Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Search Results for: NSA surveillance

Guardian – Yahoo webcam images from millions of users intercepted by GCHQ

Spencer Ackerman and James Ball – The Guardian: “Britain’s surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal. GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to… Continue Reading

TRUSTe 2014 US Consumer Confidence Privacy Report

“Privacy concerns are growing with 74% more concerned about their online privacy than a year ago. Despite the constant media coverage of government surveillance programs such as NSA’s PRISM, this is not the main driver of online privacy concerns. People are far more concerned about businesses sharing personal information with other companies and tracking their… Continue Reading

Spy Agencies Scour Mobile Phone Apps for Personal Data

This ProPublic story was co-produced with The New York Times and The Guardian. “When a smartphone user opens Angry Birds, the popular game application, and starts slinging birds at chortling green pigs, spy agencies have plotted how to lurk in the background to snatch data revealing the player’s location, age, sex and other personal information, according to secret… Continue Reading

EPIC Files Appeal, Challenging Secrecy of Presidential Directives

“EPIC has filed a Statement of the Issue Presented with the D.C. Circuit Court of Appeals. EPIC is appealing a lower court decision that NSPD 54 — a Presidential Directive setting out the scope of the NSA’s authority over computer networks in the United States — is not subject to disclosure under the Freedom of Information Act. EPIC sought… Continue Reading

NYT – N.S.A. Devises Radio Pathway Into Computers

New York Times – David Sanger and Thom Shanker: “The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.  While most of the software is inserted by gaining access to computer networks,… Continue Reading

DNI Announces the Declassification of the Existence of Collection Activities Authorized by President Bush Shortly After Attacks of September 11, 2001

News release, December 21, 2013: “Yesterday, the Director of National Intelligence (“DNI”) announced the declassification of the existence of collection activities authorized by President George W. Bush shortly after the attacks of September 11, 2001. Starting on October 4, 2001, President Bush authorized the Secretary of Defense to employ the capabilities of the Department of Defense,… Continue Reading

Investigation Reveals More Than One Million Requests By Law Enforcement for Americans’ Mobile Phone Data

“As part of his ongoing investigation into wireless surveillance of Americans by law enforcement, Senator Edward J. Markey (D-Mass.) today released responses from eight major wireless carriers that reveals expanded use of wireless surveillance of Americans, including more than one million requests for the personal mobile phone data of Americans in 2012 by law enforcement. This… Continue Reading

Rolling Stone – Snowden and Greenwald: The Men Who Leaked the Secrets

Snowden and Greenwald: The Men Who Leaked the Secrets by Janet Reitman, December 4, 2013. This story is from the December 19th, 2013 – January 2nd, 2014 issue of Rolling Stone. “Early one morning last December, Glenn Greenwald opened his laptop, scanned through his e-mail, and made a decision that almost cost him the story of his life. A… Continue Reading

American Library Association gathering support to protect user metadata and privacy

The Hill, Kate Tummarello: “…You need to have some freedom to learn about what you think is important without worrying about whether it ends up in some FBI file,” said Alan Inouye, director of the Office for Information Technology Policy at the American Library Association (ALA). Government snooping of libraries has a long history. Under the Patriot… Continue Reading

EPIC Files Lawsuit to Determine Legal Authority For PRISM Program

“EPIC has filed a Freedom of Information Act lawsuit against the Department of Justice’s Office of Legal Counsel for the secret legal analyses that justifies the use of the NSA PRISM program. PRISM is a program that allows the FBI and NSA to collect information – including the contents of internet users’ communications – directly from internet… Continue Reading

EFF – Encrypt the Web Report: Who’s Doing What

EFF: “We’ve asked the companies in our Who Has Your Back Program what they are doing to bolster encryption in light of the NSA’s unlawful surveillance of your communications. We’re pleased to see that four companies—Dropbox, Google, SpiderOak and Sonic.net—are implementing five out of five of our best practices for encryption. In addition, we appreciate that Yahoo! just announced several measures… Continue Reading

NYT – N.S.A. Report Outlined Goals for More Power

N.S.A. Report Outlined Goals for More Power By JAMES RISEN and LAURA POITRAS “Officials at the National Security Agency, intent on maintaining its dominance in intelligence collection, pledged last year to push to expand its surveillance powers, according to a top-secret strategy document. In a February 2012 paper laying out the four-year strategy for the N.S.A.’s… Continue Reading