• U.S. keeping too much data on too many people for too long: report

    A new study surveys five methods of data collection by U.S. intelligence and law enforcement agencies, and finds that these agencies not only collect massive amounts of innocent Americans’ data, but can share and store this data for up to seventy-five years or more, creating opportunities for abuse and clogging government databases.

  • NSA tried to crack Tor anonymity tool

    In its efforts to gather more intelligence, and overcome obstacles to this effort, the National Security Agency (NSA) has repeatedly tried to develop attacks against people using Tor, a software tool designed to protect online anonymity – and which is primarily funded and promoted by the U.S. government itself to help political activists, whistleblowers, militaries, and law enforcement. The NSA’s determined effort to crack Tor raises questions about whether the agency, deliberately or inadvertently, acted against Internet users in the United States when attacking Tor. One of the main functions of Tor is to hide the country of all of its users, meaning any attack could be hitting members of Tor’s large U.S. user base.

  • More Americans see their electronic equipment seized by DHS at the border

    The American Civil Liberties Union (ACLU) has released details of an investigation showing how U.S. law enforcement and other agencies exceed their powers in the name of homeland security. The ACLU points to the practice of the U.S. border agents searching and seizing the electronic devices of Americans at the border. Public data shows that more Americans are having their electronic devices searched.

  • Navy blimp conducts aerial mapping operations in the Washington D.C. Flight Restriction Zone

    The U.S. Naval Research Laboratory (NRL) and the Navy’s sole Science & Technology research squadron, Scientific Development Squadron ONE (VXS-1), began operating the MZ-3A lighter-than-air blimp in the regions surrounding Washington, D.C. on 21 September. The Navy MZ-3A is conducting aerial mapping operations within the Washington D.C. Flight Restriction Zone (DCA-FRZ).

  • Using spooks’ software to select wine

    Delectable is a mobile application that allows users to explore wines by using technology currently employed to locate terrorists and prevent bank frauds. The application is considered to have the world’s largest database of wine, providing information on more than two million wines and offering users an option to purchase selected wines.

  • U.S. pays growing attention to insider threats

    Al Qaeda and other terrorist organizations have repeatedly sought to infiltrate the U.S. intelligence community by having supporters apply for intelligence jobs, according to a classified budget document. The U.S government investigates thousands of employees a year to make sure such infiltration does not happen. The CIA says that 20 percent of job applicants whose backgrounds raised questions had “significant terrorist and/or hostile intelligence connections.”

  • NYPD designated all NYC mosques as terrorist organizations to facilitate broad surveillance

    The New York Police Department (NYPD) secretly labeled entire mosques in New York as terrorist organizations, allowing the NYPD to use surveillance techniques including informants and spies without needing evidence or proof of criminal or terrorist activities to investigate the mosques. The investigations, known as Terrorism Enterprise Investigations (TEI), began after the 9/11 attacks on New York City and the Pentagon.

  • Fusion centers collect information on non-threatening groups

    Since the 9/11 attacks, federal and state surveillance of nonviolent student groups, protest movements, and mosques has increased along with the growth of fusion centers. Fusion centers serve as the focal points for the receipt, analysis, gathering, and sharing of threat-related information. According to DHS, there are fifty-three primary fusion centers and twenty-five recognized fusion centers across the United States.

  • Security vs. privacy

    Those who ask you to choose security or privacy and those who vote on security or privacy are making false choices. That’s like asking air or water? You need both to live. Maslow placed safety (of which security is a subset) as second only to food, water, sex, and sleep. As humans we crave safety. As individuals and societies, before we answer the question “security or privacy,” we first have to ask “security from whom or what?” and “privacy from whom and for whom?”

  • Privacy board wants Feds to update security agencies’ operating rules

    The independent Privacy and Civil Liberties Board says U.S. national security agencies are operating under outdated rules which should be revised to reflect advances in technology.The oversight board says that rules governing collection and retention of data about Americans need be revised to “appropriately capture both the evolution of technology and the roles and capabilities of the intelligence community since 9/11.”

  • NSA broke UN video-conferencing encryption, eavesdropped on deliberations

    The National Security Agency (NSA) in 2012 broke the encryption which secured the UN internal video conferencing at the organization’s headquarters in New York. Among other things, the NSA discovered that the Chinese secret service was also eavesdropping on the UN.

  • U.K. detains, questions NSA revelations journalist’s partner

    David Miranda, the partner of Guardian’s Glenn Greenwald who interviewer Edward Snowden and who wrote several stories based on documents provided by Snowden, was detained for nine hours by U.K. authorities at Heathrow Airport and questioned under schedule 7 of the Terrorism Act 2000. Miranda was released – schedule 7 allows a suspect to be held for a maximum of nine hours, and then the police must release or formally arrest the individual. – but the electronic equipment he was carrying with him, including his mobile phone, laptop, camera, memory sticks, DVDs, and games consoles were confiscated by the authorities.

  • NSA revelations hobble pursuit of a comprehensive cyberdefense initiative

    NSA director General Keith Alexander has proposed a digital version of Ronald Reagan’s space-based Star Wars missile defense program, which Reagan unveiled in 1983. In Alexander’s vision, when a cyberattack is launched at the United States, the defense system would intercept and thwart the attack before it caused any damage. Intercepting a cyberattack would require the NSA to tap, track, and scan all cyber traffic entering the United States. The technology needed to intercept cyberattacks, however, is strikingly similar to the technology the NSA uses for the types of surveillance Snowden exposed. Post-Snowden, it is doubtful that the administration would pursue a comprehensive cyberdefense initiative, or that lawmakers would accept it.

  • DEA uses NSA surveillance information to make arrests

    The Drug Enforcement Administration (DEA) has benefitted from multiple tips from the National Security Administration’s (NSA) surveillance programs – although not necessarily the programs revealed by Edward Snowden. DEA officials in a secret office known as the Special Operations Division (SOD) are assigned to handle incoming tips from the NSA. The information exchanged between the two agencies includes intelligence intercepts, wiretaps, informants, and a massive database of telephone records.

  • The FBI uses hackers’ methods in its surveillance programs

    The U.S. government is planning to expand its suspect surveillance programs to include tactics which are commonly used by computer hackers.The FBI typically uses hacking in cases involving organized crime, child pornography, or counterterrorism, a former U.S. official said. The agency is less inclined to use these tools when investigating hackers, out of fear the suspect will discover and publicize the technique.