Articles about Privacy

NSA phone tracking to be scaled back, says official

The NSA expects to scale back its phone tracking program in the near future, the agency’s director says. The comments came as part of a broader hearing in front of the House Intelligence Committee over the recent disclosures of NSA activities.

Director Gen. Keith Alexander told California Rep. Adam Schiff during questioning that his agency and the FBI are reviewing how the phone tracking program might be changed. Currently, the NSA asks only for the metadata -- general information about the call like phone numbers, duration, and location -- whether the person is suspected of terrorism or not, and en masse.

Continue reading

Snowden and the NSA reflect a millennial climate change

Snowdon (not Snowden) is the name of the tallest mountain in Wales and while by Swiss or Colorado standards it may not seem like much the weather on Snowdon is unpredictable and has taken many lives. I climbed Snowdon as a schoolboy with my class and that day on the mountain another school group was lost in a blizzard and some boys died. This is what first came to mind when I heard about National Security Agency contractor Edward Snowden leaking documents and fleeing to Hong Kong. Like his namesake mountain, this Snowden is trouble for those who are overconfident or unwary.

I’ve written about this general topic many times over the years and doing a search here and at PBS will yield a great deal that I’d rather not have to repeat. We’ve been here before. Maybe not so much in terms of there being a whistle-blower or a traitor (your choice of terms -- I’d say whistle-blower), but these surveillance programs are either old hat or logical extensions of what came before. I’m not defending them, I’m saying we shouldn’t be surprised they exist.

Continue reading

ACLU joins the party, files challenge against the NSA and Verizon

The National Security Administration may prefer to blend into the shadows, but that is a position no longer available to it thanks to the recent PRISM story. Yesterday Mozilla made headlines by launching a campaign against what has been termed a threat to citizens' privacy and security. Google also responded, assuring customers it had nothing to hide and asking for permission to publish information requests it receives.

Now the American Civil Liberties Union has taken the next step, filing against both the NSA and Verizon, the wireless carrier at the center of the scandal. The organization announces that it has filed a constitutional challenge to a surveillance program under which the National Security Agency grabs information about every phone call placed within, from, or to the United States.

Continue reading

Stop watching us! Mozilla takes on the NSA

The repercussions of last week's PRISM story continue to ricochet around the web. The latest domino to fall is that belonging to Mozilla, maker of the popular Firefox browser and Thunderbird email client. The organization announces sweeping actions against this news with a campaign designed to raise awareness on perceived privacy intrusions.

Mozilla's Alex Fowler, leader of privacy and public policy, announces "last week, media reports emerged that the US government is requiring vast amounts of data from Internet and phone companies via top secret surveillance programs. The revelations, which confirm many of our worst fears, raise serious questions about individual privacy protections, checks on government power and court orders impacting some of the most popular Web services".

Continue reading

Boycott the Internet!

What a strange coincidence: Earlier this week, Smithsonian Channel's "Air Disasters" broadcast an episode about the downing of Korean Airlines flight 007 in 1983 -- at the height of the Cold War. Turns out the Soviet Union recovered the black boxes and hid them for a decade. I'm old enough to remember the Cold War and what the United States fought against. I told my wife: "Sometimes I really wish the Soviet empire still existed, so Americans had a measure for government bad behavior". A day later, the Guardian and Washington Post broke what likely is the biggest story about U.S. surveillance since the Watergate break in. The activity stinks of behavior opposed decades ago.

The National Security Agency spies on you, in secret, something many people suspected. The NSA monitors Internet servers, without warrants. In a Google+ comment today, Joe Betsill brilliantly and succinctly captures what changed: "There's a difference between suspicion and evidence". He links to an Electronic Frontier Foundation "Timeline to NSA domestic spying". I strongly suggest reading the EFF material, in addition to the Guardian and Washington Post investigative reports -- so that you are informed.

Continue reading

PRISM -- It's the end of the Internet as we know it

…And I don’t feel fine. Tyranny has replaced liberty in the United States. Our rights are slowly being eroded. Not a day goes by without a new government scandal breaking in the news. As my colleague Mark Wilson reported yesterday, the National Security Agency (NSA) has been secretly spying on Verizon customers since April. The public was outraged -- and rightfully so. There was worry that this was just the tip of the iceberg. Unfortunately, according to a new report, it was just the tip. The rest of the iceberg is much larger -- and we are the Titanic heading right for it.

While the public was still wrapping their heads around the Verizon scandal, they were  informed by The Guardian of a far more devious and tyrannical program dubbed ‘PRISM’. According to the report, this program has been in effect since 2007. In that 6+ year span, the following companies have allowed themselves to be infiltrated:

Continue reading

NSA secretly orders Verizon to hand over millions of call records -- innocent & guilty

It sounds like something from the Cold War, but it is happening today. A top secret court order requires Verizon to hand over telephone records for millions of its subscribers to the NSA on an "ongoing daily basis". The order, in place since April this year, forces the telecom company to hand over a range of "tangible things" about phone calls placed within the US and to foreign countries.

This is not entirely unprecedented -- the recording of telephone data has long been used as a means of gathering intelligence during periods of war -- but this time things are a little different. Not only was the court order passed in secret, but there are no specific targets to the operation. It would be quite normal for the call of suspected terrorists or other criminals to be logged and recorded, but in this instance all phone calls are considered fair game.

Continue reading

Wearable cloud tech makes users feel more self-confident, clever... and sexy?

A study by CAST in conjunction with Rackspace reveals that users of wearable technology -- such as the Nike+ FuelBand and Jawbone UP -- feel using such devices boost their intelligence levels. The study looks at residents of the UK and US, and finds the wearable tech users not only feel cleverer, but also more self-confident.

These are not the only benefits the study unearths. US participants were generally rather more impressed with the benefits of wearable technology -- 71 percent of American users felt their health and fitness had improved as a result of using such devices, compared to 63 percent of those in the UK. More than half (53 percent) of US users believe wearable tech helps to improve intelligence, compared to just 39 percent of UK users.

Continue reading

Mistakes cost millions says data breach report

Symantec in conjunction with the Ponemon Institute has released a new study into the cost of data breaches. What it reveals is that whilst most of us worry about malware and hackers, it’s actually mistakes and system errors that cause the majority of breaches.

According to the survey, glitches and negligence between them accounted for 64 percent of last year’s data breaches. This includes employees leaking or mishandling information, violation of regulations, accidental data dumps and stolen or lost laptops.

Continue reading

Keep your passwords secure with Dashlane for Windows, Mac and Android

Dashlane, Inc has launched Dashlane 2.0 for desktop and Dashlane for Android 2.0.1, major new updates of its secure password management tool that allows users to securely store sensitive personal details such as online passwords and credit card information via free desktop and mobile apps.

Both builds gain a complete new user interface, the promise of a "massive jump" in product quality and support for two-factor authentication via Google Authenticator. In addition the desktop build gains a new Security Dashboard feature, while the Android version expands support for tablets and adds in-app browsing.

Continue reading

Make your Firefox private browsing sessions even more private

These days, the ability to browse the web anonymously is built into most web browsers. Firefox has a special Private Browsing mode where no trace of your history -- including searches, downloads, web forms and cookies -- is kept, although any downloaded files and bookmarks will remain as evidence of your secret browsing session.

It’s certainly more robust than a general browsing session, but it’s not as secure as it might be. That explains the reasoning behind Private Browsing by PortableApps.com 3.0, a free add-on for Firefox Portable Edition for Windows.

Continue reading

SteganPEG lets you hide personal data in plain sight

While it’s unlikely that the fate of your nation depends on it, there may be times when being able to pass on sensitive files to other people is a necessity. The obvious example is to encrypt those files in some way, either by storing them in a password-protected location or by encrypting them on the fly before passing them on.

The problem with this approach is that it’s rather visible. Your encrypted files by their very nature advertise the fact they contain some form of sensitive data, attracting unwanted attention. So what can you do about it? The answer lies with steganography, and a free tool for Windows called SteganPEG 1.0.

Continue reading

Dutch cyber cops could be licensed to hack

The Dutch government has revealed plans to give the police extra powers to fight cybercrime. Under the proposed new law officers would be given the right to hack into computers, read emails, install spyware and delete files. They could also be authorised to tap VoIP calls and break into servers located outside the country if they were being used to host DDoS attacks.

The country’s Justice Minister Ivo Opstelten says that the powers would be used under strict control and that the approval of a judge would be needed before the police could carry out these actions.

Continue reading

Mozilla takes on spyware maker

The Mozilla Foundation is accusing Gamma International, a UK-based software group, of making a false association between one of its products and the Firefox name.

Gamma International produces FinFisher, a program used by governments to obtain data in a covert way. FinFisher is often installed by disguising itself as an update to a well known program such as Firefox. Mozilla has now sent a cease and desist letter to Gamma claiming that its Firefox trademark is being violated and that the practice must end immediately.

Continue reading

EFF report: Twitter has your back, but Verizon says 'screw you'

The Electronic Frontier Foundation, an organization dedicated to protecting the rights of consumers, publishes its report on safety in the digital age. There are some winners and also some major losers this time around in the "Who has your back?" statement -- hint put down your cell phone, step away slowly and nobody gets hurt.

The annual report looks at major technology service providers' commitment to users' rights in the face of government data demands. EFF examines 18 companies' terms of service, privacy policies, advocacy, and courtroom track records and awards up to six gold stars for best practices in categories such as requiring a warrant for content, telling users about government data demands and publishing a transparency report.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.