Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

CIA IG Report Confirms Searches of Senate Computers

Feinstein Statement on CIA IG Report, Washington -  Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) released the following statement: “I was briefed Tuesday by CIA Inspector General David Buckley on the results of an IG investigation [summary only available at this time]. The investigation confirmed what I said on the Senate floor in March – CIA personnel inappropriately searched Senate Intelligence Committee computers in violation of an agreement we had reached, and I believe in violation of the constitutional separation of powers. “Director Brennan apologized for these actions and submitted the IG report to an accountability board. These are positive first steps. This IG report corrects the record and it is my understanding that a declassified report will be made available to the public shortly.”

Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity

New America Foundation – “It has been over a year since The Guardian reported the first story on the National Security Agency’s surveillance programs based on the leaks from former NSA contractor Edward Snowden, yet the national conversation remains largely mired in a simplistic debate over the tradeoffs between national security and individual privacy. It is timeContinue Reading

Deeper Dive into EFF’s Motion on Backbone Surveillance

News release: “Yesterday we filed a motion for partial summary judgment in our long running Jewel v. NSA case, focusing on the government’s admitted seizure and search of communications from the Internet backbone, also called “upstream.” We’ve asked the judge to rule that there are two ways in which this is unconstitutional under the Fourth Amendment: The admitted seizure of communications from theContinue Reading

UK Independent – NSA reportedly tracking any internet users who research privacy software online

James Vincent - “Any internet users who use or even read about privacy services online will be targeted for surveillance by the NSA, according to a new report from German broadcaster ARD. According to leaked source-code of the US spy agency’s ‘XKeyscore’ software, individuals who search for information about anonymising services such as Tor have their IPContinue Reading

The complicated challenges of archiving and retrieving government email

FCW.com: “When President Barack Obama signed a memorandum on the management of government records in November 2011, some touted it as the first significant action on the topic since Harry Truman signed the Federal Property and Administrative Services Act in 1949 and the Federal Records Act in 1950. More than six decades and 7 billion network devices later,Continue Reading

Former State Dept Exec Calls Executive Order 12333 a “Legal Loophole” for Spying on Americans

EFF – “What kind of data is the NSA collecting on millions, or hundreds of millions, of Americans?” That’s the question John Napier Tye, a former StateDepartment section chief for Internet freedom, calls on the government to answer in his powerful op-ed published today by the Washington Post. In it, Tye calls the NSA’s surveillance operations abroad, conducted under ExecutiveContinue Reading

Global Survey: Widespread Opposition to US Communications Surveillance, Drones

“A new survey from Pew Research finds overwhelming opposition to the US monitoring of emails and phone calls. There appears to be little variation by region or culture, with high levels of opposition found in countries in Europe, South America, Asia, and the Middle East. According to the survey “Global Opinions of U.S. Surveillance,” the four countriesContinue Reading

Guide to Google’s Account History Feature

Martin Brinkmann - ghacks.net: “Most online companies make available privacy related settings that their customers can modify to their liking. The default settings are often less than optimal and making sure that everything is set up properly is one of the first things that you should do. In fact, it is also important to check those settings regularlyContinue Reading

67 Percent of Critical Infrastructure Providers Were Breached Last Year

Jeff Goldman - eSecurity PlanetJeff Goldman - “A recent survey of 599 security executives at utility, oil and gas, energy and manufacturing companies in 13 countries has found that 67 percent have experienced at least one security breach in the past 12 months that led to the loss of confidential information or the disruption of operations. The survey, conductedContinue Reading

Verizon’s Transparency Report for the First Half of 2014

“In the first half of 2014, Verizon received approximately 150,000 requests for customer information from federal, state or local law enforcement in the United States. We do not release customer information unless authorized by law, such as a valid law enforcement demand or an appropriate request in an emergency involving the danger of death or seriousContinue Reading

The State of Data Centric Security

News release: ‘Informatica Corporation, the world’s number one independent provider of data integration software, today announced the availability  of a new research report by the Ponemon Institute LLC, entitled, The State of Data Centric Security. Based on a global survey of more than 1,500 IT and IT security professionals, the study reveals how organizations understand and respond toContinue Reading

Files provided by Snowden show extent to which ordinary Web users are caught in the net – WaPo

In NSA-intercepted data, those not targeted far outnumber the foreigners who are, by Barton Gellman, Julie Tate and Ashkan Soltani “Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. Nine of 10 account holders foundContinue Reading