Items tagged with spying

The growing consensus is that the U.S. government is overstepping its bounds and trampling on people's right to privacy. Former NSA contractor Edward Snowden blew the whistle on the government's vast spying program, and while that was an eye opener for the country (and world) at large, the full extent of its efforts are still coming to light. The most recent example is the email scanner Yahoo built under the direction of the NSA and FBI.Developed in secret, the email scanner was found to be a sophisticated hacking tool, or rootkit, as some experts have classified it. The email scanner gave the... Read more...
Is this real life or an Orwellian nightmare? You might want to think twice before purchasing a MyFriend Cayla or i-Que Robot. The smart toys have been accused of sending information to the Massachusetts-based company Nuance Communication. The Electronic Privacy Information Center (EPIC), the Campaign for a Commercial-Free Childhood (CCFC), the Center for Digital Democracy (CDD), and Consumers Union filed a complaint against Genesis Toys and Nuance Communication with the Federal Trade Commission (FTC) this morning. The MyFriend Cayla and the i-Que Robot used voice recognition to listen to the children... Read more...
There are steps you can take to reclaim your privacy, such as putting a piece of black tape over your laptop's webcam, but unless you're willing to disconnect completely, total privacy might be a myth. Case in point, researchers at Israel's Ben Gurion University recently demonstrated how easy it is to hack a system so that the headphones record sound like a microphone. The proof-of-concept computer code at work is called "Speake(a)r" and what it does is repurpose the speakers inside headphones to record audio. It does this by capturing vibrations in the air and converting them into electromagnetic... Read more...
If you follow WikiLeaks on Twitter, you may have noticed a series of cryptic tweets consisting of strings of numbers and letters. These are hashes or keys of sorts, some of which are calling "dead man's keys." Regardless, they appear to be related to another WikiLeak post on Twitter claiming its co-founder, Julian Assange, is without Internet access after his connection was "intentionally severed by a state party." That action has reportedly activated WikiLeaks' "appropriate contingency plans" in response. Julian Assange's internet link has been intentionally severed by a state party. We have activated... Read more...
You know a story is going to be good when it involves Facebook, its creator Mark Zuckerberg, and the word "privacy". It used to be that Google was considered the biggest, baddest people data-fetcher, but over time, that crown has been passed to Facebook, a service that doesn't even need to try to get information from people, as those people willingly cough it up themselves. For a multitude of reasons, the lack of privacy on Facebook should be concerning to many, especially when you consider that Mark Zuckerberg can't seem to get enough privacy for himself. As we reported just the other day, Facebook-owned... Read more...
Last week, we learned about the company teaming up with others, such as Microsoft and Yahoo, to make SMTP 'Strict Transport Security' a reality, a protocol that would make it even harder for malicious users to gain access to our email. In a new blog post, the company draws our attention to SMTP STS as well as a couple of other recent (and not so recent) ways the company has improved our security. On Safer Internet Day, which happened a month-and-a-half ago, the company introduced a new Gmail feature that highlights when email is received or being sent to a domain... Read more...
Could your smartphone be listening in on your life? If you download mobile apps without much care for their permissions requests, you might not ever know. The privacy threat is so significant though, that the Federal Trade Commission has stepped in and warned us to be aware of it. On Thursday, the FTC sent a letter to a dozen app developers warning them against their use of "audio beacons", which listen in on the environment and pick up hidden noise signals from TV shows. This is made possible with technology from an Indian company named Silverpush, and in effect it lets the app figure out what... Read more...
If you thought that United States intelligence and law enforcement agencies around the country were incredibly adamant about spying on its citizens (going to extreme lengths to do so), you haven’t seen anything yet. Across the pond, the Campaigners Privacy International filed a formal complaint against the UK’s GCHQ, levying claims that the agency’s efforts to hack the devices of ordinary citizens was unlawful. However, not only did the GCHQ acknowledge that it was involved in a widespread hacking campaign (reversing previous denials on the matter), but the Investigatory Powers Tribunal (IPT) actually... Read more...
The term "IoT" has been floating around for a while and many who care about privacy have been put on high alert. "Internet of Things" devices can help make our lives better. They can allow us to change the temperature with our smartphones or even unlock doors. They could help us track vital stats during a workout. They can optimize the use of our solar power. All great things... but... they can also act as a proxy that allows governments to peer into our lives. Again, this threat is nothing new, but what makes its reality just a bit clearer is that someone in power in the spying... Read more...
The NSA’s practice of collecting the phone records of Americans is illegal, a Federal appeals court ruled today. The new decision in the case brought by the American Civil Liberties Union (ACLU) effectively kills the NSA’s position that its data collection practice was authorized by section 215 of the Patriot Act. Overturning an earlier opinion, the Federal appeals court wrote that “the bulk telephone metadata program is not authorized by section 215 (of the Patriot Act).” The decision doesn’t necessarily mean an end to the government’s data collection program, however. In its opinion, the Federal... Read more...
It was revealed several months ago that the U.S. Marshal Service secretly uses spy planes equipped with devices that mimic cell towers to scan for and harvest cellphone information on a mass scale. Now it's being reported that the Central Intelligence Agency (CIA) played a key role in helping the Justice Department develop the technology that's capable of scanning data from thousands of cellphones at a time.Let's back up a moment. As originally reported by a number of news outlets, the Federal Communications Commission (FCC) was clueless of the spy program that the Department of Justice (DoJ) won't... Read more...
Symantec made the unsettling announcement today that it has discovered sophisticated malware that has been operating successfully on and off since 2008. Named Regin, the malware launches in a series of stages and is designed to avoid detection at each stage. Symantec hasn’t identified the organization that created Regin, but says that its sophistication, its targets, and the amount of time that would be needed to create it suggest that a nation state is responsible. Image Credit: SymantecRegin’s first stage is a Trojan. Once launched, the malware goes through several stages, each of which is encrypted.... Read more...
We already know that Uncle Sam is keeping tabs on us, or at least those of us who might trigger a red flag for one reason or another. The question is, to what degree? We might never know the full answer to that, though we can parse together bits and pieces to get an idea. For example, Google's latest transparency report reveals that government requests for user data have risen 150 percent over the past five years. This is the tenth time Google has updated its transparency report, and in the latest version, Google shares the number of government demands for user information in criminal investigations... Read more...
The Edward Snowden revelations have faded a bit from public view in light of other, more recent political activities, but a new report regarding the NSA and Yahoo has people talking about it once more. Reportedly, the United States government threatened to fine Yahoo a quarter of a million dollars <i>per day</i> in 2008 "if it failed to comply with a broad demand to hand over user communications." Yahoo's stance was that doing so would violate the U.S. constitution, but that didn't stop the feds from pressuring with such staggering fines to comply with its PRISM program. Unsealed documents... Read more...
1 2 3 Next