Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

The executive order that led to mass spying, as told by NSA alumni

Cyrus Farivar - Ars Technica: [Executive Order] 12333 is used to target foreigners abroad, and collection happens outside the US,” whistleblower John Tye, a former State Department official, told Ars recently. “My complaint is not that they’re using it to target Americans, my complaint is that the volume of incidental collection on US persons is unconstitutional.” The document, known in government circles as “twelve triple three,” gives incredible leeway to intelligence agencies sweeping up vast quantities of Americans’ data. That data ranges from e-mail content to Facebook messages, from Skype chats to practically anything that passes over the Internet on an incidental basis. In other words, EO 12333 protects the tangential collection of Americans’ data even when Americans aren’t specifically targeted—otherwise it would be forbidden under the Foreign Intelligence Surveillance Act (FISA) of 1978. In a May 2014 interview with NBC, former NSA contractor Edward Snowden said that he specifically asked his colleagues at the NSA whether an executive order could override existing statutes. (They said it could not.) Snowden’s lawyer, Jesselyn Radack, told Ars that her client was specifically “referring to EO 12333.”

 

Two Factor Auth

Two Factor Auth (2FA): “Two-step verification, abbreviated to TSV (not equal to two step authentication TSA nor to Two-factor authentication, abbreviated to TFA) is a process involving two subsequent but dependent stages to check the identity of an entity trying to access services in a computer or in a network with just one factor or secret,Continue Reading

CIA IG Report Confirms Searches of Senate Computers

Feinstein Statement on CIA IG Report, Washington -  Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) released the following statement: “I was briefed Tuesday by CIA Inspector General David Buckley on the results of an IG investigation [summary only available at this time]. The investigation confirmed what I said on the Senate floor in March – CIA personnel inappropriatelyContinue Reading

Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity

New America Foundation – “It has been over a year since The Guardian reported the first story on the National Security Agency’s surveillance programs based on the leaks from former NSA contractor Edward Snowden, yet the national conversation remains largely mired in a simplistic debate over the tradeoffs between national security and individual privacy. It is timeContinue Reading

Deeper Dive into EFF’s Motion on Backbone Surveillance

News release: “Yesterday we filed a motion for partial summary judgment in our long running Jewel v. NSA case, focusing on the government’s admitted seizure and search of communications from the Internet backbone, also called “upstream.” We’ve asked the judge to rule that there are two ways in which this is unconstitutional under the Fourth Amendment: The admitted seizure of communications from theContinue Reading

UK Independent – NSA reportedly tracking any internet users who research privacy software online

James Vincent - “Any internet users who use or even read about privacy services online will be targeted for surveillance by the NSA, according to a new report from German broadcaster ARD. According to leaked source-code of the US spy agency’s ‘XKeyscore’ software, individuals who search for information about anonymising services such as Tor have their IPContinue Reading

The complicated challenges of archiving and retrieving government email

FCW.com: “When President Barack Obama signed a memorandum on the management of government records in November 2011, some touted it as the first significant action on the topic since Harry Truman signed the Federal Property and Administrative Services Act in 1949 and the Federal Records Act in 1950. More than six decades and 7 billion network devices later,Continue Reading

Former State Dept Exec Calls Executive Order 12333 a “Legal Loophole” for Spying on Americans

EFF – “What kind of data is the NSA collecting on millions, or hundreds of millions, of Americans?” That’s the question John Napier Tye, a former StateDepartment section chief for Internet freedom, calls on the government to answer in his powerful op-ed published today by the Washington Post. In it, Tye calls the NSA’s surveillance operations abroad, conducted under ExecutiveContinue Reading

Global Survey: Widespread Opposition to US Communications Surveillance, Drones

“A new survey from Pew Research finds overwhelming opposition to the US monitoring of emails and phone calls. There appears to be little variation by region or culture, with high levels of opposition found in countries in Europe, South America, Asia, and the Middle East. According to the survey “Global Opinions of U.S. Surveillance,” the four countriesContinue Reading

Guide to Google’s Account History Feature

Martin Brinkmann - ghacks.net: “Most online companies make available privacy related settings that their customers can modify to their liking. The default settings are often less than optimal and making sure that everything is set up properly is one of the first things that you should do. In fact, it is also important to check those settings regularlyContinue Reading

67 Percent of Critical Infrastructure Providers Were Breached Last Year

Jeff Goldman - eSecurity PlanetJeff Goldman - “A recent survey of 599 security executives at utility, oil and gas, energy and manufacturing companies in 13 countries has found that 67 percent have experienced at least one security breach in the past 12 months that led to the loss of confidential information or the disruption of operations. The survey, conductedContinue Reading

Verizon’s Transparency Report for the First Half of 2014

“In the first half of 2014, Verizon received approximately 150,000 requests for customer information from federal, state or local law enforcement in the United States. We do not release customer information unless authorized by law, such as a valid law enforcement demand or an appropriate request in an emergency involving the danger of death or seriousContinue Reading