Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Search Results for: Snowden

UK Guardian to share Snowden NSA documents with New York Times

Via the Guardian’s Lisa O’Carroll: “The Guardian has struck a partnership with the New York Times which will give the US paper access to some of the sensitive cache of documents leaked by the National Security Agency whistleblower Edward Snowden. The arrangement was made when the Guardian was faced with demands from the UK government… Continue Reading

National Intelligence Report Shows FBI Warrantlessly Searched Americans’ Data Millions Of Times Last Year

Tech Dirt: “Eight years ago, prompted by the Snowden revelations (and Senator Ron Wyden’s persistent questions), then-National Intelligence Director James Clapper finally provided the public with some insight into the FBI’s warrantless searches of Americans’ data collected (supposedly inadvertently) by the NSA. The report delivered to Sen. Wyden was surprisingly redaction-free. But that didn’t mean… Continue Reading

Stop Using the Same Password on Multiple Sites! No. Really

PCMag: “When you reuse passwords, a hacker can access multiple services, which might explain why many of our survey respondents have been victims of cybercrimes. If there’s anything we repeat constantly at PCMag, it’s the need for everyone to take cybersecurity seriously. And while that is arguably on the upswing, a large swath of the… Continue Reading

German intelligence can no longer freely spy on the world’s Internet traffic, top court rules

Fortune – “In the world of online spying, great power lies with those who can get their hands on the data flowing through the world’s Internet infrastructure. So the fact that Germany is home to one of the world’s biggest Internet exchange points—where data crosses between the networks that make up the Internet—has given a… Continue Reading

The Decade Tech Lost Its Way

The New York Times – The Decade Tech Lost Its Way – An oral history of the 2010s – “When the decade began, tech meant promise — cars that could drive themselves, social networks that could take down dictators. It connected us in ways we could barely imagine. But somewhere along the way, the flaws of technology… Continue Reading

Digital Privacy Does Matter to You

Anonymone Labs: “At this moment, there is a copy of every unencrypted email, text, photo, gif or emoji you have ever sent in your digital life. These copies are stored under your name/identity in the national data storage facility operated by the U.S. National Surveillance Agency. (One of the newest and largest of these is… Continue Reading

NSA Reports Call Detail Records (CDR) Deletion

NSA/CSS Statement, June 28, 2018: “Consistent with NSA’s core values of respect for the law, accountability, integrity, and transparency we are making public notice that on May 23, 2018, NSA began deleting all call detail records (CDRs) acquired since 2015 under Title V of the Foreign Intelligence Surveillance Act (FISA). The Government relies on Title… Continue Reading

The Intercept reports – The NSA’s Hidden Spy Hubs in Eight U.S. Cities

The Wiretap Rooms: “The secrets are hidden behind fortified walls in cities across the United States, inside towering, windowless skyscrapers and fortress-like concrete structures that were built to withstand earthquakes and even nuclear attack. Thousands of people pass by the buildings each day and rarely give them a second glance, because their function is not… Continue Reading

NYT – When Spies Hack Journalism

Scott Shane – The New York Times – “For decades, leakers of confidential information to the press were a genus that included many species: the government worker infuriated by wrongdoing, the ideologue pushing a particular line, the politico out to savage an opponent. In recent years, technology has helped such leakers operate on a mass… Continue Reading

The Effect of Encryption on Lawful Access to Communications and Data

The Effect of Encryption on Lawful Access to Communications and Data. February 8, 2017 ISBN# 978-1-4422-7995-7 (pb); 978-1-4422-7996-4 (eBook) CSIS/Rowman & Littlefield “Many have drawn parallels between today’s debate over “Going Dark” and the “Crypto Wars” of the 1990s, but much has changed since then. First, the Internet has become central to global economic activity,… Continue Reading

WikiLeaks posts redacted files purported to be hacked from CIA

Washington Post – WikiLeaks posts files it says are from the CIA’s computer hacking arsenal – “The anti-secrecy organization said the trove exceeded in scale and significance the massive collection of National Security Agency documents exposed by former U.S. intelligence contractor Edward Snowden. A statement from WikiLeaks indicated that it planned to post nearly 9,000… Continue Reading

Boundaries of Law: Exploring Transparency, Accountability, and Oversight of Government Surveillance Regimes

Korff, Douwe and Wagner, Ben and Powles, Julia and Avila, Renata and Buermeyer, Ulf, Boundaries of Law: Exploring Transparency, Accountability, and Oversight of Government Surveillance Regimes (January 5, 2017). Global Report – January 2017. Available at SSRN: https://ssrn.com/abstract=2894490 “Modern information technologies have given governments an unprecedented ability to monitor our communications. This capability can be… Continue Reading