Wonder what kind of NSA commander-in-chief Donald Trump would be? Well, he had a phone console near his bed that could connect to every phone in his Mar-a-Lago estate, reports Aram Roston at Buzzfeed. Several workers told Buzzfeed that Trump used the equipment to secretly listen in on phone calls in the mid-2000s.
The U.S. Justice Department is charging a Chinese national with economic espionage charges, saying he stole source code from an American company with the intent of transferring it to the Chinese government. He is reported to have been an employee of IBM at the time of the alleged crime.
“We appreciate that there are times when secrecy around a government warrant is needed,” Microsoft President Brad Smith wrote in a blog post Thursday. “But based on the many secrecy orders we have received, we question whether these orders are grounded in specific facts that truly demand secrecy. To the contrary, it appears that the issuance of secrecy orders has become too routine.”
The #FBIvsApple legal case may be over, but the fight over security, privacy, and the right to live free of surveillance has just begun. The Justice Department is expected to drop its legal action against Apple, possibly as soon as today, because an 'outside method' to bypass security on the San Bernardino gunman's iPhone has proven successful, a federal law enforcement official said Monday.
It took a while, but FBI director Jim Comey got a little bit of the grilling he has earned in the FBI vs. Apple case. Freedom of the Press Foundation's Trevor Timm writes on today's House Judiciary Committee hearings on Capitol Hill, at which both the government and the Cupertino tech giant were represented.
Author and former CIA officer Barry Eisler spoke at the Association of Former Intelligence Officers opposite ex-CIA and NSA director Michael Hayden on Monday. Below, an adaptation of his opening remarks about the importance of whistleblowers and government transparency. Eisler's new novel, "God's Eye View," inspired by the Snowden revelations, is available now on Amazon.
Fight For The Future is organizing rallies at Apple store locations nationwide to protest a court order pressuring the tech company to build a “backdoor” that would give the FBI the power to hack the iPhone. Today, it's the San Bernardino killers they're asking about, because who could argue with that? But tomorrow, maybe it'll be your phone.
“iPhone users will gather outside stores with a simple message for the government: 'Don’t Break Our Phones.'”
How does TMZ get the videos and photos that celebrities want to hide? Because like any good intelligence operation, their spies aren't above paying for intelligence. TMZ pays its sources good money for tips on the dirty-doings of the rich and famous, and operates in Hollywood with the reach and stealth of an effective surveillance outfit.
The war on encryption waged by the F.B.I. and other intelligence agencies is unnecessary, because the data trails we voluntarily leak allow “Internet of Things” devices and social media networks to track us in ways the government can access.
That's the short version of what's in “Don’t Panic: Making Progress on the ‘Going Dark’ Debate,” a study published today by the Berkman Center for Internet and Society at Harvard.
The same entity that claims to be behind a recent hack of CIA Director John Brennan's personal email now claims to be behind a breach of the accounts of Director of National Intelligence James Clapper. The Office of the Director of National Intelligence confirmed to Motherboard that Clapper had been targeted, and that the case has been forwarded to law enforcement.
In the past few days there have been a flurry of stories about the Russian plane that crashed in the Sinai peninsula, which investigators reportedly think may have been caused by a bomb. Notably, anonymous US officials have been leaking to journalists that they believe ISIS is involved, and it’s a perfect illustration of the US government’s rank hypocrisy when it comes to the Edward Snowden disclosures.
A study found that it's now the norm for smartphone apps to "spy" on their users, reporting what they do on their devices while the software is running.
The research, conducted by MIT, Carnegie-Mellon and Harvard, examined the behavior of 110 titles and found that 73 percent of Android apps and 47 percent of the iOS apps reported the user's location. 49 percent of Android apps share personally-identifying information, whereas 25 percent of iOS apps do.
The key revelation is they're not just phoning home: some of the Apps are leaking data to more than a dozen different domains.
Privacy International said it was more evidence of how devices "betray us". The study, Who Know What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps, tested 55 of the most popular Android apps and the same number of iOS apps. The researchers recorded the HTTP and HTTPS traffic that occurred while using the different apps and looked for transmissions that included personally identifiable information, behavioural data such as search terms and location data.Read the rest
“Thai authorities are planning to tighten control over the Internet, creating a single international access point so they can better monitor content,” reports Voice Of America Correspondent Steve Herman in Bangkok.
The plan is being called Thailand’s own "Great Firewall," after the colloquial term used to describe the Chinese government's extensive and effective internet censorship system. Read the rest