Newly Disclosed NSA Documents Shed Further Light on Five Eyes Alliance

"(Compare that with, for example, the statement by David Lange, the former prime minister of New Zealand, who remarked that “it was not until I read [the] book [“Secret Power” by Nicky Hager, which details the history of New Zealand’s Government Communications Security Bureau] that I had any idea that we had been committed to … Continue reading Newly Disclosed NSA Documents Shed Further Light on Five Eyes Alliance

Who Watches the [Artificial Intelligence] Watchmen?

Open Question: What are the unintended consequences of artificial intelligence in the surveillance domain? Recently, I came across a good basic guide for finding hidden cameras and bugs with a level of detail I've never seen online before. As with everything related to security, the first question to ask is: what is your threat model? … Continue reading Who Watches the [Artificial Intelligence] Watchmen?

How to Find Hidden Cameras and Spy Bugs (The Professional Way) – Sentel Tech Security

"The simple strategies that we are going to show you will effectively clear most rooms for hidden cameras and bugs without having to use super expensive countersurveillance gear or an outside company.Most of the processes and steps that we are going to show you are adopted from some of our best government agencies, where countersurveillance … Continue reading How to Find Hidden Cameras and Spy Bugs (The Professional Way) – Sentel Tech Security

End of Trust

"The first all-nonfiction McSweeney’s issue is a collection of essays and interviews focusing on issues related to technology, privacy, and surveillance. The collection features writing by EFF’s team, including Executive Director Cindy Cohn, Education and Design Lead Soraya Okuda, Senior Investigative Researcher Dave Maass, Special Advisor Cory Doctorow, and board member Bruce Schneier. We also … Continue reading End of Trust

How to Boost Your Data Privacy With a Virtual Private Network

"Data privacy matters, and we all deserve respect and consideration from those we visit on the internet. As shown by the numerous data breaches that have affected companies and individual users around the world, individuals and governments, however, we must also look out for our own personal data and privacy. Using a VPN to obfuscate … Continue reading How to Boost Your Data Privacy With a Virtual Private Network

Click Here to Kill Everybody – Bruce Schneider

"There is simply no way to secure US networks while at the same time leaving foreign networks open to eavesdropping and attack. There's no way to secure our phones and computers from criminals and terrorists without also securing the phones and computers of those criminals and terrorists. On the generalized worldwide network that is the … Continue reading Click Here to Kill Everybody – Bruce Schneider