New Zealand media were raided by police last November just before the general election, after the incumbent centre-right Prime Minister John Key made a criminal complaint over a recording of a conversation in a cafe between him and far right-wing politician John Banks during a staged media event. The country's biggest broadcasters and newspaper were raided by police, who requested unpublished material and sources for interviews as well as the recording itself. Radio New Zealand covered the "Teapot Tapes" scandal and was raided too even though it didn't have a copy of the recording.
The recording has now leaked out onto the Internet. It reveals little of consequence, but police are continuing the investigation and are seeking witnesses who were in the cafe at the time. Police are also warning people that disclosing private conversations unlawfully intercepted can be punished by up to two years' in jail. PM Key is aware the recording is now online, but has told National Business Review that he won't seek to remove it from YouTube and other sites.
Meanwhile, Bradley Ambrose, the cameraman who recorded the conversation - accidentally he says - has been issued with a NZ$14,000 demand for legal costs by the NZ government. If convicted, he could be sent to prison for up to two years. Ambrose had given a copy of the recording to the New Zealand Herald who in turn asked Key for permission to publish it. Before this week's Internet leak, the recording has never been made public.
Many insurers offer breaks to people who wear activity trackers that gather data on them; as Cathy “Mathbabe” O’Neil points out, the allegedly “anonymized’ data-collection is trivial to re-identify (so this data might be used against you), and, more broadly, the real business model for this data isn’t improving your health outcomes — it’s dividing […]
As the US government ramps up its insistence that visitors (and US citizens) unlock their devices and provide their social media accounts, the solution have run the gamut from extreme technological caution, abandoning mobile devices while traveling, or asking the government to rethink its policy. But Maciej Cegłowski has another solution: a “travel mode” for […]
For $170, Motherboard’s Joseph Cox bought SpyPhone Android Rec Pro, an Android app that you have to sideload on your target’s phone (the software’s manufacturer sells passcode-defeating apps that help you do this); once it’s loaded, you activate it with an SMS and then you can covertly operate the phone’s mic, steal its photos, and […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]