What Prism slide-presentation means by "direct access" to Internet giants' servers

At Techdirt, Mike Masnick has further thoughts on the NYT piece on Prism, in which they try to resolve the contradiction between the NSA and Obama's admission that Prism exists and the leaked NSA slide deck is real, and the categorical (and eerily similar) denials from the companies involved (as well as Twitter's glaring absence from the list of cooperating companies):

This is not, by the way, the first time that we've seen Twitter stand up and fight for a user's rights against a government request for data.

Read the rest

Malware-Industrial Complex: how the trade in software bugs is weaponizing insecurity

Here's a must-read story from Tech Review about the thriving trade in "zero-day exploits" — critical software bugs that are sold off to military contractors to be integrated into offensive malware, rather than reported to the manufacturer for repair. The stuff built with zero-days — network appliances that can snoop on a whole country, even supposedly secure conversations; viruses that can hijack the camera and microphone on your phone or laptop; and more — are the modern equivalent of landmines and cluster bombs: antipersonnel weapons that end up in the hands of criminals, thugs and dictators who use them to figure out whom to arrest, torture, and murder. — Read the rest

Android screen lock bests FBI

A court filing from an FBI Special Agent reports that the Bureau's forensics teams can't crack the pattern-lock utility on Android devices' screens. This is moderately comforting, given the courts' recent findings that mobile phones can be searched without warrants. David Kravets writes on Wired:

A San Diego federal judge days ago approved the warrant upon a request by FBI Special Agent Jonathan Cupina.

Read the rest