The FBI's dumpster-dive into Paula Broadwell's email archive has not yet revealed evidence of any crime, but it has revealed to America the extent to which our government is capable of collecting and surveilling our electronic communications.
Greg Miller and Ellen Nakashima in the Washington Post :
Many details surrounding the case remain unclear. The FBI declined to respond to a list of questions submitted by The Washington Post on its handling of personal information in the course of the Petraeus investigation. The bureau also declined to discuss even the broad guidelines for safeguarding the privacy of ordinary citizens whose e-mails might surface in similarly inadvertent fashion.
The Petraeus/Broadwell email dragnet, which hasn’t yielded evidence of any crime, has brought our attention to the FBI’s sweeping powers to surveil email. But as ProPublica’s Peter Maas writes, “It’s not just email.” In July, Rep. Edward Markey, a Democrat from Massachusetts, cajoled major cellphone carriers into disclosing the number of requests for data that […]
Geoffrey Fowler and Evan Perez in the Wall Street Journal write about one practical (and, yes, obvious) takeaway from the Petraeus scandal: “Privacy protections for even the most sophisticated users of consumer-email services actually protect very little.” Or, as Kurt Opsahl from the EFF puts it in the article, “If the director of central intelligence […]
DJI is the world’s leading designer and producer of easy-to-fly drones and aerial photography systems. If you’re a drone enthusiast, you want a DJI. If you know absolutely nothing about drones and think they’re weird, if you win a DJI you’re going to become a drone enthusiast.Enter this giveaway (for free, yes) and you’ll get a […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]