The government is spying on us through our computers, phones, cars, buses, streetlights, at airports and on the street, via mobile scanners and drones, through …
Surveillance / Government Spying
The government is spying on us through our computers, phones, cars, buses, streetlights, at airports and on the street, via mobile scanners and drones, through our smart meters, and in many other ways. Even now – after all of the revelations by Edward Snowden, Bill Binney, and other whistleblowers – spying apologists say that the reports are “exaggerated” or “overblown”, and that the government only spies on potential bad guys. In reality, the government is spying on everyone’s digital and old-fashioned communications. For example, the government is photographing the outside information on every piece of snail mail. The government is spying on you through your phone … and may even remotely turn on your camera and microphone when your phone is off.
A panel discussion on National Security, Secrecy and Surveillance in New York City was sponsored by the Open Society Foundations and the Government Accountability Project, and moderated by Steven Aftergood, the renowned editor of Secrecy News for the Federation of American Scientists. The speakers were Thomas Drake, the courageous former intelligence officer who blew the whistle on National Security Agency/contractor corruption during the Bush administration and was wrongly prosecuted by the Obama administration as a result; his ...
In April 2010, the government alleged that Thomas Drake - a former senior executive of the U.S. National Security Agency (NSA), a decorated U.S. Air Force and U.S. Navy veteran, and a whistleblower - mishandled documents, one of the several Espionage Act cases in U.S. history, as retaliation and persecution for challenging the unconstitutional domestic spying Trailblazer Project. He is the 2011 recipient of the Ridenhour Prize for Truth-Telling and co-recipient of the Sam Adams Associates for Integrity in Intelligence (SAAII) award. On ...
There is little doubt that technology will continue to drive change across the developing world. However, uncertainty exists about the role of technological advances in alleviating poverty. To uncover the range of possibilities that may emerge, novel approaches like scenario planning are essential. "Scenarios for the Future of Technology and International Development," a new report, features four very different - yet very plausible - visions of ...
On May 7, AP headlined “US: CIA thwarts new al-Qaida underwear bomb plot,” saying: Agents foiled “an ambitious plot by al-Qaida’s affiliate in Yemen to destroy a US-bound airliner using a bomb with a sophisticated new design around the one-year anniversary of the killing of Osama bin Laden, The Associated Press has learned.” AP described an upgraded underwear bomb plot. Like the earlier one, it was ...
Wikileaks published a document by the INDECT , the Intelligence Information System Supporting Observation, Searching and Detection for Security of Citizens in Urban Environments of Europe. According to Wikileaks, INDECT's "Work package 4" is designed "to comb web blogs, chat sites, news reports, and social-networking sites in order to build up automatic dossiers on individuals, organizations and their relationships." Mind Your Tweets: The CIA Social Networking ...
The Foreign Intelligence Surveillance Court (FISC, also called the FISA Court) granted almost dictatorial powers to the U.S. Attorney General to spy on Americans, signed by Judge Reggie B. Walton, a James P. Chandler, Eric H. Holder, Jr., David J. Kappos (IBM) colleague. This opinion was declared unconstitutional by the Second Circuit Court of Appeals on May 07, 2015. However, it gave Eric Holder the excuse ...
Dec. 01, 2008, the C.I.A. internally published NightSkies v1.2 User Guide for exploiting Apple iPhone 3G v2.1. Whistleblower Source: WikiLeaks Vault 7 DARK MATTER. This program "Grants full remove command and control" ... "The tool operates in the background providing upload, download and execution capability ... will wait for user activity before beaconing. When user activity is detected, NS will attempt to beacon to a preconfigured ...
On Nov. 6, 2008, the C.I.A. internally published SeaPea v2.0 - User Guide for exploiting Apple Mac OSX 10.4.X through 10.5.X. Whistleblower Source: WikiLeaks Vault 7 DARK MATTER Released in 2017. SeaPea hijacks Apple Macintosh computers undetectably, below the operating system, so that it continues to operate even when the infected target computer is rebooted. SeaPea even includes a stealth feature that deletes itself if it ...
Google Chrome was first publicly released on September 2, 2008 for Windows XP and later, with 43 supported languages, officially a beta version, and as a stable public release on December 11, 2008. On the same day, a CNET news item drew attention to a passage in the Terms of Service statement for the initial beta release, which seemed to grant to Google a license to all content transferred via ...
Following its first round of seed funding on June 1, 2007, Dropbox was founded by MIT students Drew Houston and Arash Ferdowsi, as a startup company, with initial funding from seed accelerator Y Combinator. Dropbox is operated by American company Dropbox, Inc., headquartered in San Francisco, California, that offers cloud storage, file synchronization, personal cloud, and client software. In 2007-2008, the CIA internally published the Triton ...