Network World - As the price of digital storage drops and the technology to tap electronic communication improves, authoritarian governments will soon be able to perform retroactive surveillance on anyone within their borders, according to a Brookings Institute report. These regimes will store every phone call, instant message, email, social media interaction, text message, movements of people and vehicles and public surveillance video and mine it at their leisure, according to " Recording Everything: Digital Storage as an Enabler of Authoritarian Government ," written by John Villaseno, a senior fellow at Brookings and a professor of electrical engineering at UCLA. BACKGROUND: Surveillance tech companies should not sell to despots, says EU
In an attempt to distance themselves from the increasingly volatile Carrier IQ situation, we’ve been told that Sprint has ordered that all of their hardware partners remove the Carrier IQ software from Sprint devices as soon as possible.
ThinkProgress filed this report from a town hall in Cincinnati, Ohio. Ohio constituent places tape over mouth after Rep.
Kurt Nimmo Infowars.com August 24, 2011
A 10 page Powerpoint presentation (pdf) that I recently obtained through a Freedom of Information Act Request to the Department of Justice, reveals that law enforcement agencies routinely seek and obtain real-time surveillance of credit card transaction. The government's guidelines reveal that this surveillance often occurs with a simple subpoena, thus sidestepping any Fourth Amendment protections. Background
BECK: Is anybody willing to do their own homework? Because the media is not going to. Start looking at who they're connected to?
From Wired How-To Wiki
The FBI now wants to require all encrypted communications systems to have backdoors for surveillance, according to a New York Times report, and to the nation's top crypto experts it sounds like a battle they've fought before.
Facebook Twitter Google+ Save E-mail Share Print Tens of thousands of programmers, writers, accountants and other workers labor at home doing contract work for companies like Google, Hewlett-Packard and NBC. The computers they use contain software that takes snapshots of what they are doing six times an hour.
Somewhere, a US government official is reading through a list of those who sent or received an email from Jacob Appelbaum, a 28-year-old computer science researcher at the University of Washington who volunteered for WikiLeaks. Among those listed will be my name, a journalist who interviewed Appelbaum for a book about the digital revolution .
Comme d'autres entreprises de communication et de technologie, Google reçoit régulièrement des demandes de suppression de contenu émanant d'organismes gouvernementaux ou de tribunaux à travers le monde.
December 02, 2011, 11:26 AM — Yesterday WikiLeaks released 287 documents in what it calls The Spy Files, which describes as descriptions of the relationship between national intelligence agencies and the commercial software, security and surveillance companies they hired to provide technology that allows them to secretly listen in on cell phone conversations, text messages, email and other Internet traffic and location data.
A new security research project is designed to scan millions of IMs, texts and emails every day.