iOS app Android app

Nsa Spying

Edward Snowden Describes Himself As A 'Moderate'

The Huffington Post | Chris Gentilviso | Posted 04.09.2014 | Politics

When it comes to politics, NSA whistleblower Edward Snowden insists he's in the center. In a wide-ranging interview with Vanity Fair published Tues...

Reconciling Internet Freedom and Government Snooping (VIDEO)

Nicholas Kralev | Posted 04.08.2014 | Technology
Nicholas Kralev

On this week's episode of "Conversations with Nicholas Kralev," Alec Ross, former senior adviser for innovation at the State Department, talks about the role of modern technology in achieving diplomatic objectives, empowering citizens around the world, and reconciling Internet freedom with U.S. government surveillance.

Dissecting Obama's Proposed NSA Reforms

Peter Van Buren | Posted 03.28.2014 | Politics
Peter Van Buren

The reforms, even if enacted exactly as proposed or even slightly strengthened, only alter the security state in some minor and superficial ways. Our Fourth Amendment rights against unwarranted search and seizure remain jackbooted.

Using Metadata to Catch a Whistleblower

Peter Van Buren | Posted 03.27.2014 | Politics
Peter Van Buren

What if that someone also had, as we know the NSA does, access to your social media, email, snail mail, credit card data, travel information, air reservations, and bank records? Orwell was an amateur. Metadata is the key to stripping away the haystack so that the needle is just sitting there.

Obama: U.S. Needs To Win Back Trust After NSA Spying

Reuters | Posted 03.26.2014 | Politics

* Obama, on European trip, says it will take time to win back trust * Obama wants to end bulk storage of phone records by NSA ...

Report: NSA Targeted Chinese Tech Giant's Servers

AP | Posted 03.22.2014 | Politics

BERLIN (AP) — U.S. intelligence agencies hacked into the email servers of Chinese tech giant Huawei five years ago, around the time concerns were gr...

N.S.A. Breached Chinese Servers Seen As Security Threat

New York Times | Posted 03.22.2014 | Politics

WASHINGTON — American officials have long considered Huawei, the Chinese telecommunications giant, a security threat, blocking it from business deal...

We Need a 'Do Not Track' List

Chris Weigant | Posted 03.12.2014 | Politics
Chris Weigant

Americans are now being tracked as they've never been tracked before. What is normal and accepted these days sounds like a tinfoil-hatted paranoiac's delusion from just a few decades ago, in fact.

NSA 'Hijacked' Criminal Botnets To Install Spyware

Reuters | Posted 03.12.2014 | Politics

By Joseph Menn SAN FRANCISCO, March 12 (Reuters) - While U.S. law enforcement agencies have long tried to stamp out networks of compr...

Sabrina Siddiqui

Senators Okay With Spying On Citizens, But Outraged It Happened To Congress

HuffingtonPost.com | Sabrina Siddiqui | Posted 03.12.2014 | Politics

WASHINGTON -- Sen. Dianne Feinstein (D-Calif.), a staunch defender of government surveillance of ordinary citizens, took to the Senate floor Tuesday w...

Snowden Warns Us of the Dark Path Ahead

Peter Van Buren | Posted 03.10.2014 | Politics
Peter Van Buren

In written testimony to the European Union (EU), Edward Snowden explained in patient, well-written, detailed prose exactly why what the NSA is doing is so dangerous.

The Spy Who Bugged Me

Keith Thomson | Posted 02.26.2014 | Books
Keith Thomson

The experience gave me the idea for a story: A national security reporter discovers that a subminiature electronic device is implanted in his head. He investigates, propelling him into a life-or-death struggle with the spy who'd bugged him.

Chuck Schumer Reveals How He's 'To The Right Of Rand Paul'

The Huffington Post | Paige Lavender | Posted 02.14.2014 | Politics

Sen. Chuck Schumer (D-N.Y.) said he's "to the right" of Sen. Rand Paul (Ky.) when it comes to the National Security Agency's surveillance program. ...

US Relaxes Gag on Google, Facebook et al, Allowing Firms to Discuss NSA Access. But Disclosures Not Likely to Reassure Customers

Peter Scheer | Posted 04.13.2014 | Technology
Peter Scheer

If NSA does, in fact, have a secret back door channel into Google's (and the other firms') user data and communications, it hardly matters how scrupulous the agency is in adhering to applicable legal rules restricting access through the front door.

It Can Happen Again: Covert Government Programs to Discredit Martin Luther King and Other Dissenters Show Dangers of NSA

Miles Mogulescu | Posted 04.12.2014 | Politics
Miles Mogulescu

Given the recent history of clandestine government operations against American citizens like Martin Luther King, there's good reason to reason to be worried about the future of liberty in America.

Blurred Lines And The Right To Privacy

Debbie Hines | Posted 04.08.2014 | TED Weekends
Debbie Hines

2013-01-18-TEDplayvideo.jpgOnce more people come to better understand what their online identity means and also connect on an emotional level, many more people will speak out about their right to privacy and against government intrusion.

The Invisible World of Software Backdoors and Bounty Hunters

Pratap Chatterjee | Posted 04.08.2014 | Technology
Pratap Chatterjee

It's increasingly clear that the online world is, for both government surveillance types and corporate sellers, a new Wild West where anything goes. This is especially true when it comes to spying on you and gathering every imaginable version of your "data."

Gerry Smith

Don't Believe The Hype: These New Services Won't Protect You From The NSA

HuffingtonPost.com | Gerry Smith | Posted 02.06.2014 | Technology

On its website, the company Private WiFi sells virtual private networks that it says can resist government snooping. “Don’t want the government to...

NSA Spying Creates Backlash Nationwide

AP | NIGEL DUARA | Posted 02.05.2014 | Politics

PORTLAND, Oregon (AP) — Revelations of National Security Agency surveillance programs have prompted state lawmakers around the United States to prop...

NSA Reportedly Tapped Another World Leader's Phone

Reuters | Posted 04.07.2014 | Politics

BERLIN, Feb 5 (Reuters) - The U.S. National Security Agency (NSA) bugged the phone of former German Chancellor Gerhard Schroeder from at least 2002,...

Check NSA Surveillance with Citizen "Sous-veillance" - Monitoring From Below

David Brin | Posted 04.05.2014 | World
David Brin

We should decide to let our watchdogs see -- technology makes it inevitable anyway -- but also keep our own eyes on them, so we can always yank the leash and remind Fido who is boss. In this way we can have both freedom and safety.

Privacy vs. Security: A False Dichotomy

Robin Koerner | Posted 04.05.2014 | TED Weekends
Robin Koerner

2013-01-18-TEDplayvideo.jpgOf course, it's not just our privacy that has been sacrificed: our freedom of speech and our right to due process have been sacrificed by the same laws, and with the same justification, that paved the way to systematic and secret violation of privacy. So what the likes of Feinstein are really saying is that the American way of life has less value than 2996 innocent lives.

You're Not a Terrorist? Are You Sure?

Bea Edwards | Posted 04.03.2014 | TED Weekends
Bea Edwards

2013-01-18-TEDplayvideo.jpgIf you haven't committed a crime, you assume that your comings and goings are innocent. But if the assumption is that you're a threat, then your everyday routine may not look so harmless.

Why NSA Snooping Is About a Lot More Than Just Our Privacy

Joe Lauria | Posted 04.02.2014 | TED Weekends
Joe Lauria

2013-01-18-TEDplayvideo.jpgGiven the long history of government surveillance against activists in this country, and new facts revealed by Snowden, it is clear one reason for NSA surveillance is to potentially disrupt social protest against inequality in the U.S.

Beyond Orwell's Worst Nightmare

Marjorie Cohn | Posted 04.02.2014 | TED Weekends
Marjorie Cohn

2013-01-18-TEDplayvideo.jpgOrwell never could have imagined that the National Security Agency (NSA) would amass metadata on billions of our phone calls and 200 million of our text messages every day. Orwell could not have foreseen that our government would read the content of our emails, file transfers, and live chats from the social media we use.