Busted! Two New Fed GPS Trackers Found on SUV
CyberTechTips
C.D.C. Closes Anthrax and Flu Labs After Accidents
After potentially serious accidents involving bird flu and live anthrax, the Centers for Disease Control and Prevention shut the Atlanta labs and halted shipments of infectious agents.
Another 'NSA-proof' webmail biz popped by JavaScript injection bug
alert('Thomas Roth strikes again');
Should we run and hide, or stand and be one?
NSA Claims That Linux Journal Is A Forum for Radical Extremists. They May B
When I first became a regular user of Linux, several years ago, I tried out different text editors and quickly discovered that emacs was my best choice. By coincidence, about that time I ran into an old emacs manual written by Richard Stallman in the dollar section of a used booksore. In that edition, near the end of the book, was a section on “Mail Amusements.” This documented the command “M-x spook” which adds “a line of randomly chosen keywords to an outgoing mail message.
Glenn Greenwald's No Place to Hide | Library Babel Fish @insidehighered
A review of a book well worth reading.
Student jailed for refusing to hand over password to police
Android privacy flaw leaks location details over Wi-Fi -- even when Wi-Fi i
Officials Defend N.S.A. After New Privacy Details Are Reported
A report by The Washington Post, which included information from Edward J. Snowden, suggested that roughly nine out of 10 communications involved people who were not the direct targets of surveillance.
How To Enable Storage Pooling And Mirroring Using Btrfs For Linux
If you have multiple hard drives in your Linux system, you don't have to treat them as different storage devices. With Btrfs, you can easily create a storage pool out of those hard drives.
How to Find if a Windows Process Is Virus or Legitimate
Who Watches The Watchmen? | TechCrunch
In honor of the Fourth of July, let's talk a little about how horrifically paranoid and counterproductive the US government has become. And I'm not even talking about Congress! Instead I mean our old friend the No Such Agency, who, it turns out, have been singling out for special treatment anyone who displays any interest in tools which might make the NSA's life more difficult.
First look at secure email provider ProtonMail
Find out everything there is to know about the secure email provider ProtonMail.
Do you carry a gun in your purse? : r/CCW
The Second Amendment and the Workplace : r/CCW
This simple app lets anyone be an encryption expert (Wired UK)
Hollywood Fails to Add Torrent Sites to Child Abuse Filter
It's been revealed that major Hollywood movie studios including Disney, Paramount, Fox, Sony and Universal attempted to have torrent sites added to New Zealand's already controversial Internet child protection filter. Alongside ISPs' objections to the proposal, the Kiwi government rejected the request.
NSA Targets the Privacy-Conscious for Surveillance - Schneier on Security
Jake Appelbaum et al., are reporting on XKEYSCORE selection rules that target users—and people who just visit the websites of—Tor, Tails, and other sites. This isn’t just metadata; this is “full take” content that’s stored forever. This code demonstrates the ease with which an XKeyscore rule can analyze the full content of intercepted connections. The fingerprint first checks every message using the “email_address” function to see if the message is to or from “bridges@torproject.org”. Next, if the address matched, it uses the “email_body” function to search the full content of the email for a particular piece of text – in this case, “https://bridges.torproject.org/”. If the “email_body” function finds what it is looking for, it passes the full email text to a C++ program which extracts the bridge addresses and stores them in a database. ...
The Ultra-Simple App That Lets Anyone Encrypt Anything
Encryption is hard. When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldn’t figure out the venerable crypto program PGP even after Snowden made a 12-minute tutorial video. Nadim Kobeissi wants to bulldoze that steep learning curve.
5 Refreshing Uses For A VPN
Facebook tinkered with users’ feeds for a massive psychology experiment
The A.V. Club digs deep into film, TV, music, games, books and more.
‘Illegal Spying Below’ blimp flies above NSA data center
Anti-surveillance activists flew a blimp above the National Security Agency’s massive, $1.5 billion data center in Bluffdale, Utah on Friday as an act of protest against the NSA’s contentious collection of vast amounts of the world’s digital data.
Meet Onionshare, the File Sharing App the Next Snowden Will Use
A small software app called Onionshare offers the most secure file sharing available. So why hasn't anyone heard of it? Well, mostly because it was
German government to drop Verizon because of U.S. spying
This Site Shows Who Is Hacking Who Right Now
The U.S. was far and away the most popular hacking target in the world.
More on Hacking Team's Government Spying Software
Hacking Team is an Italian malware company that sells exploit tools to governments. Both Kaspersky Lab and Citizen Lab have published detailed reports on its capabilities against Android, iOS, Windows Mobile, and BlackBerry smart phones. They allow, for example, for covert collection of emails, text messages, call history and address books, and they can be used to log keystrokes and obtain search history data. They can take screenshots, record audio from the phones to monitor calls or ambient conversations, hijack the phone’s camera to snap pictures or piggyback on the phone’s GPS system to monitor the user’s location. The Android version can also enable the phone’s Wi-Fi function to siphon data from the phone wirelessly instead of using the cell network to transmit it. The latter would incur data charges and raise the phone owner’s suspicion...
Tocsin Data
We find Everything.
Pepper Spray Drones
Coming soon to a protest near you: drones that fire pepper spray bullets. Desert Wolf’s website states that its Skunk octacopter drone is fitted with four high-capacity paintball barrels, each capable of firing up to 20 bullets per second. In addition to pepper-spray ammunition, the firm says it can also be armed with dye-marker balls and solid plastic balls. The machine can carry up to 4,000 bullets at a time as well as “blinding lasers” and on-board speakers that can communicate warnings to a crowd.
Supreme Court holds that privacy rights apply to cellphones, police need a
Supreme Court Says Phones Can’t Be Searched Without a Warrant
In a unanimous decision, the Supreme Court ruled that the vast amount of data contained on modern cellphones must be protected from routine inspection.