• Anaheim police employed Stingray surveillance devices

    Police in Anaheim, California have been using Stingray surveillance devices, as well as employing the more intrusive cousin, “dirtboxes,” during active investigations, without the knowledge of residents. More than 400 new documents obtained by the American Civil Liberties Union show that the department has requested funds for the technology, and that it has been using the devices since at least 2009.

  • World leaders urged to oppose encryption back doors

    In an open letter made public on Monday, nearly 200 Internet and digital rights leaders and experts, companies, and organizations are calling on the Obama administration and other world leaders to reject efforts to create “back doors” to encryption. “Encryption tools, technologies, and services are essential to protect against harm and to shield our digital infrastructure and personal communications from unauthorized access,” the letter states.

  • Majority of Americans believe it is sometimes necessary for govt. to sacrifice freedoms

    Survey conducted after the Paris and San Bernardino attacks finds a majority of respondents from both parties think it is acceptable for the government to analyze the Internet activities and communications of American citizens without a warrant.

  • NSA kept Benjamin Netanyahu under surveillance during Iran negotiations

    As part of the effort by the Obama administration earlier this year to make sure that the negotiations between the P5+1 powers and Iran over the latter’s nuclear program would not be derailed or obstructed, the National Security Agency (NSA) kept a close watch on Israel’s prime minister Benjamin Netanyahu. The agency collected intelligence on Netanyahu and other Israeli leaders in an attempt to learn what moves the Israeli leader was planning as part of his campaign to have Congress reject the agreement the United States was negotiating.

  • DHS questioned over pressure it put on a library to disable Tor node

    Back in September, Kilton Public Library in Lebanon, New Hampshire briefly disabled its Tor relay after local police, following a tip from agents with Homeland Security’s investigations branch that the network may be used by criminals or terrorists. A Congresswoman from California wants to know why DHS officials pressured the New Hampshire library to take down the relay node, and whether DHS has leaned on other organizations to do so.

  • Civil liberties coalition condemns cybersecurity bill

    Civil libertarians in the United States have a new ally in the fight against the new surveillance bill now being considered in Congress: librarians. The critics of the bill call it both “unhelpful” and “dangerous to Americans’ civil liberties.” House speaker Paul Ryan (R-Wisconsin) has been actively pushing for reconciliation of two bills, the Protecting Cyber Networks Act (PCNA) and the National Cybersecurity Protection Advancement with the Cybersecurity Information Sharing Act of 2015 (CISA), which passed a Senate vote in October.

  • Untraceable communication -- guaranteed

    Anonymity networks, which sit on top of the public Internet, are designed to conceal people’s Web-browsing habits from prying eyes. The most popular of these, Tor, has been around for more than a decade and is used by millions of people every day. Recent research, however, has shown that adversaries can infer a great deal about the sources of supposedly anonymous communications by monitoring data traffic though just a few well-chosen nodes in an anonymity network. Researchers have developed a new, untraceable text-messaging system designed to thwart even the most powerful of adversaries.

  • Good apps talking to bad Web sites behind your back

    In one of the first studies to analyze behind-the-scenes behaviors of good applications, researchers conducted a large-scale analysis of URLs embedded in 13,500 free android apps downloaded from Google Play. The apps tested were created by reputable developers and downloaded by many people, among them popular social media, shopping, news and entertainment apps. The researchers found that almost 9 percent of popular apps downloaded from Google Play interact with Web sites that could compromise users’ security and privacy; 15 percent talked to bad Web sites (with intentions that vary from harming devices, stealing confidential data or annoying users with spam); and 73 percent talked to low-reputation Web sites(those receiving a Web of Trust rating lower than 60/100).

  • New cybersecurity legislation would shield companies from public records laws

    A legislation which passed both houses of Congress, but has not yet signed into law by the president, aims to encourage companies and organizations to share with the U.S. government information about cyberattacks and cyberthreats they experience –but critics say there is a catch: the legislation would severely restrict what the public can learn about the program.

  • After Paris, it’s traditional detective work that will keep us safe, not mass surveillance

    Before the dust has even settled from the attacks on Paris, familiar calls for greater surveillance powers are surfacing. The desire for greater security is understandable, but that doesn’t mean we should suspend our judgement on the measures proposed to bring it about. It’s widely accepted that intelligence work is the most effective form of counter-terrorism, and that the best intelligence comes from community engagement, not coercion. So we must be wary of the evangelism of those pushing technological solutions to security problems, and the political clamor for mass surveillance.

  • Facebook: Governments’ demanding more user data, content restrictions

    Facebook says that governments’ requests for information and for the removal of content have increased in the first half of 2015. Such requests have substantially increased in the last two years, since the company began releasing such information. The number of accounts for which governments around the world have requested account data jumped 18 percent in the first half of 2015, to 41,214 accounts, up from 35,051 requests in the second half of 2014.

  • Lawmakers want to know scope of federal agencies’ use of cellphone tracking technology

    Members of the House Oversight Committee on Monday sent letters to the heads of twenty-four federal agencies asking them whether or not their agencies employ the StingRay cell phone tracking technology. The technology simulates a cell phone tower so it can collect information on mobile phones and their users. The letters are indicative of a growing unease with the unregulated use of the technology by federal agencies.

  • German spy agency spied on FBI, UN bodies, and German citizens: Report

    BND, Germany’s intelligence service, spied on the FBI, French foreign minister Laurent Fabius, UNICEF — the UN Children’s Fund, the International Court of Justice in The Hague, and the World Health Organization, among many other targets. What may upset many Germans is the fact that the list of BND surveillance targets also included German citizens. Germany has strict privacy laws and German citizens are not allowed to be spied on without a thorough review by the courts.

  • NSA phone metadata collection program “likely violates constitution”: Judge

    Washington, D.C. district court judge Richard Leon, ruling on Monday against the National Security Agency (NSA), said that the agency’s bulk phone metadata collection “likely violates the constitution.” Judge Leon, ruling in a case brought by conservative activist attorney Larry Klayman, said that the NSA must immediately end collecting the defendants’ information. Leon said he believed it was “substantially likely” that “the program is unlawful,” and that in that event, “the plaintiffs have suffered concrete harm traceable to the challenged program.”

  • Leading tech companies get failing grade for their privacy policies

    The Ranking Digital Rights’ report, 2015 Corporate Accountability Index, find that the world’s leading technology companies deserve a failing grade for their privacy policies and the level of protection they offer their users. Some of the companies have also been found lacking for their freedom of expression practices. “Even the companies that ranked highest are missing the mark in some ways, and improvements are needed across the board to demonstrate a greater commitment to users’ freedom of expression and privacy,” the report says.