The Petraeus/Broadwell email dragnet, which hasn't yielded evidence of any crime, has brought our attention to the FBI's sweeping powers to surveil email. But as ProPublica's Peter Maas writes, "It's not just email."
In July, Rep. Edward Markey, a Democrat from Massachusetts, cajoled major cellphone carriers into disclosing the number of requests for data that they receive from federal, state, and local law enforcement agencies: In 2011, there were more than 1.3 million requests. As ProPublica reported at the time, "Police obtain court orders for basic subscriber information so frequently that some mobile phone companies have established websites — here's one — with forms that police can fill out in minutes. The Obama Administration's Department of Justice has said mobile phone users have 'no reasonable expectation of privacy.'"
There's a particularly cruel irony in all of this: If you contact your cell-phone carrier or Internet service provider or a data broker and ask to be provided with the information on you that they provide to the government and other companies, most of them will refuse or make you jump through Defcon levels of hops, skips, and clicks. Uncle Sam or Experian can easily access data that shows where you have been, whom you have called, what you have written, and what you have bought — but you do not have the same privileges.
The FBI’s dumpster-dive into Paula Broadwell’s email archive has not yet revealed evidence of any crime, but it has revealed to America the extent to which our government is capable of collecting and surveilling our electronic communications. Greg Miller and Ellen Nakashima in the Washington Post : Many details surrounding the case remain unclear. The […]
Geoffrey Fowler and Evan Perez in the Wall Street Journal write about one practical (and, yes, obvious) takeaway from the Petraeus scandal: “Privacy protections for even the most sophisticated users of consumer-email services actually protect very little.” Or, as Kurt Opsahl from the EFF puts it in the article, “If the director of central intelligence […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]