Controls Your Smartphone? And How to Leverage Open Source to Prevent it from Spying on You
There are many things about today’s world that warrant us asking that question. Do you or the mobile vendor control your smartphones? If you are a consumer, small or medium business (SMB) -- the answer is the vendor...What if you are a large enterprise or a government agency? The answer is still the vendor...How can the user regain control? Not all vendors have locked devices and walled gardens. Google’s line of Pixel hardware, for example, is a mid-market solution whose bootloader allows locking and re-locking. Pixels support two versions of Android. Google Mobile Services (GMS), where free services are tied to data monetization and a UX like Apple and Samsung devices. Secondly, Pixels can run Android Open-Source Project (AOSP) code that shares the same strengths as the GMS build, but the customer controls the code base and updates. There are several companies that are selling AOSP operating system builds for Pixel and other unlockable/lockable mobile phones and tablets...
- Login to post comments
Who is spying on you? And do you care?
Several of our interns and younger editorial staff at Open Health News (OHN) have made a point of collecting and posting news clips about NSA and government spying on web sites. Read More »
- COSI 'Open' Health
- Login to post comments
Who’s Logging Your Face?
In 1892, Sir Francis Galton published a treatise in which he argued that the patterns on our fingers were “an incomparably surer criterion of identity than any other bodily feature.” Today, fingerprinting is ubiquitous. But the limits of the technique are clear: Fingerprinting is a targeted, one-off process whereby a single person is identified, typically through an in-person or on-site interaction. Advanced face recognition, on the other hand, lets police identify people from far away and without interacting with them...
- Login to post comments